Dynamics 365 - Owners of records can now see a list of users who have access to their record
Image Source: Shutterstock.com
Mar 27, 2023 11:10 AM

Dynamics 365 - Owners of records can now see a list of users who have access to their record

External Blog Post

For each record that is displayed in the web client, the user has the ability to see how they were granted access to the record through the Check Access option

There are different ways to obtain access to a particular record in Dataverse. To be able to do a certain action with a table (Create, Read, Write, Delete, Append, Append to, Assign, Share), two major checks are done: privilege and access checks.

How access to a record is determined - Power Platform | Microsoft Learn

Permission in Dynamics 365

In Dataverse, there are various methods to obtain access to a specific record. Whether you intend to create, read, write, delete, append, append to, assign or share data from a table, there are two primary checks that are conducted to verify if you have the necessary permissions to carry out the desired action. These checks are referred to as privilege and access checks.

The privilege check is conducted to determine if the user has the necessary permissions to carry out the action. For instance, if you intend to create a new record in a table, the system will verify if you have the create privilege for that particular table. Similarly, if you intend to delete a record from a table, the system will verify if you have the delete privilege for that table.

The access check, on the other hand, verifies if the user has the required access rights to perform the desired action on the record. For instance, if you want to read a record from a table, the system will verify if you have access to that particular record. If you don’t have the required access, you will not be able to perform the action.

Both privilege and access checks are critical in maintaining the integrity and security of the data stored in Dataverse. It ensures that users are granted only the necessary permissions and access rights required to perform their tasks, and prevents unauthorized access or modification of data.