About This Book
- Establish a secure environment with policies, permissions, and privileges using AOT and secure tables
- Discover the security features that enable you to restrict the access of sensitive data from unauthorized people
- Explore basic to advanced customization features to authenticate and authorize, along with data security best practices of Microsoft Dynamics AX
Who This Book Is For
If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX.
What You Will Learn
- Develop and design a security artifact using the AOT, and validate and test security privileges
- Learn how to use Code Access Security (CAS) to protect systems from dangerous APIs
- Install the debugger tool to debug and validate the security roles within the AOT
- Discover the use of the Table Permissions Framework to add an additional level of security to tables
- Design extensible data security policies, set policy contexts, and debug and validate the XDS policies
- Extend your organizational model to support ISV, partner customization, or configuration scenarios
- Secure the access to the Enterprise Portal web elements and design data access security
In Detail
Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakeholders to deal with business data smoothly and securely, avoiding security threats and raising their competencies in the market.
This book begins by providing you with the skills to develop security policies, permissions, and privileges using the AOT and secure tables. You will learn about the MorphX security system and customizing security and access permissions. Moving on, you will discover security mechanisms at the data level in tables. You will also learn to implement various security features, leading to best practices for setting up protection around your organization's valuable assets. By going step by step through every chapter, you will learn everything you need to configure the security of Microsoft Dynamics AX 2012 R3 to match your business needs.