I would like to understand for your implementation of AX 2012, how long did it take to refine the user security roles/privileges to a usage point? I realize the answer is different for every implementation and it's iterative but a general timeframe would be extremely helpful for me.
↧