0% found this document useful (0 votes)
58 views11 pages

2 Control Technical Efforts - V1 - Revised

The document describes the tasks needed to extract security configuration data from Microsoft Dynamics AX2012. It involves adding additional fields to 11 different security tables to capture details about users, roles, tasks, and their relationships. Implementing the data extraction and testing is estimated to take 160 hours. Key tables that will have additional fields added include UserInfo, SecurityUserRole, SecurityTask, and SecurityRole.

Uploaded by

nitish dikshit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views11 pages

2 Control Technical Efforts - V1 - Revised

The document describes the tasks needed to extract security configuration data from Microsoft Dynamics AX2012. It involves adding additional fields to 11 different security tables to capture details about users, roles, tasks, and their relationships. Implementing the data extraction and testing is estimated to take 160 hours. Key tables that will have additional fields added include UserInfo, SecurityUserRole, SecurityTask, and SecurityRole.

Uploaded by

nitish dikshit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Task

2 Control AX2012 -Endpoint

2 Control AX2012 -Endpoint

2 Control AX2012 -Endpoint

2 Control AX2012 -Endpoint


2 Control AX2012 -Endpoint

2 Control AX2012 -Endpoint

2 Control AX2012 -Endpoint

2 Control AX2012 -Endpoint

2 Control AX2012 -Endpoint


2 Control AX2012 -Endpoint

2 Control AX2012 -Endpoint


2 Control AX2012 -Endpoint
Description

1. DataArea
- Id = ID of comp
- Name
- timeZone
- idVirtual

2. UserInfo
Direct
Company = default company
Add fields:
- RecId
- accountType
- Enabled / disabled
- External user

3. SecurityUserRole
Add fields
- RecId
- User
- AssignmentMode
- AssignmentStatus
- dataAreaId
- relationType--this field is for internal use in AX for inheritance of table, not required from security point of view
- SecurityRole
- sequenceNum
- TableId

4. SecurityTask
Add fields
-RecID
-Type (privilege or duty or processCycle)
-AotName
-Name
-Description
-dataAreaId
-IsEnabled
-IsPermissionSet (read, write, etc)
-relationType --> this field is for internal use in AX for inheritance of table, not required from security point of view
-TableId
5. SecurityRole
Add fields
- RecID
- AotName
- Name
- Description
- IsEnabled
- relationType --> this field is for internal use in AX for inheritance of table, not required from security point of view
- TableId
- AllowCurrentRecords
- AllowFutureRecords
- AllowPastRecords

6. SecuritySubRole
Add fields
- Recid
- SecurityRole
- SecuritySubRole
- ValidFrom
- ValidTo
- relationType -->this field is for internal use in AX for inheritance of table, not required from security point of view
- TableId

7. SecuritySubTask
Add fields
- Recid
- SecurityTask
- SecuritySubTask
- ValidFrom
- ValidTo
- relationType -->this field is for internal use in AX for inheritance of table, not required from security point of view
- TableId

8. SecurityRoleTaskGrant
Securityroletaskgrant table
Add fields:
- RecId
- SecurityRole
- SecurityTask
- relationType-->this field is for internal use in AX for inheritance of table, not required from security point of view
- TableID

9. Table
Add fields:
- TableId
- Name
- From sqlDictionary where fieldId = 0
10. SecurityTaskEntryPoint
Add fields
- RecID
- EntryPoint --> SecurableObject.Recid
- SecurityTask
- PermissionGroup
- ValidFrom
- ValidTo

11. SecurableObject
Add fields
- RecId
- Name
- Type
Configuartion , deployment of endpoints and testing
Efforts in hrs

2
2

3
3

2
10
Task Description
2 Control D365 FO Companies
2 Control D365 FO Companies per user
2 Control D365 FO Security roles per User
2 Control D365 FO Duties per security role
2 Control D365 FO Privileges per security role
2 Control D365 FO Privileges per Duty
2 Control D365 FO Record Level Security
Efforts in hrs Remarks
16 using custom web services
24 using custom web services
24 using custom web services
32 using custom web services
32 using custom web services
24 using custom web services
Not included in D365 FO

You might also like