Armanino Blog
Article

Security in Microsoft AX 2012 - What Access Does The User Need?

by Jeffrey Russell
June 14, 2013

Security seems to always be a hot-potato topic so today I'll be writing about taking advantage of the security development tool in AX2012.

The menu path to access the tool is System administration > Setup > Security > Security entry point permissions:

Security 1

There are a myriad of powerful different techniques to leverage this tool. The three (3) I intend to focus on for this brief update are as follows:

  1. Identify a security role's current access level for a particular menu item.
  2. Identify security duty(ies) or security privilege(s) for a particular menu item, form, or element within a form.
  3. Viewing permissions associated to an executed task.

1) Identify Access Level

Identify a security role's current access level for a particular menu item, form, or element within a form.

  1. Select the relevant security role
  2. Navigate to the menu item using the tree
  3. The grid will automatically take you to the appropriate entry point name where you can view the "access level."
  4. If interested in a submenu item, right click on menu item and click on "Discover submenu items"
  5. The tree will expand to include the submenu items
  6. "Access level" can be viewed accordingly by submenu item
  7. Security 2 Security 3 Security 4

2) Identify Security Duties and Privileges

Identify security duty(ies) or security privilege(s) for a particular menu item, form, or element within a form.

  1. Select the appropriate roll for the permissions you wish to investigate and/or update
  2. Right click on the menu item within the tree
  3. Select "Reference Duty" or "Reference Privilege" to view all duties and privileges granting access to the item
  4. Review all available duties/privileges and the associated "Access level"
  5. Click "Add to role" if you wish to apply the duty/privilege to the role
  6. Security 5

3) Task Permissions

Viewing permissions associated to an executed task:

  1. Select the appropriate role
  2. Click "Start recording." Then navigate to any form in AX and execute any desired function
  3. Click "Stop recording"
  4. The grid will automatically update to list all the relevant entry points for which access is required to execute the recorded task. Note: in the example here the recorded task was navigation to the general ledger module and opening of the "Main accounts" list page under Common.
  5. Security 6

Hopefully you will be able to leverage these tips to help answer the question, "What access does the user need?" Such questions will inevitably be awaiting each of you in the projects ahead.

Additional features exist within this tool to further leverage configuration and update changes to the security roles, privileges, and duties in AX. Nonetheless, the aforementioned features will give you the information you need to hone and tweak security to the client's content.

Stay In Touch

Sign up to stay up-to-date with the latest accounting regulations, best practices, industry news and technology insights to run your business.

Authors
Resources
Related News & Insights
Fireside Chat: Access to Top-Tier Talent Through Outsourcing
Webinar
The Crucial Role of Internal Communications in Driving Engagement

April 30, 2024 | 10:00 AM - 11:00 AM PT
5 Signs Your Business Has Outgrown its Legacy Accounting System
Webinar
Don't Let Your Legacy System Limit Your Potential

April 24, 2024 | 10:00 AM - 10:45 AM PT
New California Employment Laws for 2023 and What You Can Do to Be Compliant
Article
Employers need to know how these laws affect paid sick leave, wages and salaries, cannabis use and more.

April 18, 2024