Role-based Security Use Patterns for Developers

Important

This content is archived and is not being updated. For the latest documentation, see Microsoft Dynamics 365 product documentation. For the latest release plans, see Dynamics 365 and Microsoft Power Platform release plans.

This white paper describes how the role-based security artifacts work together. It explains to Microsoft Dynamics AX developers how the security artifacts should be configured when they are applied to various programming objects in the AOT. The challenges of under-permissioning, over-permissioning, and practical ease of use guide this discussion.

Download the white paper

See also

Security

Plan security in an implementation

Role-based Security in the AOT for Developers