You can use security scenarios to record and define all securable objects and related access levels that are required for a user to perform one or more tasks.
You can create a security role in several ways. In the Security and compliance studio, you can record the working tasks for a target user. The recording results are stored in a security scenario. You can use this security scenario to fine-tune all securable objects and related access levels that are required for the target user to perform the working tasks.
If the security scenario is complete, you can search for a role that matches the security scenario. If no perfect match is found, you can create a security role for the security scenario in several ways. You can link the matched or new security role to the applicable users.



Security administrator Security administrator The security administrator (SysSecSecurityAdministrator) maintains user and security setup in D365 F&SCM, grants the ability to create and maintain security roles, duties, and privileges and the ability to assign users to roles, define role assignment rules, and maintain data security policies. Start Start Compose security scenarios

Compose security scenarios

You can use a security scenario to indicate all securable objects and related access levels that are required for a user to perform one or more tasks.

Match roles

Match roles

You can search for a role that matches the security scenario. If no perfect match is found, you can create a role for the security scenario in several ways.
The match roles function gets the security configuration data from the latest snapshot.

Assign role to user Assign role to user The match roles process often results in new security roles. To access Microsoft Dynamics 365 for Finance and Operations, Enterprise edition, users must be assigned to security roles. This procedure guides you to the pages where you can: Assign users to roles in several ways. Assign roles to users. The role assignment is validated automatically to verify if it complies with the segregation of duties rules. If enhanced segregation of duties rules are enabled, the role assignment is validated against the enhanced segregation of duties rules. If dynamic snapshots are enabled, the role assignments are automatically updated in the latest snapshot. Procedure 1. Click Security management. 2. Sub-task: Assign users to roles. 3. Click Assign users to roles. 4. On the Assign users to roles page, you can, for example: - Add a rule to automatically assign users to the security role. - Manually assign users to the security role. 5. Close the page. 6. Sub-task: Assign roles to user. 7. Click Users. 8. In the list, find and select the desired record. 9. In the list, click the link in the selected row. 10. On the Users details page, you can, for example: - Assign roles to a user. - Remove roles from a user. 11. Close the page. 12. Close the page. End End

Activities

Name Responsible Description

Compose security scenarios

Security administrator

You can use a security scenario to indicate all securable objects and related access levels that are required for a user to perform one or more tasks.

Match roles

Security administrator

You can search for a role that matches the security scenario. If no perfect match is found, you can create a role for the security scenario in several ways.
The match roles function gets the security configuration data from the latest snapshot.

Assign role to user

Security administrator

The match roles process often results in new security roles. To access Microsoft Dynamics 365 for Finance and Operations, Enterprise edition, users must be assigned to security roles. This procedure guides you to the pages where you can:

The role assignment is validated automatically to verify if it complies with the segregation of duties rules. If enhanced segregation of duties rules are enabled, the role assignment is validated against the enhanced segregation of duties rules.
If dynamic snapshots are enabled, the role assignments are automatically updated in the latest snapshot.

Compose security scenarios

Match roles

Provide feedback