2.9 Implement role-based security in F&O apps Flashcards
How does security work in F&O?
Access is not granted to individual users, but to security roles to which the users are assigned
A user who has a role, has access to a set of privileges that are associated with that role
What can roles contain?
Privileges
Permissions
Duties
Permissions?
Access to individual securable objects, such as menu items and tables
Privileges?
Composed of permissions, represent tasks, such as generating a sales order
Privileges give the user access to perform a specific action
Duties?
Composed of privileges and represent parts of a business process, such as maintaining vendor information
Permission policies?
Are used in role-based security to grant access to users for specific purposes
What is used to assign data security policies to security rikes?
Extensible Data Security (XDS) framework
Extensible Data Security definition?
Evolution of record-level security (RLS) that was available in AX 2012.
Allows you and the admins of your org to help secure data in shared tables in such a way that users will have access to the part of the table that is allowed by the enforced policy
Flow of XDS?
- Start with query to define the ranges that should be placed on tables
- Create security policy that links to the query and primary table for which you want to restrict data access
- Define the context for the rule.
- Define the list of constrained tables, which are related tables that store data from the primary tables
Where are users assigned to security roles in front-end?
Security administration -> Security -> Security configuration