configuration and security keys in ax
configuration and security keys in ax
Tables
Views
Menus
Menu items
Form controls
Report controls
1. Expand the Data Dictionary node in the Application Object Tree (AOT).
2. Right-click the Security Keys node, and then select New Security Key.
3. Right-click the security key object, and then click Properties.
4. Rename the security key by modifying the Name property.
5. Right-click the object, and then click Create from the shortcut menu.
6. Right-click the object, and then click Save from the shortcut menu.
7. Right-click the object again, and then click Check In. This opens the Check in form.
Property Rules
ID Always ship a security key with the same ID as it has been shipped with
before.
If you try to create a new security key with an ID that has already been
used for a security key in Microsoft Dynamics AX, an error will occur.
Name One of the nine security keys on a branch (the parent) should take the
name of the module. For example, BOM. The other keys (up to eight more
on a branch) should have the name of the module followed by one of the
following suffixes: Daily, Journals, Inquiries, Reports, Periodic, Setup, Misc,
or Tables. For example, BOMReports, BOMSetup, and LedgerPeriodic.
Enterprise Portal keys should have a prefix of EP followed by the name of
the role. For example, EPAdmin and EPConsultant. Additional security keys
for the role should take one of these suffixes: Misc, Info, Report, or Task.
For example, EPAdminInfo and EPConsultantTask.
Application Integration Framework (AIF) keys should be the same as the
name used for the service. The format is the module that the service is
contained in, the document name, followed by Service. For example, in
the Sales module, SalesSalesOrderService.
If you attempt to create a security key with a name that has already been
used for a security key in Microsoft Dynamics AX, an error will occur.
Configuration Keys
Configuration keys should be defined so that the installation can be set up with only the
features needed for each particular installation. By disabling configuration keys,
administrators can reduce the potential surface of attack, thereby helping to increase the
security of their Microsoft Dynamics AX installation.
Configuration keys allow administrators to enable or disable features in the application
for all users. Disabling features helps to minimize the attack surface against potential
attacks.
Applying Configuration Keys
Tables
Fields
Indexes
Views
Menus
Menu items
Form controls,
Report controls
Extended data types
Enumerations
Configuration keys are applied by setting the ConfigurationKey property on these objects
in the Application Object Tree (AOT).
Creating Configuration Keys