This topic describes the process for configuring Role Center security and includes best practices to help maintain a secure environment for Role Centers.

Overview of Role Center security

The Microsoft Dynamics AX core security features determine which information and data is displayed on Role Center pages. These core security features include domains, company accounts, user groups, and record-level security.

Consider the following example:

  1. Anne is the chief financial officer of Contoso, Ltd.

  2. Anne's Microsoft Dynamics AX administrator assigns her to the Chief Financial Officer profile on the tab of the form.

  3. The administrator deploys Role Centers.

  4. Anne opens the Microsoft Dynamics AX client.

  5. The system identifies Anne's Role Center profile.

  6. The system identifies which data or content should be presented for the Chief Financial Officer Role Center, such as reports and financial statements. Before displaying any data or content, the system verifies the following security permissions:

    • Whether Anne has permission to view data or content for the current company account and the current domain (if applicable)

    • Whether Anne is a member of a user group that has access to the requested data and content

    • Whether any security restrictions have been set for requested records (record-level security)

  7. Anne has the necessary account, domain, and user group permissions, so the Microsoft Dynamics AX client opens and presents the data and content for the Chief Financial Officer Role Center.

If Anne did not have the necessary account, domain, and user group permissions, she would see either a blank page or a subset of the Role Center data and content, depending on her permissions.

Process for configuring Role Center security

The process for configuring Role Center security is to assign permissions based on Microsoft Dynamics AX core security features, so users can view relevant content on Role Center pages.

  1. Install Enterprise Portal. To learn more, see "Install Enterprise Portal and Role Centers" in the Microsoft Dynamics AX 5.0 Installation Guide.

  2. Configure Enterprise Portal security. For more information, see "Configuring Enterprise Portal security" in the Enterprise Portal Administration Guide.

  3. Deploy Role Centers. For more information, see Deploy Role Centers.

  4. Verify with management each user's Microsoft Dynamics AX domain, company account, and group assignments, and then configure user permissions using core security features. For more information, see Security tasks.

  5. Verify with management each user's Role Center profile assignment and then assign Role Center profiles for each user. For more information, see Assign users to Role Center profiles.

Role Center security best practices

The following best practices can help you maintain a secure environment for Role Centers:

  • Configure your servers to automatically download and install updates from Microsoft Update. If your organization prefers to not install updates automatically, schedule a regular time to review and install updates.

  • If a user leaves your organization or company, remove that user from Active Directory, Windows SharePoint Services or Office SharePoint Server, and the list of users in Microsoft Dynamics AX.

See Also