2.9 Implement role-based security in F&O apps Flashcards

1
Q

How does security work in F&O?

A

Access is not granted to individual users, but to security roles to which the users are assigned
A user who has a role, has access to a set of privileges that are associated with that role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can roles contain?

A

Privileges
Permissions
Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Permissions?

A

Access to individual securable objects, such as menu items and tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Privileges?

A

Composed of permissions, represent tasks, such as generating a sales order
Privileges give the user access to perform a specific action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Duties?

A

Composed of privileges and represent parts of a business process, such as maintaining vendor information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permission policies?

A

Are used in role-based security to grant access to users for specific purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is used to assign data security policies to security rikes?

A

Extensible Data Security (XDS) framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extensible Data Security definition?

A

Evolution of record-level security (RLS) that was available in AX 2012.
Allows you and the admins of your org to help secure data in shared tables in such a way that users will have access to the part of the table that is allowed by the enforced policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Flow of XDS?

A
  1. Start with query to define the ranges that should be placed on tables
  2. Create security policy that links to the query and primary table for which you want to restrict data access
  3. Define the context for the rule.
  4. Define the list of constrained tables, which are related tables that store data from the primary tables
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where are users assigned to security roles in front-end?

A

Security administration -> Security -> Security configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly