Contact us

Security Engineering

Are you looking for help to secure specific data in MS Dynamics AX? Is the standard Role-Based Security model not suitable for your business? Do you want to use organisation-specific Record-Level Security (XDS) in your ERP?

Implementing Extensible Data Security (XDS) framework

To improve data security, the Extensible Data Security (XDS) framework introduced by Microsoft in MS Dynamics AX 2012 adds an additional layer to Role-Based Security. Previous MS Dynamics AX versions used Record-Level Security for that purpose. XDS brought new possibilities for context-dependent data security by restricting data retrieval with customisable criteria. Simple examples include:

  • Project assistants can be restricted to only retrieving data for projects they are working on.
  • Sales clerks can be restricted to viewing defined list of prospects and customers.

Although these features may be essential for the business, setting up XDS in your MS Dynamics AX application can be challenging. It requires deep MS Dynamics AX technical knowledge, understanding of the functional side of related processes, and the ability to carry out impact analysis, including process, validity and performance.

GO-ERP Dynamics AX security experts can help you analyse, design and implement your data security model.

Customising Role-Based Security

However, companies frequently find that out of the box security roles do not match specific business needs. This may be due to new custom processes, or because real business roles are more segmented than the default roles in the system. Customising security roles can be complex and time consuming, and any mistakes can have damaging consequences for the business.

Security customisation in MS Dynamics AX requires special skills and experience. GO-ERP experts can help you secure your ERP in the way that is most suitable for your business.

Role-Based Security

MS Dynamics AX uses a Role-Based Security process for all application features. In Role-Based Security, access is only granted to security roles, not to individual users. A user who is assigned to a security role has access to the set of privileges associated with that role. A user who is not assigned to any role has no privileges.

In Microsoft Dynamics AX, Role-Based Security is aligned with the structure of the business. Users are assigned to security roles based on their responsibilities in the organisation and their participation in business processes. The administrator grants access to the duties that users in a role perform, not to the program elements that users must use.

Because rules can be set up for automatic role assignment, the administrator does not have to be involved every time a user's responsibilities change. After security roles and rules have been set up, business managers can control day-to-day user access based on business data.