Security Policies Properties
Applies To: Microsoft Dynamics AX 2012 R3, Microsoft Dynamics AX 2012 R2, Microsoft Dynamics AX 2012 Feature Pack, Microsoft Dynamics AX 2012
Developers and system administrators can create security policies to deny access to subset of data records in tables.
Constrained Tables of a Policy
You can add tables and views under the Constrained Tables node of a security policy in the AOT. These tables and views relate to the data source table of the query that is named in the Query property of the policy. The following list shows the hierarchy of security policy nodes in the AOT:
Security
Policies
YourPolicy
Constrained Tables
YourConstrainedTable
- YourConstrainedSubTable
YourConstrainedView
Each Constrained Tables node can contain any number of constrained tables and views. And each constrained table can contain any number of constrained sub-tables.
Security Policy Properties
The following table describes the properties for the AOT node at Security > Policies > YourPolicy.
Property |
Required |
Description |
---|---|---|
Name |
Yes |
The name of the security policy. |
Label |
Yes |
The text that appears on the user interface for the security policy. |
PrimaryTable |
Yes |
The table that is specified in the data source for the security policy query. |
Query |
Yes |
The query which is used by the policy to filter data from the constrained tables that are specified in the policy. |
UseNotExistJoin |
Yes |
Indicates whether the security query must be applied as a not exists join or as an exists join. |
PolicyGroup |
No |
The PolicyGroup property is set by a drop-down list that contains the security policy group names that the system administrator has created. The system administrator or developer can create security policy groups. This property can be used by administrators and developers to quickly identify groups of related security policies. The system does not use this property during run time. |
ConstrainedTable |
Yes |
Controls whether the security policy restricts the data values in records that are returned from the primary table. The value can be one of the following:
|
Enabled |
Yes |
Controls whether the policy is enforced by the system during run time. The value can be one of the following:
|
Operation |
Yes |
Controls which data operations the policy is enforced for. The value can be one of the following:
|
ContextType |
Yes |
Controls the context type of the security policy. The value can be one of the following:
|
ContextString |
Yes |
This property works in combination with ContextType property. It can specify an application or multiple roles context. |
See also
Role-based Security in the AOT for Developers
Announcements: New book: "Inside Microsoft Dynamics AX 2012 R3" now available. Get your copy at the MS Press Store.