O'Reilly logo

Mastering Microsoft Dynamics AX 2012 R3 Programming by Mat Fergusson, Simon Buxton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Designing the security structure

The new design is role-based and has been created with the organization's roles in mind, making it a much more natural fit. We can even automate the assignment of security roles based on the user's position in the organization, so by promoting a user to a production manager in human resources, we automatically assign them the appropriate role in the security model.

The security system in AX operates by controlling access to menu items. Much of the security architecture is based on this. When we added form parts, you may have wondered why we don't just drag the part onto the form. It is because we control access to the form part through the menu item, wherever it may appear. This is also why every button we add is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required