![]() |
#14 |
Модератор
|
2Владимир Максимов
Цитата:
Best Practice в данном вопросе бесполезен. Из него совершенно не понятно надо ли давать права на ключи или на объекты; надо ли создавать новые ключи. Он просто констатирует то, что есть сейчас
Зачем использовать ключи Applying Security Keys Цитата:
Applying Security Keys
The main reasons to apply user-level security are to:
You need to apply a security key to:
Именование ключей Best Practices for Configuration and Security Keys Цитата:
One of the nine security keys on a branch (the parent) should take the name of the module. For example, BOM. The other keys (up to eight more on a branch) should have the name of the module followed by one of the following suffixes: Daily, Journals, Inquiries, Reports, Periodic, Setup, Misc, or Tables. For example, BOMReports, BOMSetup, and LedgerPeriodic.
Enterprise Portal keys should have a prefix of EP followed by the name of the role. For example, EPAdmin and EPConsultant. Additional security keys for the role should take one of these suffixes: Misc, Info, Report, or Task. For example, EPAdminInfo and EPConsultantTask.
__________________
This posting is provided "AS IS" with no warranties, and confers no rights. |
|
Теги |
ax2009, security, securitykey, как правильно, права доступа |
|
|