You can monitor the changes made to and the status of the security configuration.


Security administrator Security administrator The security administrator (SysSecSecurityAdministrator) maintains user and security setup in D365 F&SCM, grants the ability to create and maintain security roles, duties, and privileges and the ability to assign users to roles, define role assignment rules, and maintain data security policies. Monitor security configuration history Monitor security configuration history Events done on the security configuration are logged in the security history. So, you can monitor the changes to the security configuration. These events are logged: Audit log initialized Duty created Duty deleted Duty modified Objects published Privilege created Privilege deleted Privilege modified Role assigned  Role assigned dynamically Role created Role deleted Role locked Role merged Role modified Role removed  Role removed dynamically Role unlocked Security configuration exported Security configuration imported SoD conflict allowed SoD conflict denied SoD rule created SoD rule deleted SoD rule modified SoD rules validated Stand-in role assigned Stand-in role removed Stand-in rule conflict Stand-in rule created Stand-in rule deleted Stand-in rules applied User created User deleted User disabled User enabled User modified Procedure 1. Click Security management. 2. Click the History tab. View charts View charts Several charts are available to monitor the status of the security configuration. Procedure 1. Click Security management. 2. Sub-task: View charts on Security management workspace. 3. In the Charts area, these charts are available: - Security requests - Users by domain - Users by license type - Users and roles by organization 4. Sub-task: View charts on Charts tab. 5. Click the Charts tab. Note: By default, the Security requests by status chart is shown. 6. Select the Security requests by type chart. 7. Select the No. of users, roles, duties, and privileges chart. 8. Select the Privileges with reference to roles chart. Start Start End End

Activities

Name Responsible Description

Monitor security configuration history

Security administrator

Events done on the security configuration are logged in the security history. So, you can monitor the changes to the security configuration.
These events are logged:
  • Audit log initialized
  • Duty created
  • Duty deleted
  • Duty modified
  • Objects published
  • Privilege created
  • Privilege deleted
  • Privilege modified
  • Role assigned 
  • Role assigned dynamically
  • Role created
  • Role deleted
  • Role locked
  • Role merged
  • Role modified
  • Role removed 
  • Role removed dynamically
  • Role unlocked
  • Security configuration exported
  • Security configuration imported
  • SoD conflict allowed
  • SoD conflict denied
  • SoD rule created
  • SoD rule deleted
  • SoD rule modified
  • SoD rules validated
  • Stand-in role assigned
  • Stand-in role removed
  • Stand-in rule conflict
  • Stand-in rule created
  • Stand-in rule deleted
  • Stand-in rules applied
  • User created
  • User deleted
  • User disabled
  • User enabled
  • User modified

View charts

Security administrator

Several charts are available to monitor the status of the security configuration.

Provide feedback