限制安全角色访问特定字段

2024-01-13 15:32

本文主要是介绍限制安全角色访问特定字段,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

针对特定的安全角色限定访问字段可以参考下面的这篇文章。

原文来自: https://dynamicsaxtipoftheday.com/2014/04/15/restrict-field-access-by-security-role/

Restrict Field Access By Security Role


The roles within Dynamics AX are pre-configured to restrict users from accessing areas that they usually don’t need to use, but you don’t have to stop there. You can tweak the security even more by restricting access to the field level data that shows up on the forms through the security role maintenance feature, allowing you to give people read only access, or not even show the field in the case of sensitive information. As an added benefit, if you restrict access this way, then the users will not be able to access the data through the reports, or through the Excel add-in.

If your users are already paranoid that they don’t see all of the data, then redacting access this way may push them over the edge.

How To Do It…

Start off by finding the field that you want to restrict access to. In this case we want to stop particular users from maintaining the VendorsBank Account.

Then find the Role that you want to restrict access through – in this example we are cheating a little and finding theRole through the user account, an then clicking on theEdit Role button within theUser Roles tab.

When the Security Roles maintenance form is displayed, click on theOverride Permissions button within the menu bar.

This will open up the Override Permissions form. To override the permissions on a table, click on theTable/Fieldsnode.

This will open up the Override Permissions form. To override the permissions on a table, click on theTable/Fieldsnode.

This will allow you to browse all of the tables within Dynamics AX. Select the table that you want to restrict access to (in this case theVendTable) and expand it so that you can see all of the fields.

To override the permissions by field, select the parent table and then uncheck theDo Not Override checkbox.

This will allow you to override the general access to the table if you like. In this example though we will leave it with theFull control access level because we want to override the access to an individual field.

Now select the field that you want to restrict access to, and uncheck the Do Not Override checkbox.

Now you can change the access rights to that field by selecting the option from theOverride Access Level dropdown box. You can set it toNo Access,View, orEdit.

Now when the user returns to the form, they are not able to change the field if they belong to that security role.

Access Denied.

这篇关于限制安全角色访问特定字段的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/601940

相关文章

nginx跨域访问配置的几种方法实现

《nginx跨域访问配置的几种方法实现》本文详细介绍了Nginx跨域配置方法,包括基本配置、只允许指定域名、携带Cookie的跨域、动态设置允许的Origin、支持不同路径的跨域控制、静态资源跨域以及... 目录一、基本跨域配置二、只允许指定域名跨域三、完整示例四、配置后重载 nginx五、注意事项六、支持

input的accept属性让文件上传安全高效

《input的accept属性让文件上传安全高效》文章介绍了HTML的input文件上传`accept`属性在文件上传校验中的重要性和优势,通过使用`accept`属性,可以减少前端JavaScrip... 目录前言那个悄悄毁掉你上传体验的“常见写法”改变一切的 html 小特性:accept真正的魔法:让

Redis的安全机制详细介绍及配置方法

《Redis的安全机制详细介绍及配置方法》本文介绍Redis安全机制的配置方法,包括绑定IP地址、设置密码、保护模式、禁用危险命令、防火墙限制、TLS加密、客户端连接限制、最大内存使用和日志审计等,通... 目录1. 绑定 IP 地址2. 设置密码3. 保护模式4. 禁用危险命令5. 通过防火墙限制访问6.

linux ssh如何实现增加访问端口

《linuxssh如何实现增加访问端口》Linux中SSH默认使用22端口,为了增强安全性或满足特定需求,可以通过修改SSH配置来增加或更改SSH访问端口,具体步骤包括修改SSH配置文件、增加或修改... 目录1. 修改 SSH 配置文件2. 增加或修改端口3. 保存并退出编辑器4. 更新防火墙规则使用uf

Java JUC并发集合详解之线程安全容器完全攻略

《JavaJUC并发集合详解之线程安全容器完全攻略》Java通过java.util.concurrent(JUC)包提供了一整套线程安全的并发容器,它们不仅是简单的同步包装,更是基于精妙并发算法构建... 目录一、为什么需要JUC并发集合?二、核心并发集合分类与详解三、选型指南:如何选择合适的并发容器?在多

k8s容器放开锁内存限制问题

《k8s容器放开锁内存限制问题》nccl-test容器运行mpirun时因NCCL_BUFFSIZE过大导致OOM,需通过修改docker服务配置文件,将LimitMEMLOCK设为infinity并... 目录问题问题确认放开容器max locked memory限制总结参考:https://Access

基于Python实现数字限制在指定范围内的五种方式

《基于Python实现数字限制在指定范围内的五种方式》在编程中,数字范围限制是常见需求,无论是游戏开发中的角色属性值、金融计算中的利率调整,还是传感器数据处理中的异常值过滤,都需要将数字控制在合理范围... 目录引言一、基础条件判断法二、数学运算巧解法三、装饰器模式法四、自定义类封装法五、NumPy数组处理

通过配置nginx访问服务器静态资源的过程

《通过配置nginx访问服务器静态资源的过程》文章介绍了图片存储路径设置、Nginx服务器配置及通过http://192.168.206.170:8007/a.png访问图片的方法,涵盖图片管理与服务... 目录1.图片存储路径2.nginx配置3.访问图片方式总结1.图片存储路径2.nginx配置

Linux从文件中提取特定内容的实用技巧分享

《Linux从文件中提取特定内容的实用技巧分享》在日常数据处理和配置文件管理中,我们经常需要从大型文件中提取特定内容,本文介绍的提取特定行技术正是这些高级操作的基础,以提取含有1的简单需求为例,我们可... 目录引言1、方法一:使用 grep 命令1.1 grep 命令基础1.2 命令详解1.3 高级用法2

MySQL 强制使用特定索引的操作

《MySQL强制使用特定索引的操作》MySQL可通过FORCEINDEX、USEINDEX等语法强制查询使用特定索引,但优化器可能不采纳,需结合EXPLAIN分析执行计划,避免性能下降,注意版本差异... 目录1. 使用FORCE INDEX语法2. 使用USE INDEX语法3. 使用IGNORE IND