This section demonstrates the control of access to reports and to different subsets of data by means of defining report security. In general, report security can be classified into three groups: cached report bursting, record level and column level. After applying report security, an end user will only see what he or she is allowed to see.
The following topics explain the report security at each level in detail: