限制安全角色访问特定字段

2024-01-13 15:32

本文主要是介绍限制安全角色访问特定字段,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

针对特定的安全角色限定访问字段可以参考下面的这篇文章。

原文来自: https://dynamicsaxtipoftheday.com/2014/04/15/restrict-field-access-by-security-role/

Restrict Field Access By Security Role


The roles within Dynamics AX are pre-configured to restrict users from accessing areas that they usually don’t need to use, but you don’t have to stop there. You can tweak the security even more by restricting access to the field level data that shows up on the forms through the security role maintenance feature, allowing you to give people read only access, or not even show the field in the case of sensitive information. As an added benefit, if you restrict access this way, then the users will not be able to access the data through the reports, or through the Excel add-in.

If your users are already paranoid that they don’t see all of the data, then redacting access this way may push them over the edge.

How To Do It…

Start off by finding the field that you want to restrict access to. In this case we want to stop particular users from maintaining the VendorsBank Account.

Then find the Role that you want to restrict access through – in this example we are cheating a little and finding theRole through the user account, an then clicking on theEdit Role button within theUser Roles tab.

When the Security Roles maintenance form is displayed, click on theOverride Permissions button within the menu bar.

This will open up the Override Permissions form. To override the permissions on a table, click on theTable/Fieldsnode.

This will open up the Override Permissions form. To override the permissions on a table, click on theTable/Fieldsnode.

This will allow you to browse all of the tables within Dynamics AX. Select the table that you want to restrict access to (in this case theVendTable) and expand it so that you can see all of the fields.

To override the permissions by field, select the parent table and then uncheck theDo Not Override checkbox.

This will allow you to override the general access to the table if you like. In this example though we will leave it with theFull control access level because we want to override the access to an individual field.

Now select the field that you want to restrict access to, and uncheck the Do Not Override checkbox.

Now you can change the access rights to that field by selecting the option from theOverride Access Level dropdown box. You can set it toNo Access,View, orEdit.

Now when the user returns to the form, they are not able to change the field if they belong to that security role.

Access Denied.

这篇关于限制安全角色访问特定字段的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/601940

相关文章

本地搭建DeepSeek-R1、WebUI的完整过程及访问

《本地搭建DeepSeek-R1、WebUI的完整过程及访问》:本文主要介绍本地搭建DeepSeek-R1、WebUI的完整过程及访问的相关资料,DeepSeek-R1是一个开源的人工智能平台,主... 目录背景       搭建准备基础概念搭建过程访问对话测试总结背景       最近几年,人工智能技术

Ollama整合open-webui的步骤及访问

《Ollama整合open-webui的步骤及访问》:本文主要介绍如何通过源码方式安装OpenWebUI,并详细说明了安装步骤、环境要求以及第一次使用时的账号注册和模型选择过程,需要的朋友可以参考... 目录安装环境要求步骤访问选择PjrIUE模型开始对话总结 安装官方安装地址:https://docs.

解读静态资源访问static-locations和static-path-pattern

《解读静态资源访问static-locations和static-path-pattern》本文主要介绍了SpringBoot中静态资源的配置和访问方式,包括静态资源的默认前缀、默认地址、目录结构、访... 目录静态资源访问static-locations和static-path-pattern静态资源配置

浅析Rust多线程中如何安全的使用变量

《浅析Rust多线程中如何安全的使用变量》这篇文章主要为大家详细介绍了Rust如何在线程的闭包中安全的使用变量,包括共享变量和修改变量,文中的示例代码讲解详细,有需要的小伙伴可以参考下... 目录1. 向线程传递变量2. 多线程共享变量引用3. 多线程中修改变量4. 总结在Rust语言中,一个既引人入胜又可

Java访问修饰符public、private、protected及默认访问权限详解

《Java访问修饰符public、private、protected及默认访问权限详解》:本文主要介绍Java访问修饰符public、private、protected及默认访问权限的相关资料,每... 目录前言1. public 访问修饰符特点:示例:适用场景:2. private 访问修饰符特点:示例:

Python 标准库time时间的访问和转换问题小结

《Python标准库time时间的访问和转换问题小结》time模块为Python提供了处理时间和日期的多种功能,适用于多种与时间相关的场景,包括获取当前时间、格式化时间、暂停程序执行、计算程序运行时... 目录模块介绍使用场景主要类主要函数 - time()- sleep()- localtime()- g

使用Python实现批量访问URL并解析XML响应功能

《使用Python实现批量访问URL并解析XML响应功能》在现代Web开发和数据抓取中,批量访问URL并解析响应内容是一个常见的需求,本文将详细介绍如何使用Python实现批量访问URL并解析XML响... 目录引言1. 背景与需求2. 工具方法实现2.1 单URL访问与解析代码实现代码说明2.2 示例调用

使用Java解析JSON数据并提取特定字段的实现步骤(以提取mailNo为例)

《使用Java解析JSON数据并提取特定字段的实现步骤(以提取mailNo为例)》在现代软件开发中,处理JSON数据是一项非常常见的任务,无论是从API接口获取数据,还是将数据存储为JSON格式,解析... 目录1. 背景介绍1.1 jsON简介1.2 实际案例2. 准备工作2.1 环境搭建2.1.1 添加

关于Java内存访问重排序的研究

《关于Java内存访问重排序的研究》文章主要介绍了重排序现象及其在多线程编程中的影响,包括内存可见性问题和Java内存模型中对重排序的规则... 目录什么是重排序重排序图解重排序实验as-if-serial语义内存访问重排序与内存可见性内存访问重排序与Java内存模型重排序示意表内存屏障内存屏障示意表Int

SpringBoot实现基于URL和IP的访问频率限制

《SpringBoot实现基于URL和IP的访问频率限制》在现代Web应用中,接口被恶意刷新或暴力请求是一种常见的攻击手段,为了保护系统资源,需要对接口的访问频率进行限制,下面我们就来看看如何使用... 目录1. 引言2. 项目依赖3. 配置 Redis4. 创建拦截器5. 注册拦截器6. 创建控制器8.