I was asked a question recently, whether developers could get Security Groups and Security Group Members via AL. In this post, I’d like to talk briefly about this.
Tag Archives: Security
Dynamics 365 Business Central: User Security Id (SID) and User Id (Name)
So in this post, I would like to talk briefly about User Security Id (SID) and User Id (Name).
First of all, User Security Id and User Id are completely different in Business Central.
It’s time for Microsoft to step up their AppSource Security Game
With AppSource maturing and we’re passing 1700 apps for Business Central, it’s time to think about app security. How does a customer see what tables, events and resources an app will be using? How does a customer stay in control of their data and system? In this video, I’m showing a prototype of how one aspect of how to improve app security.
Security Filters in Business Central
Business Central Security’s security system allows you to control the objects that a user can access within each database or environment. For each user, you can specify whether you want to allow reading, editing or inserting data in the selected database objects.
You can specify which records are stored in the tables that each user is allowed to access. This means that permissions can be allocated at both the table level and the record level.
Implementing User security in Dynamics NAV 2017
In Dynamics NAV 2017, user security can be achieved by assigning different permission sets to users. Permissions can be assigned to users according to their role. A collection of database permissions for one or more objects in the Microsoft Dynamics NAV database that you can assign to one or more users is known as a Permission Set.
How to disable Internet Explorer Enhanced Security on Azure VM for Dynamics NAV?
Are you also annoyed with al those questions and popups Internet Explorer asks, when you work on a virtual machine? I use a lot of VM’s on Azure, for training, demo’s, tests and lately also to try out the new Developer Experience and Development Tools Preview for Dynamics NAV Tenerife.
Design Pattern: Security – Data Encryption
After applying Sensitive Data Encapsulation, all sensitive data is gathered in a known place in the database. This makes it possible to apply further protection best practices. Problem: If any non-authorized actor manages to get access to a copy of the database, the sensitive data is immediately available in clear-text.