Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Setting Up Security in Dynamics 365 for Finance and Operations – Security Management
Business Apps

Setting Up Security in Dynamics 365 for Finance and Operations – Security Management

Alex MeyerBy Alex MeyerJanuary 16, 2021Updated:June 18, 20214 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email

In other posts, I talk about the effect of where you create D365FO security (AOT vs user interface) has on how it is stored. I also talk about creating an application to help move your security created in the user interface to your AOT. I thought it might be a good idea to bring these ideas to together and summarize this topic and show what security management best practice looks like in D365FO.

How is security data actually stored

If you create/modify a role, duty, or privilege in a Visual Studio project, the security data is stored in XML format within the project folder under the AosService -> PackagesLocalDirectory folder and are categorized by the security layer type.

  • Roles -> axsecurityrole
  • Duties -> axsecurityduty
  • Privilege -> AxSecurityPrivilege

If you create/modify a role, duty, or privilege from the user interface, the security data is stored in the database as actual data within tables categorized by the security layer type.

  • Roles -> SecurityRoleCustomizeDiskObject
  • Duties -> SecurityDutyCustomizeDiskObject
  • Privileges -> SecurityPrivilegeCustomizeDiskObject

The one thing to note here when customizing the security layer the entire XML object is stored in the Data column, not just the deltas. The AOT security data of the security layer is also stored in the OriginalDiskData column. Once a customization is done and published in the user interface, it doesn’t matter what change is made in the AOT, the user interface version will override it and take precedence.

Exportability/Transferability

In the AOT, security is treated as the same as code which allows you to export the security data with the deployable packages functionality.

From the user interface, there is functionality to export all of your customizations to an XML file. There is no way to choose which customizations you want to include in this download, you do have the ability to modify this XML after downloading if you feel comfortable doing so. This XML file can be taken to another environment and imported to take customizations from one environment to another. Since this process is not nearly as concise and maintainable as having security in the AOT I have created an application to help move security from the user interface to the AOT and I created a blog post detailing this entire process:

Moving D365FO security from user interface to AOT

Treating security as code

What I mean by this is that your security should go through all of the same testing, deployment, and version control processes you have for code… because it is code. From a best practice perspective, I would recommend the approach of creating a security model and having a project within that model that contains all of your custom security of standard objects (non-custom objects) while all security around custom objects resides in the corresponding D365FO project that includes the custom object. The advantage of doing this is two fold:

  1. You now have limited where security changes exist within your solution and therefore know where to go to make changes
  2. You can now create a single security deployable package (or model) that you can then deploy into any new environment without any other code or customizations.

In the example above I created a model specifically for my security (and prefixed it with a company prefix based on naming guidelines), then created role, duty, and privilege folders underneath. All security layers will then exist under their corresponding folders and of course will be prefixed as well. Once created you are then able to take this and go to Dynamics 365 -> Deploy -> Create Deployment Package… and bundle ALL of your security into one package that you can take and deploy into an environment of the same platform version easily.

Also one other reason to create your security in a separate model is that you can then create a singular model file to take to another environment of a different platform update and application versions (this will be useful until we all go to the Microsoft evergreen solution around April 2019) using the following command from command prompt:

K:/AosService/PackagesLocalDirectory/Bin/ModelUtil.exe -export -metadatastorepath="K:/AosService/PackagesLocalDirectory" -modelname="AbcSecurity" -outputpath="C:Temp"

Conclusion

I hope these series of posts around security have been helpful on describing the differences between AOT and user interface security, best practices around configuring and managing security, and the tools and functionality that I and Microsoft have created to help with this process.

As always feel free to reach out with any questions anyone has surrounding any of this, would be more than happy to help.

Dynamics 365 CE / CRM
Share. Facebook Twitter LinkedIn Email
Alex Meyer

My name is Alex Meyer and I graduated from Iowa State University with a Bachelor of Science degree in Computer Engineering. My focus area in my degree is in networking and security. I am a current Microsoft MVP in Business Applications. I currently work as the Director of Dynamics AX/365 Finance and Operations Development at Fastpath Inc. in Des Moines, Iowa.

Related Posts

2 Models Developed Internally at Microsoft Underscore Aggressive AI Ramp-Up, Hiring

September 4, 2025

Lessons from 1,000+ Reviews on Software Implementation Success | Tinder on Customers

September 3, 2025

Microsoft Agent Functionality Engages Humans in Critical Business Processes

August 27, 2025

Workday AI-Powered Q2: 10 Reasons Subscription Revenue Up 14%

August 26, 2025
Add A Comment

Comments are closed.

Recent Posts
  • How Microsoft’s Copilot Mode Could Revolutionize Web Browsing Forever
  • AI Is Not a Person: Microsoft’s Suleyman Rejects Notion of Conscious AI
  • Dynamic Communities Introduces AI Partner Executive News & Analysis Site for the Microsoft AI Business Solutions Partner Ecosystem 
  • AI Won’t Boil Earth: Google Cloud Slashes Key AI Energy Metric by 33X
  • 2 Models Developed Internally at Microsoft Underscore Aggressive AI Ramp-Up, Hiring

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

The Agentic Enterprise: How Microsoft and Industry Leaders Are Redefining Work Through AI

September 2, 2025

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }