BEST PRACTICES FOR DYNAMICS NAV ADMINISTRATION AND SECURITY Per Mogensen.

Slides:



Advertisements
Similar presentations
Microsoft Dynamics® SL
Advertisements

GP2013 (R2) New features in GP2013 (R2). New Ribbon for windows Edit List is the Print button on the right without the paper background Action pane can.
July 2010 D2.1 Upgrading strategy Javier Soto Catalog Release 3. Communities.
Templates and Styles Excel Advanced. Templates are pre- designed and formatted spreadsheets –They provide consistency of layout/structure –They.
Understand Database Security Concepts
With TimeCard appointments are tagged with information that converts them into time sheets. This way users can report time and expenses from their Outlook.
Advantage Data Dictionary. agenda Creating and Managing Data Dictionaries –Tables, Indexes, Fields, and Triggers –Defining Referential Integrity –Defining.
Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
McGraw-Hill/Irwin© 2006 The McGraw-Hill Companies, Inc. All rights reserved. 5-1.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
DB Audit Expert v1.1 for Oracle Copyright © SoftTree Technologies, Inc. This presentation is for DB Audit Expert for Oracle version 1.1 which.
CONNECTION SETTINGS FOR USE WITH THE MOTION COMPUTING MODEL-F5 TABLET COMPUTER AKA: SIMON October 8, 2011 (And other useful information.)
MS Access Advanced Instructor: Vicki Weidler Assistant:
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
MDECA SECURITY UPDATES Update & Review for Security Changes!
Windows XP Professional Windows XP Professional Overview Install and Upgrade Windows XP Pro Customize and Manage Windows XP Pro Troubleshoot Common Windows.
Securing Microsoft® Exchange Server 2010
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 6 Virtual Private Databases.
TxEIS Security A role-based solution October 2010.
Enterprise Security for Microsoft Dynamics GP Jeff Soelberg
© 2007 by Prentice Hall 1 Introduction to databases.
Microsoft ® Business Solutions–Navision ® 4.0 Development II - C/SIDE Solution Development Day 2.
presented by Oliver Lamaca Customer Account Manager.
IFORM ACCOUNT MAINTENANCE ICT4D SESSION 4. IFORMBUILDER WEBSITE REQUIREMENTS To access the iFormBuilder website, you need the following items: -Reliable.
Microsoft Dynamics NAV 2009 Building Web Services.
What’s new in Kentico CMS 5.0 Michal Neuwirth Product Manager Kentico Software.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Module 6 Securing Content. Module Overview Administering SharePoint Groups Implementing SharePoint Roles and Role Assignments Securing and Auditing SharePoint.
Microsoft Dynamics NAV 2009 and Architecture Overview Name Title Microsoft Corporation.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
| imodules.com Top 10 FAQ in Application Support Kelly Schmiedeler & Amber Quayle.
Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting.
Chapter 6 Virtual Private Databases
Session id: Darrell Hilliard Senior Delivery Manager Oracle University Oracle Corporation.
 Complete solution for NAV Security ◦ RoleTailored and Classic Client  Field Level and Data Security ◦ Security beyond NAV’s standard abilities  Logins.
SQL Server Security The Low Hanging Fruit. Lindsay Clark Database Administrator at American Credit Acceptance
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
2016 TELPAS Online Testing & Data Collection. Disclaimer  These slides have been prepared by the Student Assessment Division of the Texas Education Agency.
AM18 DATA INTEGRATION TODAY AND TOMORROW Henning Lund, RapidiOnline.
AM10 AUTOMATED TESTING IN DYNAMICS NAV Luc van Vugt, MVP – fluxxus.nl.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Excel 2002 Using Macros Lesson.
Understanding the Dynamics AX2012 Security Model 4/14/2014 AXUG User Group Meeting.
Upgrade on Windows 7. DownloadSoftware Download Software from link provided in Webliography: e/
Upgrading your reports from Dynamics NAV 2009 Classic
AM08 - MIGRATING FROM ON PREMISE TO THE CLOUD Duilio Tacconi, Microsoft Corp Marco Mels, Microsoft Corp.
BI06 THE TIME IS NOW TO GET STARTED WITH MICROSOFT POWER BI James Crowter MVP, Managing Director, Technology Management Sorry downloaders but you’ll have.
CONVERTING YOUR CLASSIC CLIENT OBJECTS TO THE LATEST DYNAMICS NAV VERSION Per Mogensen.
AM06 APPROACHES TO MANAGING YOUR HISTORICAL DATA Alexander Lutz, Brands4fFiends Tassos Vassilopoulos, SQLPerform.
Microsoft Dynamics NAV Microsoft Dynamics NAV managed service for partners, under the hood Dmitry Chadayev Corporate Vice President, Microsoft.
beas group AG Beas sql guide Martin Heigl CTO
Managing Windows Server 2012
Reporting solutions examined: Jet Express
Best Practices for Dynamics NAV Administration and Security
Dynamics GP SmartList and SmartList Designer
Security Management: Successes and Failures
TOPSpro Special Topics
Get to know SQL Manager SQL Server administration done right 
6/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
OP04 What is C/AL and Why Should I Care?
Dynamic SQL: Writing Efficient Queries on the Fly
Presented by [Harshit Agrawal] 03/02/2017
Principles of report writing
Dynamic SQL: Writing Efficient Queries on the Fly
Please thank our sponsors!
Summit Nashville /3/2019 1:48 AM
Using Employee Development in ADP Workforce Now
Navigating GP Security
Professional Services Tools Library (PSTL)
Presentation transcript:

BEST PRACTICES FOR DYNAMICS NAV ADMINISTRATION AND SECURITY Per Mogensen

#NAVUGCongress16 We will take a relaxed approach and walk through our experts' best practices for proper administration, and security setup and maintenance, in and around Dynamics NAV. Draw on the collective experience as we share "what I would have done differently," and gain insight on the additional tools and resources available in the community. DESCRIPTION

#NAVUGCongress16 What is the difference between security and usability Adding Access Controls to a User Defining new Permission Sets (Roles) How to design your security AGENDA 3

#NAVUGCongress16 Hide data like payroll, recipes, G/L or sales data Protect data from accidental changes Ensure data integrity by protecting setup Segregation of duties External requirements (SOX) Auditors WHY IS SECURITY NECESSARY?

#NAVUGCongress16 A DDING A CCESS C ONTROLS TO A U SER 5

#NAVUGCongress16 Combines Roles/Permission Sets with companies Access to single company or all companies Permissions always add Users can have access directly assigned or as part of groups using Active Directory Best suited for a single company setup High level access to NAV should be avoided NAV 2013 or later require users to be created in NAV NAV 2016 support groups in NAV Still create data in the regular tables USER ACCESS CONTROL

#NAVUGCongress16 Can be administered directly in Active Directory Many Windows Groups required when more than a single company Work fine for low level access, but is a security risk for SUPER or similar access LOGIN WITH WINDOWS GROUP

#NAVUGCongress16 Add new User Add Access Controls to the user Testing on a single computer Run as a different User Create Windows Group DEMONSTRATION 8

#NAVUGCongress16 D EFINING NEW P ERMISSION S ETS (R OLES ) 9

#NAVUGCongress16 A set of permissions for data, objects and system functions Not related to companies only to data and code Access control under Users combine Permission Sets and Company Data security possible with Security Filters No Field Level control PERMISSION SETS (ROLES)

#NAVUGCongress16 Data (TableData) Read, insert, modify and delete access Direct or indirect indirect access need proper permissions in code Indirect read enough to calculate FlowFields Objects (Forms/Pages, Reports, Codeunits…) Execute Design different object types (only in NAV 2009 and older) Read, insert, modify and delete System Tools (Zoom, User administration…) Execute Design access (Importing fob, change report…) Execute NAV 2009 RTC, 2013 and later have limited functions that can be controlled. Only the Zoom is currently controlled WHAT CAN BE SECURED IN NAV

#NAVUGCongress16 Allow users to perform tasks by using the right process Post documents, apply entries Permissions added in code License permissions use Indirect to control editing posted data INDIRECT PERMISSION TO TABLEDATA 12

#NAVUGCongress16 Access to login and more ALL/BASIC/FOUNDATION Functional permission sets S&R Q/O/I/C/B/R System permission sets TOOLS, ZOOM High level access SUPER, SUPER (DATA) STANDARD PERMISSION SETS (ROLES)

#NAVUGCongress16 “SUPER” can administer users “SUPER” can design and change objects “SUPER” can run tables from the designer “SUPER (DATA)” and “BASIC” still have full access to the application Consider creating other “SUPER” roles “SUPER (READ)” read-only access to the complete application “SUPER (TOOLS)” allow access to all tools “SUPER” VERSUS “SUPER (DATA)”

#NAVUGCongress16 Correct Permission Errors Edit Permissions based on existing Permission Sets Record Permissions in NAV 2016 Create new Permission Sets TOOLS, ZOOM, SUPER READ DEMONSTRATION 15

#NAVUGCongress16 H OW TO DESIGN YOUR SECURITY 16

#NAVUGCongress16 Focus on a small task in NAV Make assigning permissions and testing simple Small chance of breaking all roles when upgrading or adding new customizations Do NOT make a single role for each user Hard to maintain Very hard to know if everything is covered Cannot remove permissions easily without a lot of testing BEST PRACTICES FOR DESIGNING ROLES

#NAVUGCongress16 Role Center give access to view and is improving usability Permissions give access to perform tasks BASIC role in NAV 2013 and later has too many permissions to view data Access to Login/Logout (OK) Access to execute objects (OK) Access to read all data for ORDER PROCESSOR (wrong) ROLE CENTER VERSUS PERMISSIONS

#NAVUGCongress16 NAV 2009 User connect directly to SQL database User needs access to data in SQL database Complex setup to allow impersonation for RoleTailored client NAV and SQL database verify user credentials NAV 2013 and later Service user connect to SQL Database User need NO access to data in SQL database No requirements to only use SQL database or windows login NAV Service Tier verify user credentials No Login/Logout required after security changes NAV 2009 and 2013 and later Design access (Classic Client) require access to SQL database DBOwner for many design and security functions (2009 only) NAV 2009 VERSUS SECURITY

#NAVUGCongress16 User can never exceed the license permissions Indirect license permissions are used to secure important posting data Removed when buying 7300 Solution developer as a customer (be careful, security setup is much harder) MenuSuite remove MenuItems based on license or user permissions Classic: always removed from MenuSuite RTC: optional based on setup, different by version, 2015 also include fields and actions removal on pages LICENSE AND USER PERMISSIONS

#NAVUGCongress16 TableData versus Table Security data and companies Objects and Read/Insert/Modify/Delete TableData and Execute COMMON CONFUSION ABOUT SECURITY

#NAVUGCongress16 S UMMARY 22

#NAVUGCongress16 Permission Set (Role) spreadsheet S zip REFERENCES 23

#NAVUGCongress16 Reminders: Please download the session slides from the NAVUG Congress Community or through the Congress App Please visit our Dynamics NAV help desk Monday evening in the Expo Please complete your session survey in the Congress App 24 THANK YOU FOR ATTENDING