Description |
1 online resource (1 volume) : illustrations. |
|
text file |
Series |
Professional expertise distilled
|
|
Professional expertise distilled.
|
Note |
Includes index. |
Contents |
Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: MorphX Security System -- Introducing the MorphX development tool -- Application Object Tree -- The X++ code editor -- Compiler -- Debugger -- Projects -- The property sheet -- The cross-reference tool -- The Find tool -- The table browser tool -- The best practice tool -- The reverse engineering tool -- Developing a security artifact using AOT -- Setting permissions for a form -- Assigning permissions to privileges -- Validating and testing a security privilege -- Applying a configuration key -- Summary -- Chapter 2: Security Coding -- The fundamentals of security coding using X++ -- Using Code Access Security -- Securing an API on the AOS -- Security debugging -- Installing the debugger -- Enabling the debugger -- Adding users to the Debugging User local group -- The debugger user interface -- Debugger shortcut keys -- Security for the display and edit methods -- The Table Permissions Framework -- Summary -- Chapter 3: Developing Extensible Data Security -- The main concepts of XDS policies -- Designing and developing the XDS policy -- Creating the policy -- Adding constrained tables and views -- Setting the XDS policy context -- Debugging XDS policies -- Summary -- Chapter 4: Extending the Organization Model -- The organizational model framework -- Organization hierarchies -- The organizational model scenarios -- Integration with other frameworks' application modules -- Custom modeling scenarios -- Extending the organizational model -- Creating a custom type of operating unit -- Creating a new base enum value -- Creating a view -- Creating a menu item -- Extending the hierarchy designer -- Summary -- Chapter 5: Enterprise Portal Security -- The architecture of Enterprise Portal -- Web parts -- AOT elements. |
|
Datasets -- Controls -- Security in Enterprise Portal -- Securing web elements -- Record context and encryption -- Data access security -- Report access security -- Assigning a user to the DynamicsAXBrowser role -- Granting a user access permission to view reports -- Summary -- Index. |
Summary |
If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Microsoft Dynamics AX.
|
|
Microsoft Dynamics AX. |
|
Management information systems -- Security measures.
|
|
Management information systems. |
|
Security systems. |
|
Enterprise resource planning -- Software.
|
|
Enterprise resource planning. |
Genre/Form |
Software.
|
Subject |
Business -- Data processing -- Security measures.
|
|
Business -- Data processing -- Security measures. |
Genre/Form |
Electronic books.
|
Added Title |
Quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations |
Other Form: |
Print version: Moustafa, Ahmed Mohamed Rafik. Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations. Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015 viii, 79 pages Professional Expertise Distilled 9781782175537 |
ISBN |
1782175547 |
|
1782175539 |
|
9781782175537 |
|
9781782175544 (electronic book) |
|