Several common design principles are used when creating the base 80+ roles.
These design principles include the following:
• Roles represent the common access rights that are required for the
job positions within an organization.
• Roles account for the organization size, culture and industry focus.
• Users are assigned to one or more roles according to their job.
• Role types.
o Functional role: for example: Warehouse worker.
o Organization role: for example: Employee.
o Application role: for example: System User.
• Role segregation categories: Functional roles are designed to
accommodate segregation of duties. Different categories of roles
exist that each focus on their type responsibilities.
o Validation: Clerks focus on recording transactions.
o Verification: Verifiers validate the correctness of recorded transactions.
o Authorization: Supervisors authorize processing of the transactions.
o Management: Managers review transactions periodically and apply changes to the process as appropriate.
Regards,
Hossein Karimi
Tuesday, July 24, 2018
Role Design Principles
Labels:
AX 2012,
Installation
+10 years of experience with hands-on lead-level background in the full life cycle of software development with demonstrated cross-functional team leadership skills.
Programming:
• ERP :Microsoft Dynamics AX 2012
• Language :X++, C#, C++, XAML, Asp.Net, Html, VB.Net, Android
• Environment : Windows XP, Windows 8, Windows 10, Windows Server
• DataBase : Oracle 9i,10g,11g and SqlServer and SQLlite
Subscribe to:
Post Comments (Atom)
Configure the Firewall on the Enterprise Portal Server
After you install Enterprise Portal, enable Web Server (HTTP) in Windows Firewall. If you do not enable the web server in Windows Firewall...
-
To integrate Microsoft Dynamics AX and Analysis Services, you must connect Analysis Services to the Application Object Server (AOS). To do s...
-
The below select query will give the both the Sales Line record count and the sum of sales quantity. static void Test_Data(Args _args) ...
-
In Reporting Services, reports and resources are processed under the security identity of the user who is running the report. If the report ...
No comments:
Post a Comment