O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Microsoft Dynamics AX 2012 R3 Security

Book Description

A quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations

In Detail

Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakeholders to deal with business data smoothly and securely, avoiding security threats and raising their competencies in the market.

This book begins by providing you with the skills to develop security policies, permissions, and privileges using the AOT and secure tables. You will learn about the MorphX security system and customizing security and access permissions. Moving on, you will discover security mechanisms at the data level in tables. You will also learn to implement various security features, leading to best practices for setting up protection around your organization's valuable assets. By going step by step through every chapter, you will learn everything you need to configure the security of Microsoft Dynamics AX 2012 R3 to match your business needs.

What You Will Learn

  • Develop and design a security artifact using the AOT, and validate and test security privileges
  • Learn how to use Code Access Security (CAS) to protect systems from dangerous APIs
  • Install the debugger tool to debug and validate the security roles within the AOT
  • Discover the use of the Table Permissions Framework to add an additional level of security to tables
  • Design extensible data security policies, set policy contexts, and debug and validate the XDS policies
  • Extend your organizational model to support ISV, partner customization, or configuration scenarios
  • Secure the access to the Enterprise Portal web elements and design data access security

Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Microsoft Dynamics AX 2012 R3 Security
    1. Table of Contents
    2. Microsoft Dynamics AX 2012 R3 Security
    3. Credits
    4. About the Author
    5. About the Reviewers
    6. www.PacktPub.com
      1. Support files, eBooks, discount offers, and more
        1. Why subscribe?
        2. Free access for Packt account holders
        3. Instant updates on new Packt books
    7. Preface
      1. What this book covers
      2. What you need for this book
      3. Who this book is for
      4. Conventions
      5. Reader feedback
      6. Customer support
        1. Downloading the example code
        2. Errata
        3. Piracy
        4. Questions
    8. 1. MorphX Security System
      1. Introducing the MorphX development tool
        1. Application Object Tree
        2. The X++ code editor
        3. Compiler
        4. Debugger
        5. Projects
        6. The property sheet
        7. The cross-reference tool
        8. The Find tool
        9. The table browser tool
        10. The best practice tool
        11. The reverse engineering tool
      2. Developing a security artifact using AOT
        1. Setting permissions for a form
        2. Assigning permissions to privileges
        3. Validating and testing a security privilege
        4. Applying a configuration key
      3. Summary
    9. 2. Security Coding
      1. The fundamentals of security coding using X++
      2. Using Code Access Security
        1. Securing an API on the AOS
      3. Security debugging
        1. Installing the debugger
        2. Enabling the debugger
        3. Adding users to the Debugging User local group
        4. The debugger user interface
        5. Debugger shortcut keys
      4. Security for the display and edit methods
      5. The Table Permissions Framework
      6. Summary
    10. 3. Developing Extensible Data Security
      1. The main concepts of XDS policies
      2. Designing and developing the XDS policy
      3. Creating the policy
      4. Adding constrained tables and views
      5. Setting the XDS policy context
      6. Debugging XDS policies
      7. Summary
    11. 4. Extending the Organization Model
      1. The organizational model framework
        1. Organization hierarchies
      2. The organizational model scenarios
        1. Integration with other frameworks' application modules
        2. Custom modeling scenarios
      3. Extending the organizational model
        1. Creating a custom type of operating unit
          1. Creating a new base enum value
          2. Creating a view
          3. Creating a menu item
        2. Extending the hierarchy designer
      4. Summary
    12. 5. Enterprise Portal Security
      1. The architecture of Enterprise Portal
        1. Web parts
        2. AOT elements
        3. Datasets
        4. Controls
      2. Security in Enterprise Portal
        1. Securing web elements
        2. Record context and encryption
      3. Data access security
      4. Report access security
        1. Assigning a user to the DynamicsAXBrowser role
        2. Granting a user access permission to view reports
      5. Summary
    13. Index