Chapter 4: Security: Objectives
Chapter 4: Security: Objectives
CHAPTER 4: SECURITY
Objectives
The objectives are:
Introduction
Role based security provides an extensible framework for defining access to the
Microsoft Dynamics AX application and data.
A security role relates to a job role that an end-user has within an organization.
The role includes duties, privileges and permissions required to perform the tasks
required in that role.
The framework and related tools assist the security administrator to ensure the
system is secure.
4-1
Development I in Microsoft Dynamics AX 2012
Definitions
Role based security is designed with the following base concepts.
Privileges specify the access that is required to perform a duty. For example, the
duty of maintaining the customer master requires privileges to maintain
customers and maintain customer bank accounts. A privilege includes one or
more permissions.
Permissions include the access level to one or more securable objects that are
required to perform the function associated with an entry point. For example, the
privilege of maintaining customers requires permissions that give full control to
the customer form accessed through the entry point of a display menu item. It
also requires full control to create a new address accessed through the entry point
of an action menu item.
4-2
Chapter 4: Security
Entry Points
An entry point is the element that is triggered by a user action to start a particular
function. There are three different categories of entry points in Microsoft
Dynamics AX:
Menu items point to forms, reports and classes that an end-user can
access from the rich client.
Web content items point to URLs and actions that an end-user can
access from the Enterprise Portal.
Service operations are used in document service classes in the
Application Integration Framework (AIF). AIF exchanges data with
external systems by sending and receiving XML documents.
Permissions
Permissions refer to the access levels that can be applied to the securable
objects. This could include any tables, fields, forms, reports or server side
methods that are accessible through an entry point.
Permissions that give access to reports or classes need only to have access or not
have access. By convention, reports are typically given read access and classes
are typically given delete access.
Permissions that give access to tables or fields can make use of all access levels.
Possible permission levels are defined on the entry point target. For example, a
form might allow permission levels to read, update, create or delete. The level to
be granted to an end-user is defined on the permission.
4-3
Development I in Microsoft Dynamics AX 2012
Privileges
A Privilege is a group of related permissions that are required to perform a duty.
Privileges are typically maintained by a developer in the AOT however they can
also be maintained by a system administrator in the rich client.
Duties
Duties are a group of related privileges required to perform a task.
Conversion cycle
Cost accounting cycle
Expenditure cycle
Human capital management cycle
Information technology cycle
Revenue cycle
Process cycles are used in the rich client to make it easier for a system
administrator to view and find related duties when setting up security.
Roles
Roles are a group of duties that are required by an end-user to do his or her job
based on the end-user's role in the organization.
Roles can be organized into a role hierarchy. Roles can contain sub-roles and
inherit the permissions from the sub-role. For example, the accounting manager
role could be defined as a combination of the manager role and the accountant
role. A role hierarchy reduces the need for duplicating security access that makes
access change management simpler.
4-4
Chapter 4: Security
A user is assigned multiple roles. An internal user is assigned the following two
roles in addition to functional roles:
4-5
Development I in Microsoft Dynamics AX 2012
The Security roles form available in the rich client displays all roles defined in
the application and the duties associated with each role.
This form can be accessed from System Administration > Setup > Security >
Security roles.
Roles and associated duties can also be viewed in the security node in the AOT.
All existing Roles are listed in the left pane of the form.
The AOT name for the selected role is displayed at the top center of
the form together with the name and description. The AOT name is
the object name displayed in the AOT.
The Role content pane in the bottom center of the form displays the
duties that are associated with the selected role.
The FactBox pane contains three FactBoxes that contain related
information.
o Roles with selected duty display other roles that contain the
duty currently selected in the Role content pane.
o Privileges in selected role displays a list of privileges associated
with the selected role.
o Users with selected role displays a list of all users assigned the
selected role.
4-6
Chapter 4: Security
4-7
Development I in Microsoft Dynamics AX 2012
NOTE: You might need to refresh elements in the AOT so that the changes made
in the rich client are visible. In the developer workspace, navigate to
Tools menu > Caches > Refresh Elements.
