Developing an extensible data security policy involves the following steps:
1. Modeling the query on the primary table.
2. Creating the policy.
3. Adding the constrained tables and views.
4. Setting the context.
However, before you start developing a policy, you must understand the
underlying requirements. You should identify the set of constrained tables and
analyze the relationships that these tables have with the primary table. You
should also analyze the data access patterns of the constrained tables, the table
sizes, and existing indexes on both the primary and constrained tables. All of
these aspects influence the impact that a policy will have on the performance of
the application.
NOTE: For more information about developing an extensible data security
policy, refer to the Developer Documentation.
Regards,
Hossein Karimi
Tuesday, July 24, 2018
Developing an Extensible Data Security Policy
Labels:
AX 2012,
Installation
+10 years of experience with hands-on lead-level background in the full life cycle of software development with demonstrated cross-functional team leadership skills.
Programming:
• ERP :Microsoft Dynamics AX 2012
• Language :X++, C#, C++, XAML, Asp.Net, Html, VB.Net, Android
• Environment : Windows XP, Windows 8, Windows 10, Windows Server
• DataBase : Oracle 9i,10g,11g and SqlServer and SQLlite
Subscribe to:
Post Comments (Atom)
Configure the Firewall on the Enterprise Portal Server
After you install Enterprise Portal, enable Web Server (HTTP) in Windows Firewall. If you do not enable the web server in Windows Firewall...
-
To integrate Microsoft Dynamics AX and Analysis Services, you must connect Analysis Services to the Application Object Server (AOS). To do s...
-
The below select query will give the both the Sales Line record count and the sum of sales quantity. static void Test_Data(Args _args) ...
-
In Reporting Services, reports and resources are processed under the security identity of the user who is running the report. If the report ...
No comments:
Post a Comment