My Journey: A Beginner’s Guide to Effectively Managing Security Roles in Dynamics 365 Customer Engagement

Meron
6 min readDec 26, 2023

--

“If I have seen further it is by standing on the shoulders of giants.” Isaac Newton

Security is at the heart of Dynamics 365 Customer Engagement, ensuring that your organization’s data remains protected and accessible only to those who need it. In this step-by-step guide, we’ll walk you through the process of managing security roles effectively, empowering beginners to navigate the Dynamics 365 Unified Interface admin center with confidence.

Step 1: Accessing the Dynamics 365 Unified Interface Admin Center

Log in to your Dynamics 365 organization with administrator credentials.

Navigate to the Unified Interface Admin Center by selecting “Settings” and then “Advanced Settings.

Step 2: Navigating to Security Roles

In the Unified Interface Admin Center, click on the “Security” menu.

Step 3: Understanding Default Security Roles

Explore the default security roles provided by Dynamics 365, such as System Administrator and System Customizer.[KK1]

1. System Administrator: The Powerhouse

· Overview: The System Administrator reigns supreme in the Dynamics 365 hierarchy, holding the keys to the kingdom. This role is bestowed with unparalleled privileges, granting full control over the entire system.

· Capabilities:

o User Management: Create, modify, and deactivate user accounts with ease.

o Security Oversight: Configure access permissions, ensuring data integrity and confidentiality.

o Customization Authority: Exercise complete control over customization and configuration settings.

o System-Wide Configuration: Tweak global settings to align Dynamics 365 with organizational needs.

2. System Customizer: The Artisan

· Overview: Positioned as the maestro of customization, the System Customizer role empowers users to shape Dynamics 365 to suit specific business requirements.

· Capabilities:

o Form and View Customization: Tailor user interfaces by adjusting forms and views to enhance user experience.

o Business Process Customization: Fine-tune and create business processes that align with unique workflows.

o Entity Customization: Modify data structures and relationships to capture information pertinent to your organization.

o Solution Management: Package and deploy customized solutions across instances.

Understanding these default security roles is fundamental to leveraging the full potential of Dynamics 365. While the System Administrator wields overarching control, the System Customizer facilitates granular customization, allowing organizations to adapt the platform to their unique operational landscapes. Together, these roles form the backbone of Dynamics 365’s security framework, ensuring a delicate balance between flexibility and governance for a seamless user experience.

default security roles: System Administrator and System Customizer role

Step 4: Creating a New Security Role

Click on “New” to create a custom security role.

Provide a name and description for the new role

When you finish Click Save

Step 5: Defining Privileges for Core Records

Navigate to the “Core Records” tab to specify privileges for entities. Define Create, Read, Write, Delete, Append, Append To, etc.

Step 6: Assigning Security Roles to Users

Open a user record, navigate to the “Security Roles” tab, and add the relevant roles.

Step 7: Testing Security Roles

Create test users and simulate various scenarios to verify the effectiveness of the assigned security roles.

One of the tools that can help Dynamics 365 users to perform advanced actions, such as testing security roles, is the Level Up Browser extension. This extension is available for Microsoft Edge, Google Chrome, and Mozilla Firefox browsers. It allows users to quickly access hidden features, such as opening a record by ID, refreshing all sub grids, or showing all option set values.

One of the features of the Level Up Browser extension is the impersonation feature, which can be used to test the security roles and permissions of different users. This feature lets you switch to another user’s context without logging out and logging in as that user. You can use this feature to verify that the security model in Dynamics 365 is working as expected and that users can only access the data and functions that they are authorized to.

