Solved

BOM security

Posted on 2011-03-23
4
602 Views
Last Modified: 2012-05-11
Dear all

We are starting to implement Manufacturing Phase using GP 10 and SP4.

We want to make sure that everything is secured, by mean the BOM.

What is the best practice for making security from GP and from SQL server?
0
Comment
Question by:RamzyNEbeid
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
Abdulmalek_Hamsho earned 500 total points
ID: 35197628
Don't even think about applying security to Dynamics GP through SQL Server. You have the User's Security per role. If row level security is needed, you need either to customize it or buy a 3rd party module (row level security means every user has access to a range of BOMs according to his privileges).
0
 

Author Comment

by:RamzyNEbeid
ID: 35204937
what is BOM security?
is there something that can be done from inside GP?

i will tell you later about my idea concerngin SQL Server security

thanks
0
 
LVL 10

Assisted Solution

by:Abdulmalek_Hamsho
Abdulmalek_Hamsho earned 500 total points
ID: 35205250
BOM Security is to inquire locked BOMs by which users.
0
 

Author Comment

by:RamzyNEbeid
ID: 35408606
i am still looking and i will tell you all what i did
0

Featured Post

Veeam gives away 10 full conference passes

Veeam is a VMworld 2017 US & Europe Platinum Sponsor. Enter the raffle to get the full conference pass. Pass includes the admission to all general and breakout sessions, VMware Hands-On Labs, Solutions Exchange, exclusive giveaways and the great VMworld Customer Appreciation Part

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does the idea of dealing with bits scare or confuse you? Does it seem like a waste of time in an age where we all have terabytes of storage? If so, you're missing out on one of the core tools in every professional programmer's toolbox. Learn how to …
When table data gets too large to manage or queries take too long to execute the solution is often to buy bigger hardware or assign more CPUs and memory resources to the machine to solve the problem. However, the best, cheapest and most effective so…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question