Dataverse / Dynamics 365 Security Roles – The 3 Phases
Image Source:
Dynamics 365
Aug 23, 2023 1:00 PM

Dataverse / Dynamics 365 Security Roles – The 3 Phases

by HubSite 365 about Thomas Sandsør (CRM Keeper) [MVP]

Microsoft MVP | Manager Dynamics 365 at Point Taken AS | CRMKeeper | Dynamics 365 CE Veteran | Power Platform Enthusiast

Pro UserDynamics 365Microsoft DataverseLearning Selection

Security Roles the least fun part about Power Platform – Dataverse / Dynamics 365. I would rather use hours finding the right ICON for every single custom entit

Security roles form an integral part of any technical platform's functionality, particularly the Power Platform - Dataverse / Dynamics 365. The three primary phases involved in these roles include creating the role, where the emphasis is on replicating existing roles rather than starting anew. This is especially true when dealing with Dynamics 365 and Power Platform environments, the suggested beginning point being the Salesperson’s security role for Dynamics sales, and Basic User for Power Platform.

  • Security roles are crucial to the platform's operation.
  • Three main phases are involved in security roles.
  • Creating the role is the first phase.
  • Replicating existing roles is preferred to starting from scratch.
  • Dynamics 365 and Power Platform suggest starting from the Salesperson’s security role and Basic User, respectively.
  • It's common for users to expect a simple, single security role for everyone.
  • Admin roles become necessary for administrative tasks within a few weeks.
  • All users should have delete actions limited to avoid unintended deletions in the system's early stages.

Further Discussion on Security Roles

Security roles' importance cannot be overstated, especially when dealing with comprehensive platforms such as Dynamics 365 and Power Platform. The role creation process, especially, requires a strategic approach. Starting with an existing role, such as the Salesperson's role for Dynamics or the Basic User for Power Platform, rather than from scratch, can prove to be far more efficient. However, while a uniform security role may seem like an initially attractive approach for simplicity, the need for additional roles, including administrator roles, typically arises within the first few weeks

Read the full article Security Roles – The 3 Phases

Learn about Security Roles – The 3 Phases

Security Roles are a necessary but often overlooked aspect of Power Platform / Dataverse / Dynamics 365. When working on new solutions, it is important to start with an existing role such as Salesperson for Dynamics Sales or Basic User for Power Platform. Creating a role from scratch is not recommended. It is also important to note that adding additional roles later may be necessary and to limit delete actions until the system is fully tested. Finally, users should be taught to respect data and handle it with care.

The first step in creating a role is to look at existing blogs. Microsoft provides a blog on security roles and privileges, as well as a few others such as Malindo Nosomartnes, Nishant Rana and CRM Keeper. These blogs provide tips and advice on creating effective roles, as well as how to use the new modern UI for roles.

Once a role is chosen, it is important to consider what type of access to give users. It is suggested to give more access to users, with the understanding that they will be taught how to handle data correctly. It is also important to limit delete actions until the system is tested.

Finally, when the security roles are completed, it is important to go back and review them to ensure that they provide the necessary access for users. This is an important step to ensure that users have the right access to do their job, while also protecting the data from misuse.


More links on about Security Roles – The 3 Phases

Security roles and privileges - Power Platform
Jun 23, 2023 — A security role consists of record-level privileges and task-based privileges of the following three types: Tables: Table privileges define ...
3 Phases of Network Security
Sep 6, 2018 — This stage should start with discovery and visibility which can include components such as users, equipment, operating systems, networks, ...
Process Management Security Roles
Process Management Security Roles ; Submitter. You can move the process unit to the final stage of the review process so that it is ready for approval.
The Information Security Process: Prevention, Detection ...
Information Security process has many strategies and activities, we can group them all into three distinct phases - prevention, detection, and response.
How to Use Security Roles - Knowledge Base - KnowBe4
Nov 22, 2017 — Once you have set up groups, you can follow the steps below to create Security Roles for specific groups: Navigate to the Users tab in your ...
Health Information System Role-Based Access Control ...
by MA de Carvalho Junior · 2018 · Cited by 39 — It can be divided in three phases in which the initial two are related to subject interaction and the third to the object: identification, authentication, ...
Assigning security roles for users and user groups
System level security roles provide access control to major functional areas for managing the overall system, whereas resource level security sub-roles and ...


Microsoft Security Roles, Power Platform Security Roles, Dynamics 365 Security Roles, Dataverse Security Roles, Security Role Customization.