is an integrated solution and the authorization approach does not depend on reports. My suggestion is to check the authorization rules used for reports, viewer's handlers and services and update them depending on the custom requirements.
The following external blog post may be of interest for you: Windows Authentication And Impersonation.
Do you want to have your say when we set our development plans?
Do you want to know when a feature you care about is added or when a bug fixed?
Telerik Feedback Portal
and vote to affect the priority of the items