All users must be assigned to at least one security role to get access to D365 FO. The security roles that are assigned to a user determine the duties that the user can perform and the parts of the user interface that the user can view.
For more information, refer to Role-based security.
Name | Responsible | Description |
---|---|---|
Manage security scenarios |
Security administrator |
You can use security scenarios to record and define all securable objects and related access levels that are required for a user to perform one or more tasks. You can create a security role in several ways. In the Security and compliance studio, you can record the working tasks for a target user. The recording results are stored in a security scenario. You can use this security scenario to fine-tune all securable objects and related access levels that are required for the target user to perform the working tasks. If the security scenario is complete, you can search for a role that matches the security scenario. If no perfect match is found, you can create a security role for the security scenario in several ways. You can link the matched or new security role to the applicable users. |
Create security role |
Security administrator |
All users must be assigned to at least one security role to have access to Dynamics 365 for Finance and Operations. The security roles that are assigned to a user determine the duties that the user can perform and the parts of the user interface that the user can view. You can use the Security role wizard to create or edit a security role. You can select the desired duties, privileges, and entry points. SnapshotThe Security role wizard uses the latest snapshot as a basis. So, for the Security role wizard to have the best performance, make sure the latest snapshot is up-to-date. In the Security and compliance studio parameters, the Enable dynamic snapshot parameter exists. If set to:
|
Duplicate security role |
Security administrator |
Consider creating a subset of security roles that are actually used in your company. This way, the security administrator has a better overview of the security roles that are used in your company. This topic explains how you can create an exact copy of a security role. |
Merge security roles |
Security administrator |
You can merge existing security roles into another existing security role or a new security role. |
Inactivate or activate security roles |
Security administrator |
When changes to a security role are required, you can choose to create a new version of it. In this case, the previous version of the security role must become inactive. So, it can't be assigned to users anymore. Before you inactivate a security role, make sure it's not assigned to any user. If you inactivate a security role that is still assigned to users, you get an error message listing the users to which it is assigned. You can also activate an inactive security role. |
Add table read permissions to role or privilege |
Security administrator |
To any role or privilege, you can add read permissions for all tables or a selection of tables.
You can add table read permissions to a role or a privilege. In this task guide, the permissions are added to a role.
|