All users must be assigned to at least one security role in order to have access to Finance and Operations. The security roles that are assigned to a user determine the duties that the user can perform and the parts of the user interface that the user can view.
For more information, refer to Role-based security.
Name | Responsible | Description |
---|---|---|
Manage security scenarios |
Security administrator |
You can use security scenarios to record and define all securable objects and related access levels that are required for a user to perform one or more tasks. You can create a security role in several ways. In the Security and compliance studio, you can record the working tasks for a target user. The recording results are stored in a security scenario. You can use this security scenario to fine-tune all securable objects and related access levels that are required for the target user to perform the working tasks. If the security scenario is complete, you can search for a role that matches the security scenario. If no perfect match is found, you can create a security role for the security scenario in several ways. You can link the matched or new security role to the applicable users. |
Create security role from duties and privileges |
Security administrator |
All users must be assigned to at least one security role to have access to Dynamics 365 for Finance and Operations. The security roles that are assigned to a user determine the duties that the user can perform and the parts of the user interface that the user can view.
You can use the Create role wizard to create a security role for selected privileges and duties.
You can select:
To have an up-to-date set of duties and privileges to select from, you can update the user license types before you select duties and privileges for a new role.
This procedure explains how to create a security role based on a selection of privileges and duties.
|
Create security role |
Security administrator |
Each user must be assigned to at least one security role to have access to Finance and Operations. The security roles that are assigned to a user determine the duties that the user can perform and the parts of the user interface that the user can view.
This topic explains how to create a security role. |
Duplicate security role |
Security administrator |
Consider creating a subset of security roles that are actually used in your company. This way, the security administrator has a better overview of the security roles that are used in your company. This topic explains how you can create an exact copy of a security role. |
Merge security roles |
Security administrator |
You can merge existing security roles into another existing security role or a new security role. |
Inactivate or activate security roles |
Security administrator |
When changes to a security role are required, you can choose to create a new version of it. In this case, the previous version of the security role must become inactive. So, it can't be assigned to users anymore. Before you inactivate a security role, make sure it's not assigned to any user. If you inactivate a security role that is still assigned to users, you get an error message listing the users to which it is assigned. You can also activate an inactive security role. |
Add table read permissions to role or privilege |
Security administrator |
To any role or privilege, you can add read permissions for all tables or a selection of tables.
You can add table read permissions to a role or a privilege. In this task guide, the permissions are added to a role.
|