Step 8: Monitoring and Auditing

Regularly review and update security roles based on changes in your organization. Utilize audit logs to monitor user activity

Step 9: Customizing Field-Level Security

Explore the “Field Security Profiles” area to manage access to specific fields within entities

Step 10: Customizing Field-Level Security

Explore the “Field Security Profiles” area to manage access to specific fields within entities

Big thanks to Kylie Kaiser for the insightful review of my latest blog post. Your ongoing support and mentorship within the Microsoft Community have been instrumental in my growth. Grateful for the guidance — I can’t wait to pay it forward! 🚀 #ThankYou #Mentorship

Reference

· Security roles in Dynamics 365 Customer Engagement (on-premises): This article explains the basics of security roles, record-level privileges, task-based privileges, and access levels in Dynamics 365 Customer Engagement.

· https://learn.microsoft.com/en-us/dynamics365/customerengagement/on-premises/admin/security-roles-privileges?view=op-9-1

· Security model in Dynamics 365 Customer Engagement (on-premises): This article provides an overview of the security model in Dynamics 365 Customer Engagement, including business units, role-based security, record-based security, and field-based security.

· https://learn.microsoft.com/en-us/dynamics365/customerengagement/on-premises/admin/security-concepts?view=op-9-1

· Types of Security Roles in Microsoft Dynamics 365 CRM: This blog post describes the three main types of security roles in Dynamics 365 Customer Engagement: Basic User, System Customizer, and System Administrator.

· https://insights.imperiumdynamics.com/types-of-security-roles-in-microsoft-dynamics-365-crm/

· Security role — Implementing Microsoft Dynamics 365 Customer Engagement …: This book chapter discusses how to create and modify security roles, and how to assign them to users and teams in Dynamics 365 Customer Engagement.

· https://www.oreilly.com/library/view/implementing-microsoft-dynamics/9781838556877/a9827fe8-15f9-4111-a79d-12d76929fef3.xhtml

· Add users and assign roles in Dynamics 365 Customer Engagement (on …: This article shows how to add users and assign security roles to them in Dynamics 365 Customer Engagement.

· https://learn.microsoft.com/en-us/dynamics365/customerengagement/on-premises/admin/create-users-assign-online-security-roles?view=op-9-1

· Here are some resources that you can use to learn more about Dynamics 365 security and the Level Up Browser extension:

· Dynamics 365 security — Dynamics 365 | Microsoft Learn https://learn.microsoft.com/en-us/dynamics365/get-started/security

· Dynamics 365 Security Best Practices — Gestisoft https://www.gestisoft.com/blog/dynamics-365-security-best-practices

· Level up for Dynamics 365/Power Apps — Google Chrome https://chromewebstore.google.com/detail/level-up-for-dynamics-365/bjnkkhimoaclnddigpphpgkfgeggokam

· Level up for Dynamics 365/Power Apps — Get this Extension … — Mozilla https://chromewebstore.google.com/detail/level-up-for-dynamics-365/bjnkkhimoaclnddigpphpgkfgeggokam

· Level Up for Dynamics 365/Power Apps — GitHub https://chromewebstore.google.com/detail/level-up-for-dynamics-365/bjnkkhimoaclnddigpphpgkfgeggokam

· How to use the Impersonation feature in Level Up for Dynamics 365/Power Apps — YouTube https://addons.mozilla.org/en-US/firefox/addon/level-up-for-d365-power-apps/

· Security model in Dynamics 365 Customer Engagement (on-premises) https://chromewebstore.google.com/detail/rogold-level-up-roblox/mafcicncghogpdpaieifglifaagndbni

Always let me know.

1. If you have any questions, please do not hesitate to reach out.

2. If you want me to cover a topic.

3. If you are struggling in finding your next step in your career, we will work together to find your journey and find the right mentors to connect to

OR

You want a study buddy — Let me know Love to Help!

E-mail: blacklionm@protonmail.com

Twitter: @Blacklionm1

Instagram:@blacklioneth

#Blacklionm1 #MEM #WomenITpros #Immigrant #Dreamer #microsoftcertification #certification #Dynamics365 #PowerPlatfrom #Microsoft

Especially thank you to the people who laid the foundation for my journey and the road map to my career.

--

--