Role-based Security Use Patterns for Developers [AX 2012]
Updated: May 28, 2013
This white paper describes how the role-based security artifacts work together. It explains to Microsoft Dynamics AX developers how the security artifacts should be configured when they are applied to various programming objects in the AOT. The challenges of under-permissioning, over-permissioning, and practical ease of use guide this discussion.
Announcements: To see known issues and recent fixes, use Issue search in Microsoft Dynamics Lifecycle Services (LCS).
Community Additions
Show: