ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 46 - MB-820 discussion

Report
Export

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question set might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear on the review screen.

A company creates a Business Central app and a table named MyTable to store records when sales orders are posted.

Users report the following issues:

* The users receive permission errors related to MyTable.

* Users are no longer able to post sales orders since installing the new app.

* The users cannot access the list page created in MyTable.

You need to resolve the user issues without creating new permission sets. You must use the principle of least privilege.

Solution: Decorate the event subscriber used for inserting data in MyTable by entering (lnherentPermissions(PermissionOb]ectType:TableDat a. Database:MyTable. 'R')]

Does the solution meet the goal?

A.

Yes

Answers
A.

Yes

B.

No

Answers
B.

No

Suggested answer: A

Explanation:

Using InherentPermissions in an event subscriber with the specified syntax could potentially resolve the permission issues related to MyTable, provided that the permissions specified (in this case, 'R' for Read) align with the minimum necessary for the users to perform their tasks. This approach allows the app to grant permissions dynamically based on the context of the event subscriber, which in this case is involved with inserting data into MyTable. By granting Read permission at the event level, it ensures that users have the necessary permissions to interact with MyTable in the context of the operations facilitated by the event subscriber, without needing to alter existing permission sets or grant broader permissions than necessary. This solution adheres to the principle of least privilege by ensuring that permissions are granted only within the narrow scope needed for specific operations, thereby potentially resolving the reported user issues in a secure and controlled manner.


asked 05/10/2024
Ronald Armas
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first