Book Image

Microsoft Dynamics AX 2012 R3 Security

By : Ahmed Mohamed Rafik Moustafa
Book Image

Microsoft Dynamics AX 2012 R3 Security

By: Ahmed Mohamed Rafik Moustafa

Overview of this book

Table of Contents (12 chapters)

The main concepts of XDS policies


When developing an XDS policy, you need to be familiar with the following concepts:

Concept

Description

Constrained tables

A constrained table is the table or tables in a given security policy from which data is filtered or secured, based on the associated policy query.

Primary tables

A primary table is used to secure the content of the related constrained table.

Policy queries

A policy query is used to secure the constrained tables specified in a given extensible data security policy.

Policy context

A policy context is a piece of information that controls the circumstances under which a given policy is considered to be applicable. If this context is not set, then the policy, even if enabled, is not enforced.

After understanding the previous concepts of XDS, we move on to the four steps to develop an XDS policy, and they are as follows:

  1. Design the query on the primary tables.

  2. Develop the policy.

  3. Add the constrained tables and views.

  4. Set up the policy...