The posts on Dynamicspedia.com linked with the XDS tag, are topics related to the usage of the eXtensible Data Security framework in Microsoft Dynamics 365 for Finance and Operations.

You will find examples and tips to get started and learn how to create your own security policies using XDS.

Posts

Secure dimension values

A recent question on the Dynamics Community triggered me to think about use cases of how to hide ledger accounts and dimension values. When I understand the question correctly, a part was to hide the financial dimension values and show only the main accounts In my reply, I elaborated on the Voucher transactions page where possibly some main accounts should be hidden, but also part of the value of the Ledger account field should be hidden. In this post, I will elaborate on how to make that possible.

Read more

For various reasons, you would like to read business data from or write data to the Dynamics 365 F&O database without enforcing security in the user context. For example, a user might not have access to various tables, like parameters or configuration. In this post, I talk about how to access and write data using the X++ unchecked statement.

Read more

Recently, I discovered two new security roles in the application that seem to have a relation with eXtensible Data Security (XDS). Anything related to security and for that reason also XDS intrigues me. In this post, you will read about the two new security roles and how they can be useful, or not…

Read more

I’m starting this blog about security with the words Less is More! This is a concept about simplicity. In life, we look at certain things in an overcomplicated way or try to make them too advanced. We don’t see it ourselves until someone helps us think in a different direction. When you just start working with Dynamics 365 and the security architecture, you might wonder why you sometimes don’t have the permissions or data visible as you would expect. In this blog, I will share some scenarios and background information where by granting more security roles, the user will have fewer permissions than expected on particular features.

Read more