Customizing security in Dynamics 365 Business Central

sunbridgeindiaSoftware and s/w Development

May 10, 2019 (15 days and 7 hours ago)

32 views

Upgrade for Dynamics 365 Business Central we have some new features specifically related to managing users security. I've been getting a lot of questions and wanted to put a site with a few pieces of information and suggestions to cooperate with the official documentation.


Customizing security in Dynamics 365 Business Central


Upgrade for
Dynamics 365 Business Central

we have some new features specifically related to managing
users

security. I've been getting a lot of questions and wanted to put a site with a few pieces of information
and suggestions to cooperate with the official documentation.

Creating custom Permission Sets

You cannot modify the existing
\
default permission sets.
I recommend that you copy an existing permission
set and modify it to fit your needs. There's no'encyclopedia' of either permissions or a guide to what grants
you access to certain things.




Recording permissions

There is a super helpful new feature whic
h lets you record the permissions needed for performing jobs.
This feature is excellent for determining what permission are needed for accessing certain pages or areas
of the goods. I see this being more useful for figuring out which permissions you want t
o REMOVE from
an existing permission place when you are fine tuning the existing ones you've copied.

When you use the recording feature you Want to depart the 'Permissions' page open once you begin the
recording. I suggest starting the recording and then u
sing the'Search' feature to browse away to execute
the tasks you want to document. When you are finished you can shut from the new pages you've opened
to get back to your'Permissions' webpage and stop the recording.

Effective Permissions page

Effective Per
missions webpage This page Is Very Good for seeing why someone has access to It is going to
also show you the'Entitlement' at the bottom which is showing you if the License delegated to the user is
granting them the suitable access or not. Users should hav
e the appropriate permissions assigned as well
as a permit that enables them to get the item properly.

If you are Knowledgeable about the 3 attributes above and how they work And compliment each other,
you should have the ability to handle any security que
stions Or concerns that come up.