Duties can be added or removed from a role in the Security roles form available
in the rich client.
This form can be accessed from System Administration > Setup > Security >
Security roles.
Duties assigned to a role can also be edited in the security node of the AOT.
4-8
Chapter 4: Security
NOTE: You might need to refresh elements in the AOT so the changes made in
the rich client are visible. In the developer workspace, navigate to Tools menu >
Caches > Refresh Elements.
The Security privileges form available in the rich client displays all duties
defined in the application and the privileges associated with each duty. Duties are
grouped by process cycle. Privileges cannot be added to a duty from here.
This form can be accessed from System Administration > Setup > Security >
Security privileges.
4-9
Development I in Microsoft Dynamics AX 2012
Both duties and privileges can be viewed in this form. When a duty is selected,
the form includes the following information:
All existing Duties are listed in the left pane of the form. Duties are
grouped by Process cycle.
The AOT name for the selected duty is displayed at the top center of
the form together with the name and description. The AOT name is
the object name displayed in the AOT.
The Privileges pane in the bottom center of the form displays the
privileges that are associated with the selected duty.
The FactBox pane contains three FactBoxes that display related
information.
o Roles with selected duty display other roles containing the duty
that is currently selected.
o Privileges with selected permission(s) is only used when this
form is used to view a privilege.
o Users' assistance hint provides help for a system administrator
editing security from this form.
4-10
Chapter 4: Security
The AOT name for the selected privilege is displayed at the top
center of the form together with the name and description. The AOT
name is the object name displayed in the AOT.
The Permission pane in the bottom center of the form displays the
permissions that are associated with the selected privilege.
The FactBox pane contains three FactBoxes that display related
information.
o Roles with selected duty display other roles that contain the
duty that is currently selected.
o Privileges with selected permission(s) displays a list of
privileges associated with the selected role.
o Users' assistance hint provides help for a system administrator
editing security from this form.
4-11
Development I in Microsoft Dynamics AX 2012
Menu items and web content items can be dragged-and-dropped onto the entry
point node on a privilege in the AOT. The permission level is set on the
properties.
Investigate Access
Auditing security can be a difficult task. Security tools are provided to assist in
this process.
The security roles and security privilege forms in the rich client provide
FactBoxes that give further information about the relationships between
permissions, privileges, duties and roles.
Tools are also available within the AOT to view from a menu item, all related
security roles and objects. This is useful if you need to know all users who have
access to a particular form, report or action.
4-12
Chapter 4: Security
4-13
Development I in Microsoft Dynamics AX 2012
June Low is employed in the new role of veterinary receptionist. June will be
receiving patients at the front desk and will need access to maintain customer
information and pet information. She will also need to view breeds and species.
Chris, the IT Engineer, needs to create a new role for the veterinary receptionist
and add duties so that she can access these areas of the application. June is
already created in Microsoft Dynamics AX and is assigned the system user and
employee roles. Chris needs to assign her the new role.
Challenge Yourself!
Create a new a new role and assign it to June with the following duties:
Maintain customers
Maintain pets
Maintain pets
View pet types
Step by Step
4-14
Chapter 4: Security
4-15
Development I in Microsoft Dynamics AX 2012
Summary
This course showed how to set up a new user, assign a user to a role, change
duties on a role, change privileges on a duty and assign permissions to a
privilege.
4-16
Chapter 4: Security
2. What are the base roles which every internal employee should be assigned?
(Select all that apply)
( ) System administrator
( ) System user
( ) Employee
( ) Vendor
4-17
Development I in Microsoft Dynamics AX 2012
1.
2.
3.
4-18
Chapter 4: Security
Solutions
Test Your Knowledge
1. Match the following item with the correct description:
2. What are the base roles which every internal employee should be assigned?
(Select all that apply)
( ) System administrator
() System user
() Employee
( ) Vendor
4-19
Development I in Microsoft Dynamics AX 2012
4-20