presented by vishy grandhi. lesson 1: ax overview lesson 2: role based security lesson 3:...

29
AX 2012 OVERVIEW Presented by Vishy Grandhi

Upload: marian-warren

Post on 18-Jan-2018

223 views

Category:

Documents


0 download

DESCRIPTION

 At the end of this lesson you will have an understanding about ◦ The components of an AX system ◦ Extended System architecture ◦ Model driven architecture

TRANSCRIPT

Page 1: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

AX 2012 OVERVIEWPresented by Vishy Grandhi

Page 2: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Lesson 1: AX Overview Lesson 2: Role based security Lesson 3: Monitoring Troubleshooting

Training Outline

Page 3: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

At the end of this lesson you will have an understanding about◦ The components of an AX system◦ Extended System architecture◦Model driven architecture

AX Overview: Objectives

Page 4: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

AX is a 3-tier system consisting of the following components◦ Database (SQL Server)◦ AOS (Business logic execution service)◦ Client (AX Rich client, EP, .NET Business

Connector)

AX Overview: AX Components

Page 5: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

AX Database◦ It is an OLTP db◦ Stores business data◦ Stores Metadata and application code

AX Overview: AX Components

Page 6: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

AOS◦ Application object server◦ It provides a runtime for execution of X++ code◦ Manages security◦ Session management◦ Web services end point

AX Overview: AX Components

Page 7: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Clients◦ AX Rich client installed on client

desktop/citrix/RDP◦ Enterprise Portal◦ Microsoft Office products (Through Dynamics AX

add-on)◦ .NET Business Connector

AX Overview: AX Components

Page 8: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

AX Overview: System Architecture

Page 9: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

AX has a unique model and layer architecture that enables easy customization while ensuring protection of code and easy upgrade◦ Layers◦ Models

AX Overview: Model driven architecture

Page 10: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

AX Overview: Layers

Page 11: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Model is a new concept in AX 2012◦ Logical separation of code objects◦ Multiple ISV code segregation◦ Multiple project code segregation

AX Overview: Models

Page 12: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

We have looked at the components that make up AX System

Architecture of AX – Layers and Models Extended system architecture

AX Overview: Wrap-up

Page 13: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

At the end of this lesson you will have an understanding about◦ Role based security◦ Roles assignment to users

Role based security: Objectives

Page 14: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Role based security : Hierarchy

Page 15: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Role based security : Example

Page 16: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Entry Points Permissions Privileges Duties Roles

Role based security : Definitions

Page 17: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Menu items Web content items Service operations SSRS reports

Role based security : Entry Points

Page 18: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Process cycles are used in rich client to make it easier for a system administrator to view and find related duties when setting up security.◦ Conversion cycle◦ Cost accounting cycle◦ Expenditure cycle◦ Human capital management cycle◦ Information Technology cycle◦ Revenue cycle

Role based security : Process Cycles

Page 19: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

At the end of this lesson you would have a good understanding of the following◦ Setup a new user◦ Assign the user appropriate role◦ Modify roles, duties and privileges

Setup new user: Objectives

Page 20: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

At the end of this lesson you will have an understanding about◦ Monitoring Hardware◦ Monitoring Database◦Monitoring Dynamics AX

Monitoring: Objectives

Page 21: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Use System Monitor (Perfmon) to monitor Windows, SQL Server and AX Counters. A few important counters

Monitoring: Hardware

– % Privileged Time– % Processor Time– Available Mbytes– Page Faults/sec– Avg. Disk Queue

Length– % Disk Time– Bytes Total/Sec– Buffer Cache Hit Ratio

(Sql)– User Connections

– SQL Compilations– Active Sessions (AX)– Total Sessions– Number of client

requests– Fatal session

exception (EP)– Session allocation

rate– Web part execution

rate

Page 22: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

SQL Server Profiler can be used to identify performance issues with queries, any deadlocks and general tracing.

Monitoring: Database

• A few events for tracing– Deadlock– Data File Autogrow– Log File Autogrow– Showplan XML– Sp:StmtStarting/

Completed– Sql:StmtStarting/

Completed

• Problems that can be detected include– High number of

reads/writes– Long running queries– Execution plans

Page 23: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Other tools available include◦ SQL Dynamic Management Views◦ Sp_who, sp_lock◦ DBCC CACHESTATS, DBCC TRACEON, DBCC

TRACEOFF, DBCC TRACESTATUS◦ SQLIO – Disk performance test tool◦ SQLIOSim – Disk Stress Test Tool◦ SQL Server logs

Monitoring: Database

Page 24: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

AX Trace Parser

Monitoring: Dynamics AX

Page 25: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

Common performance related issues that are noticed in Dynamics AX

Troubleshooting: Overview

– Blocking and deadlocking

– Disk I/O bottlenecks– High CPU utilization– Large number of

roundtrips to database– High memory usage

when run in IL

• Problems that can be detected include– High number of

reads/writes– Long running queries– Execution plans

Page 26: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

The following recipes are included in this presentation◦ Create a new user◦ Assign role to a user

Recipes: List of recipes

Page 27: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

1. Start2. Open the Microsoft Dynamics AX

client.3. Open the Users form. System

Administration > Common > Users > Users.

4. Click New > Import in the Action Pane.

5. Click Next.6. Select the domain name

contoso.com.7. Enter Vishy for the first name.8. Click Next.9. Click Select all.10. Click Next.11. Click Next.

12. Select only System User and Employee roles.

13. Click Next.14. Select Accounts receivable

administrator profile in Same profile in all companies. This defines Vishy's role center.

15. Click Next.16. Click Finish

Recipe: Create a new user

Page 28: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

1. Open the Microsoft Dynamics AX client.

2. Go to System Administration > Common > Users > Users.

3. Double-click Vishy Grandhi in the grid to edit his record.

4. Click Assign roles in the User's role section of the form.

5. Select Accounts receivable manager and click OK.

6. Finish.

Recipe: Assign role to a user

Page 29: Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting

We have looked at AX components and system architecture

We have also explored model driven architecture

We have looked at Role based security in AX We explored the different security elements Finally we created a new user and assigned

him/her roles

Summary of Training