Customizing security in Dynamics 365 Business Central

sunbridgeindiaSoftware and s/w Development

May 31, 2019 (16 days ago)

32 views

Upgrade for Dynamics 365 Business Central we have some new features specifically related to managing users security. I've been getting a lot of questions and wanted to put a site with a few pieces of information and suggestions to cooperate with the official documentation.


Customizing security in Dynamics 365 Business Central


Upgrade for
Dynamics 365 Business Central

we have some new features specifically related to
managing users

security. I've been getting a lot of questions and wanted to put a site with a few pieces
of information and suggestions to cooperate with the official documentation.

Creating custom Permission Sets

You cannot modify the existing
\
default permission sets.
I recommend that you copy an existing
permission set and modify it to fit your needs. There's no'encyclopedia' of either permissions or a guide
to what grants you access to certain things.

Recording permissions

There is a super helpful new feature which le
ts you record the permissions needed for performing jobs.
This feature is excellent for determining what permission are needed for accessing certain pages or
areas of the goods. I see this being more useful for figuring out which permissions you want to RE
MOVE
from an existing permission place when you are fine tuning the existing ones you've copied.

When you use the recording feature you Want to depart the 'Permissions' page open once you begin the
recording. I suggest starting the recording and then using

the'Search' feature to browse away to execute
the tasks you want to document. When you are finished you can shut from the new pages you've
opened to get back to your'Permissions' webpage and stop the recording.







Effective Permissions page

Effective
Permissions webpage This page Is Very Good for seeing why someone has access to It is going
to also show you the'Entitlement' at the bottom which is showing you if the License delegated to the
user is granting them the suitable access or not. Users should
have the appropriate permissions assigned
as well as a permit that enables them to get the item properly.

If you are Knowledgeable about the 3 attributes above and how they work Andcompliment each other,
you should have the ability to handle any security q
uestions Or concerns that come up.