
Continued from part 2 In theory there is no difference between theory and practice. In practice there is.No matter how well you plan your authorization, you will run into ad-hoc issues requiring ad-hoc remedies. In part 3 of the series on authorization I’ll share some tips and tricks that might come in handy. The AX2012 Security Development Tool Saying that the authorization framework in AX is not very user-friendly is an understatement. The good people in Redmond recognized this fact […]