Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

BOM security

Posted on 2011-03-23
4
Medium Priority
?
607 Views
Last Modified: 2012-05-11
Dear all

We are starting to implement Manufacturing Phase using GP 10 and SP4.

We want to make sure that everything is secured, by mean the BOM.

What is the best practice for making security from GP and from SQL server?
0
Comment
Question by:RamzyNEbeid
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
Abdulmalek_Hamsho earned 2000 total points
ID: 35197628
Don't even think about applying security to Dynamics GP through SQL Server. You have the User's Security per role. If row level security is needed, you need either to customize it or buy a 3rd party module (row level security means every user has access to a range of BOMs according to his privileges).
0
 

Author Comment

by:RamzyNEbeid
ID: 35204937
what is BOM security?
is there something that can be done from inside GP?

i will tell you later about my idea concerngin SQL Server security

thanks
0
 
LVL 10

Assisted Solution

by:Abdulmalek_Hamsho
Abdulmalek_Hamsho earned 2000 total points
ID: 35205250
BOM Security is to inquire locked BOMs by which users.
0
 

Author Comment

by:RamzyNEbeid
ID: 35408606
i am still looking and i will tell you all what i did
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
In this article, we’ll look at how to deploy ProxySQL.
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question