Compartir a través de


Customizing Security

Microsoft Dynamics NAV 2016 provides options for limiting and monitoring user access to the database.

Security Customization Options

Use the following options to limit user access beyond the permission level:

Limiting Access to Specific Database Entries

You can specify that each individual user or group can only access specific entries in the database. For example, you can limit access to the entries that relate to a specific department or project. This level of access control is known as record level security.

Time-Limited Passwords

Passwords in Microsoft Dynamics NAV do not have time limits, but you can put time limits on user IDs.

If you have the required permissions, then you can delete a user ID from the system or cancel all permissions. If deleting a user ID is too drastic a step to take, then you can specify a limited time period during which a particular user ID is allowed to post in the system. You set up this limitation in the User Setup window. For more information, see How to: Set Up User Time Constraints.

Customizing Password Requirements

Codeunit 9801, Identity Management, contains a function ValidateKeyStrength that you can modify to customize the requirements for user passwords. You can, for example, change the minimum length required (the default is eight characters) or specify whether uppercase, lowercase, or numeric characters are required.

Registering User Time

You can specify that you want Microsoft Dynamics NAV to register the amount of time that each user works with a company in the database.

To register user time, use the User Setup window. In the RoleTailored client, search for or navigate to the User Setup page.

To see the time use that has been registered, search for or navigate to the Time Registers page.

Default and Fixed Printer Selections

You can specify which printer that each individual user can use. In the RoleTailored client, search for or navigate to the Printer Selections page.

See Also

Tasks

How to: Set Up User Time Constraints

Other Resources

Administration in the RoleTailored Client