Role Based Security in Dynamics AX 2012
Posted on: October 29, 2014 | By: Jarrod Kraemer | Microsoft Dynamics AX/365
When discussing online security and privacy the first thing that races to peoples’ minds are the cyber-attacks that have occurred at Target, Yahoo, and other companies. These attacks have made companies audit their organization wide security processes, and evaluate how a breach can affect their everyday operations. ERP security is no different. ERP security used to be a way that organizations would split up a business process into different functional roles. With the sophistication of ERP systems, and their integrations with web based applications, user security has taken on a whole new meaning especially in today’s smartphone and tablet environment.
Security in 2012 has been improved compared to previous versions of AX. There are now out of the box roles, and within each role is role based access. These roles have predefined, albeit, basic business duties that sync with the users that are outfitted with the role. The role concept will be explained later in this post, but a nice feature is that they can be applied across all companies within AX, which reduces setup time for the security admin.
A security role houses all of the duties and privileges that an administrator assigns to a user. The role that gets created can then be added to as many users as the administrator wants to. This consolidates security information for particular users in a company who have the same job description. Assigning them a role is much easier then assigning duties and privileges using an a la carte option every time a user is added. If a user makes a request for a privilege or a duty, the administrator will be able to grant that without compromising the entire role. Some examples of roles would be a purchasing manager, staff accountant, warehouse worker, etc.
Microsoft defines a duty as a group of related privileges that provide a user with access to a specific business function.
Microsoft defines a privilege as a group of permissions.
Out of the box role based security makes managing your organization’s security at an enterprise level much easier. Modifying these roles will require some work, but the predefined setup reduces some of the guesswork with privileges and duties.
For additional information please feel free to reach out to us at firstname.lastname@example.org or (312) 345-8817.
All the best!
25 Brilliant Ideas to Outsmart Your Competition with Microsoft Dynamics
Top 10 Inventory & Operations Decisions Distributors Are Making Blind
2020 Nucleus Research Report on ERP Technology