120 likes | 352 Views
Setting Up AX Security How2. Grant Wilson, Casey Johnson, Tao Wang. Agenda. Welcome Introduction to AX Security Approaches Tricks/Tips Security Keys Setting up User Groups Setting up Record Level Security Security Profiler (Demo) Resources. Welcome. Grant Wilson gwilson@blackhawk.com
E N D
Setting Up AX Security How2 Grant Wilson, Casey Johnson, Tao Wang
Agenda • Welcome • Introduction to AX Security • Approaches • Tricks/Tips • Security Keys • Setting up User Groups • Setting up Record Level Security • Security Profiler (Demo) • Resources
Welcome • Grant Wilson • gwilson@blackhawk.com • Casey Johnson • cjohnso@microsoft.com • Tao Wang • Tao.Wang@microsoft.com
Introduction to AX Security • Microsoft Dynamics AX 2009 provides three methods for controlling access to features within the AX client. These include: license keys, configuration keys, and security keys. • License keys control access to entire modules within Microsoft Dynamics AX 2009 • Modules within Microsoft Dynamics AX 2009 have features that are linked with configuration keys. • Security keys are by far the most commonly used items for restricting access in the Microsoft Dynamics AX 2009 application. By using these keys, access can be restricted or granted to almost any item within the application. This includes menu items, forms, and tables.
Approaches • Role Based: • Large complex user groups with all security needed for a role • Pros: Easy to administer once setup, Small number of groups • Cons: Complex setup, Duplication among groups, who has access to what • Process Based: • Many small process based groups • Pros: Reduced duplication, easier setup of groups • Cons: time to setup
Tricks/Tips • Need two users and ability to login as alternate user • Launch AX without any user groups assigned • Find items missing security keys • Base User Group • Provide access to all basic functions within AX – Document Handling, Task record, Global Address Book, etc • Trick Keys • Sometimes you get an error that user does not have rights to table – even if they do. Need to provide access to the Tables key for that area. • A field cannot be set to a higher level than that of the table • Cascade Caution • Test, Test, Test
Security Keys • Five Levels of Access • No Access —the user cannot access these items • View— user can only view items • Edit —–the has access to edit items • Create— the user can create new items • Full Control— able to create and delete items • Finding the Key • AOT - Properties
Setting up User Groups • Administration > Setup > User groups. • Create Group – click permissions • Choose permissions
Setting up Record Level Security • Administration > Setup > Security > Record Level Security • Create new record • Wizard will step you through • Based on a Query on a table by table basis • Can impact performance
Security Profiler Demo Grant Wilson
Resources • Microsoft Dynamics AX 2009 White Paper: Understanding Security in Microsoft Dynamics AX 2009 • http://www.microsoft.com/downloads/en/details.aspx?FamilyID=ca1c0118-9542-465b-b218-6ad99307425c&displaylang=en • Microsoft Dynamics AX 2009 Security Hardening Guide • https://www.microsoft.com/downloads/en/details.aspx?FamilyID=E08D8CF4-341D-49B7-B869-020D315990DB • Set up Microsoft Dynamics AX security • http://technet.microsoft.com/en-us/library/aa834392.aspx
Discussion/Wrap Up • SQL Security • Perimeter/EP Security • Domains • AOSAuthorization