1 / 12

Setting Up AX Security How2

Setting Up AX Security How2. Grant Wilson, Casey Johnson, Tao Wang. Agenda. Welcome Introduction to AX Security Approaches Tricks/Tips Security Keys Setting up User Groups Setting up Record Level Security Security Profiler (Demo) Resources. Welcome. Grant Wilson gwilson@blackhawk.com

villette
Download Presentation

Setting Up AX Security How2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Setting Up AX Security How2 Grant Wilson, Casey Johnson, Tao Wang

  2. Agenda • Welcome • Introduction to AX Security • Approaches • Tricks/Tips • Security Keys • Setting up User Groups • Setting up Record Level Security • Security Profiler (Demo) • Resources

  3. Welcome • Grant Wilson • gwilson@blackhawk.com • Casey Johnson • cjohnso@microsoft.com • Tao Wang • Tao.Wang@microsoft.com

  4. Introduction to AX Security • Microsoft Dynamics AX 2009 provides three methods for controlling access to features within the AX client. These include: license keys, configuration keys, and security keys. • License keys control access to entire modules within Microsoft Dynamics AX 2009 • Modules within Microsoft Dynamics AX 2009 have features that are linked with configuration keys. • Security keys are by far the most commonly used items for restricting access in the Microsoft Dynamics AX 2009 application. By using these keys, access can be restricted or granted to almost any item within the application. This includes menu items, forms, and tables.

  5. Approaches • Role Based: • Large complex user groups with all security needed for a role • Pros: Easy to administer once setup, Small number of groups • Cons: Complex setup, Duplication among groups, who has access to what • Process Based: • Many small process based groups • Pros: Reduced duplication, easier setup of groups • Cons: time to setup

  6. Tricks/Tips • Need two users and ability to login as alternate user • Launch AX without any user groups assigned • Find items missing security keys • Base User Group • Provide access to all basic functions within AX – Document Handling, Task record, Global Address Book, etc • Trick Keys • Sometimes you get an error that user does not have rights to table – even if they do. Need to provide access to the Tables key for that area. • A field cannot be set to a higher level than that of the table • Cascade Caution • Test, Test, Test

  7. Security Keys • Five Levels of Access • No Access —the user cannot access these items • View— user can only view items • Edit —–the has access to edit items • Create— the user can create new items • Full Control— able to create and delete items • Finding the Key • AOT - Properties

  8. Setting up User Groups • Administration > Setup > User groups. • Create Group – click permissions • Choose permissions

  9. Setting up Record Level Security • Administration > Setup > Security > Record Level Security • Create new record • Wizard will step you through • Based on a Query on a table by table basis • Can impact performance

  10. Security Profiler Demo Grant Wilson

  11. Resources • Microsoft Dynamics AX 2009 White Paper: Understanding Security in Microsoft Dynamics AX 2009 • http://www.microsoft.com/downloads/en/details.aspx?FamilyID=ca1c0118-9542-465b-b218-6ad99307425c&displaylang=en • Microsoft Dynamics AX 2009 Security Hardening Guide • https://www.microsoft.com/downloads/en/details.aspx?FamilyID=E08D8CF4-341D-49B7-B869-020D315990DB • Set up Microsoft Dynamics AX security • http://technet.microsoft.com/en-us/library/aa834392.aspx

  12. Discussion/Wrap Up • SQL Security • Perimeter/EP Security • Domains • AOSAuthorization

More Related