Book Image

Mastering Microsoft Dynamics NAV 2016

By : Rabindra Sah
Book Image

Mastering Microsoft Dynamics NAV 2016

By: Rabindra Sah

Overview of this book

The book begins by giving you a brief introduction to setting up your NAV environment and shows you how to install and configure it according to your requirements. You will then dive deep into the latest design patterns, network architecture, and topologies. We will show you how you can integrate NAV with the Microsoft platform, and secure your deployment by managing roles and permissions. Moving on, we will explain how to monitor and manage server instances using the Administration tool. We’ll discuss how you can take advantage of the expanded extensibility and connectivity capabilities for a tighter integration with the cloud as well as handheld devices. Then, we’ll show you how you can make use of the PowerBI capabilities that have been built into Dynamics NAV. By the end of the book, you will be confident in developing and administering a Dynamics NAV implementation that will leverage all of the new features.
Table of Contents (19 chapters)
Mastering Microsoft Dynamics NAV 2016
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Security policy


A security policy is a statement that partitions the states of a system into a set of authorized and a set of unauthorized states, that is, the state of secure states or non-secure states.

Let us take an example of three states during the permission granting process for posting a document inside the Microsoft Dynamics NAV system, where state 1 (S1) and state 2 (S2) are secure states, whereas state 3 (S3) is an unsecure state. This is depicted in the following diagram:

Secure and non-secure state example in Microsoft Dynamics NAV

In Microsoft Dynamics NAV, let us assume a condition where, for a posting process, a process requires permission to write data to a particular table. In this particular instance, NAV uses the setup table design pattern, where it first reads the data field in the permission table, which is based on the security policy. From the permission table, the system grants permission, and then the process completes the posting process. So here, the system refers...