Q. What is the use of configuration key in Ax?
Ans. Configuration keys allow administrators to enable or disable features in the application for all users.
Disabling features helps to minimize the attack surface against potential attacks.
Q. Where one can setup the configuration key?
Ans. Configuration keys are applied by setting the Configuration Key property on these objects in the Application
Object Tree ( AOT ).
Q. Can we apply a configuration key on table field and report’s control?
Q. Can we create a new configuration key?
Q. What is the use of security key in Ax?
Ans. Security keys allow administrators to set security on a user group level.
Minimizing access on a user group level helps to reduce the attack surface against potential attacks.
Q. What are all the main reasons to apply user-level security?
Ans. Allow users to do only their designated tasks.
Protect sensitive data in the database.
Prevent users from inadvertently breaking an application by changing code or objects
on which the application depends.
Q. What is use of AOS Authorization table property?
Ans. The AOS Authorization table property enables you to specify which data access
operations must undergo user permission checking.
Q. What are fundamental data access operations for AOS authorization table property?
Ans. The four fundamental data access operations are create, read, update, and delete.
These operations are represented in combinations by the following AOSAuthorization enumeration values:
No permission checking is done when the AOSAuthorization property is set to none.
Suppose AOSAuthorization is set to CreateDelete on a given table.
In this case, create and delete operations would be allowed to execute
only if the Application Object Server (AOS) can confirm that the user has the appropriate permissions.
Q. What is default value of AOSAuthorization table property when a new table will be created?
Ans. When a new table is created, its AOSAuthorization value is set to none.
Q. Will AOSAuthorization property be used for views?
Q. What is code access security?
1. Code Access Security (CAS) helps protect APIs that have potential security risks when the APIs are running on
2. CAS-enabled APIs called on the server require the use of a permission class—one of the classes derived from
Q. How data authorization in Microsoft Dynamics Ax is performed?
Ans. Data authorization in Microsoft Dynamics AX is performed in three ways:
1. Implicit authorization .
2. Checks done by setting security properties on Application Object Tree (AOT) objects.
3. Checks done in X++.
Q. When there are common methods across tables, which will be the best option to create?
Ans. Create a map and add those methods and corresponding tables.
Q. What are the different link types available?
Ans. Active, Delayed, Passive, innerJoin, outerjoin, ExistsJoin, NotExistsJoin.
Q. Delete Actions.
Ans. Cascade, restricted, Cascade + restricted.
Q. Which element maintains database consistency when a record is deleted.
Ans. Delete Action.
Q. What will happen if one add a delete action to a table and use delete_from statement?
Ans. Database performance will be slow.
Ans. Types of relations (normal, field fixed, related field fixed).
Q. What is an EDT.
Ans. Extended data types (EDTs) are user-defined types.
EDTs are based on the primitive data types Boolean integer, real, string, and date, and the composite type
Extended data types are defined in the Application Object Tree (AOT) under the Data Dictionary > Extended Data
Q. What is an index?
Ans. An index is a table-specific database structure that speeds the retrieval of rows from the table.
Indexes are used to improve the performance of data retrieval and sometimes to ensure the existence of unique
Q. What is system index?
Ans. Microsoft Dynamics AX requires a unique index on each table so if there are no indexes on a table or all the
indexes are disabled, a system index is automatically created.
The system index is created on the RecId and DataAreaId fields if the DataAreaId field exists.
otherwise the system index is created on the RecId field. You can see system indexes in the database but they
aren’t visible in the AOT.
Q. How one can create a unique index?
Ans. By setting up the “allow duplicate property” to No.
Q. Can we disable an index?
Today, I have posted this much of data and will post the remaining data in my leisure time.