Security and search features in the Enterprise Portal are improved.
• Kerberos Constrained delegation (KCD) is no longer required in a multi-box EP environment.
• Enterprise Portal automatically grants and denies access to data and webpages according to the role-based security framework in Microsoft Dynamics AX 2012. Before users can view data or
Enterprise Portal pages, administrators must configure role-based security.
• Microsoft Dynamics AX 2012 uses the SharePoint Business Data Connectivity Service (BCS) and SharePoint Search Server to provide a unified Enterprise Search experience for Enterprise Portal and the Microsoft Dynamics AX client. Microsoft Dynamics AX no longer includes the data crawler. All search administration is managed in SharePoint Search Server.
• Role center pages are now designed to load faster and to automatically refresh data when a page is loaded.
Regards,
Hossein Karimi
Friday, July 20, 2018
Enterprise Portal Improvements Security and Search Improvements
Labels:
AOT,
Enterprise Portal and Role Centers,
Reporting,
X++
+10 years of experience with hands-on lead-level background in the full life cycle of software development with demonstrated cross-functional team leadership skills.
Programming:
• ERP :Microsoft Dynamics AX 2012
• Language :X++, C#, C++, XAML, Asp.Net, Html, VB.Net, Android
• Environment : Windows XP, Windows 8, Windows 10, Windows Server
• DataBase : Oracle 9i,10g,11g and SqlServer and SQLlite
Subscribe to:
Post Comments (Atom)
Configure the Firewall on the Enterprise Portal Server
After you install Enterprise Portal, enable Web Server (HTTP) in Windows Firewall. If you do not enable the web server in Windows Firewall...
-
To integrate Microsoft Dynamics AX and Analysis Services, you must connect Analysis Services to the Application Object Server (AOS). To do s...
-
The below select query will give the both the Sales Line record count and the sum of sales quantity. static void Test_Data(Args _args) ...
-
In Reporting Services, reports and resources are processed under the security identity of the user who is running the report. If the report ...
No comments:
Post a Comment