Het beveiligen van BI in je omgeving intern en extern is zeer belangrijk. Gaat niet altijd goed. . Onderstaand een paper hoe je o.a. je business data beveiligd. Dit is een goede oefening en tevens heel nuttig voor huidige afscherming van data.

Who Should Read This Document

Identity and delegation in SharePoint 2010 Products is a broad topic, with many facets and depths of understanding. This paper addresses the topic from both conceptual and technical levels and has been written to address the needs of various audiences

This document provides you with information that will help you understand the concepts of identity in SharePoint 2010 products, how Kerberos authentication plays a critical role in authentication and delegation scenarios, and the situations where Kerberos authentication should be leveraged or may be required in solution designs. The document also shows you how to configure Kerberos authentication end-to-end within your environment, including scenarios which use various service applications in SharePoint Server. Additional tools and resources are described to help you test and validate Kerberos configuration. The "Step-by-Step Configuration" sections of this document cover several SharePoint Server 2010 scenarios.

http://go.microsoft.com/fwlink/?LinkID=196600