O'Reilly logo

Mastering Microsoft Dynamics AX 2012 R3 Programming by Mat Fergusson, Simon Buxton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Creating privileges

Before we start, we have to decide which model the security elements will go into. The consideration is that security is often configured by a consultant or someone in the organization responsible for maintaining security. The reason this is relevant is that the changes made in the client persist the changes back to the AOT, and therefore have to be deployed in the same way as our code is deployed.

Therefore, we often create a model specifically for security changes. In this way, they can be deployed separately in our code. Designing security is often an iterative process, and often there are many updates made during and after implementation.

We would create the security design in the same model as the main development if it ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required