Book Image

Mastering Microsoft Dynamics NAV 2016

By : Rabindra Sah
Book Image

Mastering Microsoft Dynamics NAV 2016

By: Rabindra Sah

Overview of this book

The book begins by giving you a brief introduction to setting up your NAV environment and shows you how to install and configure it according to your requirements. You will then dive deep into the latest design patterns, network architecture, and topologies. We will show you how you can integrate NAV with the Microsoft platform, and secure your deployment by managing roles and permissions. Moving on, we will explain how to monitor and manage server instances using the Administration tool. We’ll discuss how you can take advantage of the expanded extensibility and connectivity capabilities for a tighter integration with the cloud as well as handheld devices. Then, we’ll show you how you can make use of the PowerBI capabilities that have been built into Dynamics NAV. By the end of the book, you will be confident in developing and administering a Dynamics NAV implementation that will leverage all of the new features.
Table of Contents (19 chapters)
Mastering Microsoft Dynamics NAV 2016
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Cryptography and certificates


Cryptography is a technique for secure communication in the presence of third parties called adversaries. An adversary is an entity which is generally malicious in nature, and aims to steal or damage secret data being communicated through a public channel. The theft might be in the form of corrupting data, spoofing the identity of the sender and receiver, disrupting the sending process, injecting their logic into the communicating process, and so on. We can use cryptography in order to achieve a secure communication experience, as shown in the following figure. Here, the sender encrypts the plain text message using the recipient's public key, and then forwards the message to the unsecure channel. On the arrival of the encrypted data, the recipient decrypts the data using its private key.

This is also the basis of cryptography, which is widely used in the modern data transportation system:

Note

A key is a piece of information that is generated by the cryptographic...