Armanino Blog
Article

Security in Microsoft AX 2012 - What Access Does The User Need?

by Jeffrey Russell
June 14, 2013

Security seems to always be a hot-potato topic so today I'll be writing about taking advantage of the security development tool in AX2012.

The menu path to access the tool is System administration > Setup > Security > Security entry point permissions:

Security 1

There are a myriad of powerful different techniques to leverage this tool. The three (3) I intend to focus on for this brief update are as follows:

  1. Identify a security role's current access level for a particular menu item.
  2. Identify security duty(ies) or security privilege(s) for a particular menu item, form, or element within a form.
  3. Viewing permissions associated to an executed task.

1) Identify Access Level

Identify a security role's current access level for a particular menu item, form, or element within a form.

  1. Select the relevant security role
  2. Navigate to the menu item using the tree
  3. The grid will automatically take you to the appropriate entry point name where you can view the "access level."
  4. If interested in a submenu item, right click on menu item and click on "Discover submenu items"
  5. The tree will expand to include the submenu items
  6. "Access level" can be viewed accordingly by submenu item
  7. Security 2 Security 3 Security 4

2) Identify Security Duties and Privileges

Identify security duty(ies) or security privilege(s) for a particular menu item, form, or element within a form.

  1. Select the appropriate roll for the permissions you wish to investigate and/or update
  2. Right click on the menu item within the tree
  3. Select "Reference Duty" or "Reference Privilege" to view all duties and privileges granting access to the item
  4. Review all available duties/privileges and the associated "Access level"
  5. Click "Add to role" if you wish to apply the duty/privilege to the role
  6. Security 5

3) Task Permissions

Viewing permissions associated to an executed task:

  1. Select the appropriate role
  2. Click "Start recording." Then navigate to any form in AX and execute any desired function
  3. Click "Stop recording"
  4. The grid will automatically update to list all the relevant entry points for which access is required to execute the recorded task. Note: in the example here the recorded task was navigation to the general ledger module and opening of the "Main accounts" list page under Common.
  5. Security 6

Hopefully you will be able to leverage these tips to help answer the question, "What access does the user need?" Such questions will inevitably be awaiting each of you in the projects ahead.

Additional features exist within this tool to further leverage configuration and update changes to the security roles, privileges, and duties in AX. Nonetheless, the aforementioned features will give you the information you need to hone and tweak security to the client's content.

Stay In Touch

Sign up to stay up-to-date with the latest accounting regulations, best practices, industry news and technology insights to run your business.

Authors
Resources
Related News & Insights
Stress-Free 1099 Filing for 2025: What You Need to Know
Webinar
Don't let year-end stress catch you off guard.

November 21, 2024 | 12:00 PM - 01:00 PM PT
Overview of Sage Intacct Real Estate
Webinar
Get an inside look at Sage’s platform built for the real estate industry.

October 16, 2024 | 10:00 AM - 11:00 AM PT
Mastering FP&A for Modern Enterprise
Webinar
Transform Your FP&A Approach to Drive Efficiency and Strategic Impact

October 10, 2024 | 12:30 PM - 01:00 PM PT