Armanino Blog
Article

Security in Microsoft AX 2012 - What Access Does The User Need?

by Jeffrey Russell
June 14, 2013

Security seems to always be a hot-potato topic so today I'll be writing about taking advantage of the security development tool in AX2012.

The menu path to access the tool is System administration > Setup > Security > Security entry point permissions:

Security 1

There are a myriad of powerful different techniques to leverage this tool. The three (3) I intend to focus on for this brief update are as follows:

  1. Identify a security role's current access level for a particular menu item.
  2. Identify security duty(ies) or security privilege(s) for a particular menu item, form, or element within a form.
  3. Viewing permissions associated to an executed task.

1) Identify Access Level

Identify a security role's current access level for a particular menu item, form, or element within a form.

  1. Select the relevant security role
  2. Navigate to the menu item using the tree
  3. The grid will automatically take you to the appropriate entry point name where you can view the "access level."
  4. If interested in a submenu item, right click on menu item and click on "Discover submenu items"
  5. The tree will expand to include the submenu items
  6. "Access level" can be viewed accordingly by submenu item
  7. Security 2 Security 3 Security 4

2) Identify Security Duties and Privileges

Identify security duty(ies) or security privilege(s) for a particular menu item, form, or element within a form.

  1. Select the appropriate roll for the permissions you wish to investigate and/or update
  2. Right click on the menu item within the tree
  3. Select "Reference Duty" or "Reference Privilege" to view all duties and privileges granting access to the item
  4. Review all available duties/privileges and the associated "Access level"
  5. Click "Add to role" if you wish to apply the duty/privilege to the role
  6. Security 5

3) Task Permissions

Viewing permissions associated to an executed task:

  1. Select the appropriate role
  2. Click "Start recording." Then navigate to any form in AX and execute any desired function
  3. Click "Stop recording"
  4. The grid will automatically update to list all the relevant entry points for which access is required to execute the recorded task. Note: in the example here the recorded task was navigation to the general ledger module and opening of the "Main accounts" list page under Common.
  5. Security 6

Hopefully you will be able to leverage these tips to help answer the question, "What access does the user need?" Such questions will inevitably be awaiting each of you in the projects ahead.

Additional features exist within this tool to further leverage configuration and update changes to the security roles, privileges, and duties in AX. Nonetheless, the aforementioned features will give you the information you need to hone and tweak security to the client's content.

Stay In Touch

Sign up to stay up-to-date with the latest accounting regulations, best practices, industry news and technology insights to run your business.

Authors
Resources
Related News & Insights
2024 Digital Marketing Trends – What's Now, What's Next?
Webinar
Stay up to date on the latest trends and strategies in digital marketing.

May 30, 2024 | 11:00 AM - 11:30 AM PT
Risk Mitigation Measures: Navigating Disruption with Confidence
Webinar
Is your business at risk from unseen dangers?

May 29, 2024 | 12:00 PM - 01:00 PM PT
Philanthropy and Athletes: Impact Off the Field
Webinar
How Athletes Can Cement Their Legacy Where It Matters – Their Community

May 22, 2024 | 11:00 AM - 11:30 AM PT