Power Platform - General
Category
Sep 2, 2023
Published date
Text
Article Type
AI Summary
- The article titled "Security Roles the least fun part about Power Platform – Dataverse / Dynamics 365" discusses the author's personal approach to handling security roles in Microsoft business applications like Dynamics 365.
- The author recommends starting with existing security roles rather than creating them from scratch, such as copying the Salesperson role for a Sales solution in Dynamics 365 or starting with the Basic User role for Power Platform.
- The author emphasizes the importance of not trying to have a single security role for all users, as administrative tasks often require a separate admin role. They also suggest limiting delete actions for all users initially to prevent accidental deletions.
- Assigning security roles directly to users can become time-consuming and inefficient, especially when there are frequent changes in the organization. The author suggests using a tool like XrmToolBox to deploy roles to multiple users simultaneously.
- Keeping up with security roles can be challenging, especially with the release of new functions and automatic installations of Microsoft solutions. The author highlights the need to manage lots of users and changes while maintaining the correct roles.
- The author recommends structuring security roles with teams, which simplifies changes as they only need to happen in one place. However, this approach requires Dynamics/Power Platform consultants or someone familiar with the system to make these changes.
- The article introduces a solution to the problem of managing security roles with teams by using AAD Security Groups or Entra Identity Security Group. This approach shifts the burden of access management from Dynamics/Power Platform consultants to IT, who handle general access to all systems in Active Directory.
- The author emphasizes the importance of using Security Groups unless there is a compelling reason not to, as it removes the access burden from consultants and ensures that security roles are assigned to the correct team.
Registered users can view the full text for FREE!
Sign In Now!