The extensible data security framework is a new feature in Microsoft Dynamics
AX 2012 that enables developers and administrators to secure data in shared
tables such that users have access to only the part of the table that is allowed by
the enforced policy. This feature can be used in conjunction with role-based
security (also supported in Microsoft Dynamics AX 2012) to provide more
comprehensive security than was possible in the past.
Extensible data security is an evolution of the record-level security (RLS) that
was available in earlier versions of Microsoft Dynamics AX. Extensible data
security policies, when deployed, are enforced, regardless of whether data is
being accessed through the Microsoft Dynamics AX rich client forms, Enterprise
Portal web pages, SQL Server Reporting Services (SSRS) reports, or .NET
Services.
The extensible data security framework provides the following benefits to the
system administrator who helps secure data in Microsoft Dynamics AX 2012.
Regards,
Hossein Karimi
Tuesday, July 24, 2018
Extensible Data Security Framework
Labels:
AX 2012,
Installation
+10 years of experience with hands-on lead-level background in the full life cycle of software development with demonstrated cross-functional team leadership skills.
Programming:
• ERP :Microsoft Dynamics AX 2012
• Language :X++, C#, C++, XAML, Asp.Net, Html, VB.Net, Android
• Environment : Windows XP, Windows 8, Windows 10, Windows Server
• DataBase : Oracle 9i,10g,11g and SqlServer and SQLlite
Subscribe to:
Post Comments (Atom)
Configure the Firewall on the Enterprise Portal Server
After you install Enterprise Portal, enable Web Server (HTTP) in Windows Firewall. If you do not enable the web server in Windows Firewall...
-
To integrate Microsoft Dynamics AX and Analysis Services, you must connect Analysis Services to the Application Object Server (AOS). To do s...
-
The below select query will give the both the Sales Line record count and the sum of sales quantity. static void Test_Data(Args _args) ...
-
In Reporting Services, reports and resources are processed under the security identity of the user who is running the report. If the report ...
No comments:
Post a Comment