一本Microsoft Dynamics AX 2012相关的电子书《Microsoft Dynamics AX 2012 R3 Security》
English | 22 Jun. 2015 | ISBN: 1782175539 | 106 Pages | EPUB/MOBI/PDF (True) | 12.48 MB
If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX.
A quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations
About This Book
Establish a secure environment with policies, permissions, and privileges using AOT and secure tables Discover the security features that enable you to restrict the access of sensitive data from unauthorized people Explore basic to advanced customization features to authenticate and authorize, along with data security best practices of Microsoft Dynamics AX
What You Will Learn
Develop and design a security artifact using the AOT, and validate and test security privileges Learn how to use Code Access Security (CAS) to protect systems from dangerous APIs Install the debugger tool to debug and validate the security roles within the AOT Discover the use of the Table Permissions Framework to add an additional level of security to tables Design extensible data security policies, set policy contexts, and debug and validate the XDS policies Extend your organizational model to support ISV, partner customization, or configuration scenarios Secure the access to the Enterprise Portal web elements and design data access security
Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakeholders to deal with business data smoothly and securely, avoiding security threats and raising their competencies in the market.
This book begins by providing you with the skills to develop security policies, permissions, and privileges using the AOT and secure tables. You will learn about the MorphX security system and customizing security and access permissions. Moving on, you will discover security mechanisms at the data level in tables. You will also learn to implement various security features, leading to best practices for setting up protection around your organization’s valuable assets. By going step by step through every chapter, you will learn everything you need to configure the security of Microsoft Dynamics AX 2012 R3 to match your business needs.