functionality being implemented, Microsoft Dynamics AX may also require
domain accounts that have specific permissions. The following table describes
the recommended security settings.
Server | Set |
Application Object Server (AOS) | The log directory cannot be changed. The log is always installed in <installationdirectory>\log. Restrict access to the directory to administrators and AOS service accounts. If a domain account is used for the AOS service, use an account that has the following rights:• Log on as a service. |
Database Server | It is important to follow the recommended practices for securing the database. For the latest information about SQL Server security, refer to the SQL Server TechCenter. |
Role Center and Enterprise Portal Server | The computer running IIS must be configured to use Basic authentication and Secure Sockets Layer (SSL) for users who log on from outside the corporate network. The Enterprise Portal server can be in the perimeter network and Internet-facing, or inside the internal network.NOTE: Enterprise Portal uses the Business Connector proxy user. Follow the recommended Microsoft practices for securing IIS and SharePoint technologies.• For the latest information about IIS security, refer to theIIS 7.0 documentation.• For the latest information about Windows SharePoint Services security, refer to the Windows SharePoint Services TechCenter. |
Reporting Server | The computer running the SSRS web site must be inside the internal domain and not Internet-facing. Follow the recommended Microsoft practices for securing SSRS. For the latest information about SSRS security, refer to the SQL Server TechCenter. |
Application Integration Framework (AIF) Server | The server requires the local Windows group, Microsoft Dynamics AX Web Service Administrators, created as part of the Setup. Follow the recommended Microsoft practices for securing IIS. For the latest information about IIS security, see the IIS 7.0 documentation. |
Online Analytical Processing (OLAP) Server | Follow the recommended Microsoft practices for securing SSAS. For the latest information about SSAS security, refer to the SQL Server TechCenter. |
Regards,
Hossein Karimi
No comments:
Post a Comment