When you are planning your BI reporting environment and are ready to start designing your reports you must ensure that you Identify security or user specific content that needs to be built into a report.
Often a single report is requested that will display different data or different layouts to different users or groups. This type of report should really be considered as two or more different reports layouts as requirements will need to be gathered for each layout and set of security requirements.
You will also need to identify the source of the security information that will be leveraged to satisfy these different layout rules. The layouts may be triggered by the user id session parameter although additional data and security restrictions may be contained within a database table that is keyed by the individual user ID. Also, depending on how the report is to be consumed you may be working with only the data from a security table such as with burst output as there are no session parameters available at the time that the burst report is executed.