Amazon cover image
Image from Amazon.com

Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / Ahmed Mohamed Rafik Moustafa.

By: Material type: TextTextSeries: Professional expertise distilledPublisher: Birmingham, UK : Packt Publishing, 2015Description: 1 online resource (1 volume) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1782175547
  • 1782175539
  • 9781782175537
  • 9781782175544
Other title:
  • Quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations
Subject(s): Genre/Form: Additional physical formats: Print version:: Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations.DDC classification:
  • 658.70285
LOC classification:
  • T58.6
Online resources:
Contents:
Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: MorphX Security System -- Introducing the MorphX development tool -- Application Object Tree -- The X++ code editor -- Compiler -- Debugger -- Projects -- The property sheet -- The cross-reference tool -- The Find tool -- The table browser tool -- The best practice tool -- The reverse engineering tool -- Developing a security artifact using AOT -- Setting permissions for a form -- Assigning permissions to privileges -- Validating and testing a security privilege -- Applying a configuration key -- Summary -- Chapter 2: Security Coding -- The fundamentals of security coding using X++ -- Using Code Access Security -- Securing an API on the AOS -- Security debugging -- Installing the debugger -- Enabling the debugger -- Adding users to the Debugging User local group -- The debugger user interface -- Debugger shortcut keys -- Security for the display and edit methods -- The Table Permissions Framework -- Summary -- Chapter 3: Developing Extensible Data Security -- The main concepts of XDS policies -- Designing and developing the XDS policy -- Creating the policy -- Adding constrained tables and views -- Setting the XDS policy context -- Debugging XDS policies -- Summary -- Chapter 4: Extending the Organization Model -- The organizational model framework -- Organization hierarchies -- The organizational model scenarios -- Integration with other frameworks' application modules -- Custom modeling scenarios -- Extending the organizational model -- Creating a custom type of operating unit -- Creating a new base enum value -- Creating a view -- Creating a menu item -- Extending the hierarchy designer -- Summary -- Chapter 5: Enterprise Portal Security -- The architecture of Enterprise Portal -- Web parts -- AOT elements.
Datasets -- Controls -- Security in Enterprise Portal -- Securing web elements -- Record context and encryption -- Data access security -- Report access security -- Assigning a user to the DynamicsAXBrowser role -- Granting a user access permission to view reports -- Summary -- Index.
Summary: If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Online resource; title from cover (Safari, viewed July 6, 2015).

Includes index.

Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: MorphX Security System -- Introducing the MorphX development tool -- Application Object Tree -- The X++ code editor -- Compiler -- Debugger -- Projects -- The property sheet -- The cross-reference tool -- The Find tool -- The table browser tool -- The best practice tool -- The reverse engineering tool -- Developing a security artifact using AOT -- Setting permissions for a form -- Assigning permissions to privileges -- Validating and testing a security privilege -- Applying a configuration key -- Summary -- Chapter 2: Security Coding -- The fundamentals of security coding using X++ -- Using Code Access Security -- Securing an API on the AOS -- Security debugging -- Installing the debugger -- Enabling the debugger -- Adding users to the Debugging User local group -- The debugger user interface -- Debugger shortcut keys -- Security for the display and edit methods -- The Table Permissions Framework -- Summary -- Chapter 3: Developing Extensible Data Security -- The main concepts of XDS policies -- Designing and developing the XDS policy -- Creating the policy -- Adding constrained tables and views -- Setting the XDS policy context -- Debugging XDS policies -- Summary -- Chapter 4: Extending the Organization Model -- The organizational model framework -- Organization hierarchies -- The organizational model scenarios -- Integration with other frameworks' application modules -- Custom modeling scenarios -- Extending the organizational model -- Creating a custom type of operating unit -- Creating a new base enum value -- Creating a view -- Creating a menu item -- Extending the hierarchy designer -- Summary -- Chapter 5: Enterprise Portal Security -- The architecture of Enterprise Portal -- Web parts -- AOT elements.

Datasets -- Controls -- Security in Enterprise Portal -- Securing web elements -- Record context and encryption -- Data access security -- Report access security -- Assigning a user to the DynamicsAXBrowser role -- Granting a user access permission to view reports -- Summary -- Index.

If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX.

Added to collection customer.56279.3

Powered by Koha