You are previewing Microsoft Dynamics AX 2012 Security How-To.
O'Reilly logo
Microsoft Dynamics AX 2012 Security How-To

Book Description

Secure your Dynamics AX 2012 environment with simple practical steps

  • Get to grips with security concepts for securing your Dynamics AX environment successfully

  • Learn to Import users from active directory

  • Master the way to create Claim User

  • Assign users to security roles

  • In Detail

    Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal control and auditing procedures, but also to protect your entire system against outsiders or unauthorized users. It's the time to secure your ERP system.

    "Microsoft Dynamics AX 2012 Security - How to" is a practical, hands-on guide that provides you with a clear step-by-step exercise, which will help you, achieve the practical experience to implement the new security features within MS Dynamics AX 2012.

    This book is divided into three chapters, the first chapter talking about the security architect of Dynamics AX, second chapter considered as the foundation level security, and the last chapter shows the advanced level security.

    You will learn how to assign users to security roles and vice-versa, you will also take a look at adding security role, as well as how to add privileges to an existing role, create permissions using AOT and securing your organization model. If you want to take the advantage of the new security features of MS Dynamics AX2012, then this is the book for you.

    You will have the practical experience of the main security features in Microsoft Dynamics AX 2012 by following the guide steps and the full-receipts in a fast and easy way.

    Table of Contents

    1. Microsoft Dynamics AX 2012 Security How-To
      1. Microsoft Dynamics AX 2012 Security How-To
      2. Credits
      3. About the Author
      4. About the Reviewers
      5. www.PacktPub.com
        1. Support files, eBooks, discount offers and more
          1. Why Subscribe?
          2. Free Access for Packt account holders
          3. Instant Updates on New Packt Books
      6. Preface
        1. What this book covers
        2. What you need for this book
        3. Who this book is for
        4. Conventions
        5. Reader feedback
        6. Customer support
          1. Downloading the example code
          2. Errata
          3. Piracy
      7. 1. Microsoft Dynamics AX 2012 Security How-To
        1. Security architecture in Dynamics products
          1. Securing the business processes
        2. Application security fundamentals
          1. Microsoft Dynamics AX server security
          2. Microsoft Dynamics AX client security
        3. AX 2012 security framework
          1. Role-based security
          2. Extensible data security framework
          3. Server enforcement of security
          4. Custom authentication
            1. Pluggable authentication
        4. Creating a new user (Must know)
          1. Getting ready
          2. How to do it...
          3. How it works...
        5. Importing users from Active Directory
          1. How to do it...
          2. How it works...
        6. Creating a claim user (Should know)
          1. How to do it...
          2. How it works...
        7. Setting up user (Should know)
          1. Getting ready
          2. How to do it...
          3. How it works...
        8. Setting up user options (Should know)
          1. How to do it...
          2. How it works...
        9. Setting up user relations (Should know)
          1. How to do it...
          2. How it works...
        10. Adding a user to a predefined profile (Should know)
          1. How to do it...
          2. How it works...
        11. Granting a user access to a specific company (Must know)
          1. How to do it...
          2. How it works...
        12. Tracking user-related information (Must know)
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
            1. Viewing the user's online time
        13. Assigning users to different roles (Must know)
          1. Getting ready
          2. How to do it...
          3. How it works...
        14. Adding users to the different roles (Should know)
          1. How to do it...
          2. How it works...
        15. Adding a security role (Become an expert)
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        16. Adding privileges to an existing role (Become an expert)
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        17. Securing the Organization Model (Become an expert)
          1. Getting ready
          2. How to do it...
          3. How it works...
        18. Developing an extensible data security policy (Become an expert)
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...
        19. Deploying changes in Enterprise Portal using AOT (Become an expert)
          1. Getting ready
          2. How to do it...
          3. How it works...
        20. Creating permissions in AOT (Become an expert)
          1. Getting ready
          2. How to do it...
          3. How it works...
          4. There's more...