Industrial strength tools for Dynamics CRM

Dynamics CRM Deep Dive: Security

DeepDiveSecurity_Thumbnail

Dive deep into Microsoft Dynamics CRM 2011 security and discover what really happens behind-the-scenes.

 

We will discuss the following topics:

 

Security Organization

organisational-unit-2 We’ll cover the physical and logical organization of the following Dynamics CRM components:

  • Business units
  • Security roles and privileges
  • Users and teams
  • Active Directory
  • SQL Server

 

Auditing, Field-Level Security, and Record Ownership

icon-inspector You’ll learn how the design of your entities and the relationships with other entities effects security including:

  • Auditing
  • Field-level security
  • Record ownership and sharing

 

Troubleshooting Security Issues

maintenance-time We’ll discuss the troubleshooting process for security-related issues.

 

Custom Security Role Definitions

Two custom security role definitions are included which are intended to help reduce the workload of the Dynamics CRM System Administrator.

user-helpdesk

Help Desk User

Companies who have a dedicated help desk can benefit from this new security role because it limits their administration abilities within Dynamics CRM to the following:

  • Creating new CRM users
  • Creating new teams
  • Enabling or disabling users
  • Managing Knowledgebase articles
  • Moving users or teams between business units
user-admin-1

Form Customizer

The Form Customizer security role allows a Dynamics CRM user to create and modify entities and forms but does not allow them to delete any system component.This role is intended to be given to a power-user who has in-depth knowledge of Dynamics CRM customization techniques.

 

Dynamics CRM Security Privilege Cross Reference

directory-schema A complete security-privilege cross reference lists both entity-related and task-related security privileges which helps you correlate privileges seen within the Dynamics CRM user interface with their actual internal name as defined in the Dynamics CRM 2011 Software Development Toolkit.

 

Best Practices

approval Finally, we’ll discuss best practices as applied to each security sub-topic to help you to quickly get up to speed with Dynamics CRM security.

 

Book Excerpt

move-waiting-down-grey Download the excerpt for a sample chapter or review the table of contents.

 

Formats:


Adobe Acrobat (PDF)

$19.95

Add to Cart


Paperback

AmazonUS AmazonCA AmazonUK
navAmazonLogoFooter._V169459258_[1] amazon.fr amazon.it
amazon.es BookDepository BandN

eBook

Amazon Kindle

Apple iBookstore

Barnes & Noble nook

Via SmashWords

Formats:Kindle, Apple iPad/iBooks, Nook, Sony Reader, Kobo, and most e-reading apps including Stanza, Aldiko, Adobe Digital Editions.


Table of Contents

 

  • Chapter 1: Dynamics CRM 2011 Security Overview
  • Chapter 2: Business Units
    • Overview
    • Root Business Unit
    • All Other Business Units
    • Actions that can be applied to a Business Unit
    • Additional Notes
  • Chapter 3: Security Roles and Privileges
    • Overview
    • Pre-Defined Security Roles
    • Privileges
    • Access Levels
    • Actions that can be applied to a Security Role
    • Creating New Security Roles
    • Delete a Security Role
    • Copy a Security Role
    • Editing an Existing Security Role
    • Importing/Exporting Security Roles via Solutions
    • Role Inheritance
    • Additional Notes
    • Best Practices
  • Chapter 4: Users
    • Actions that can be applied to a User
    • Additional Notes
  • Chapter 5: Teams
    • Business-Unit Teams
    • User-Created Teams
    • Actions that can be applied to a Team
    • Team Views and Their Filter Criteria
    • Teams vs. Users
    • Teams
    • Users
    • Performance Implications
    • Additional Notes
  • Chapter 6: Privacy Preferences
    • Usage Reporting
    • Error Reporting
  • Chapter 7: Auditing
    • What is Not Audited
    • What does Dynamics CRM Audit?
    • Enabling Auditing (Overview)
    • Enable Auditing for the Organization
    • Enable Auditing for Each Entity
    • Enable Auditing for Each Field
    • Security Requirements for Auditing
    • Viewing the Audit History
    • Record Audit History
    • System Audit Summary
    • Auditing User Access
    • Auditing Metadata Changes
    • Audit Log Management
    • Auditing Caveats
    • Best Practices
  • Chapter 8: Field-Level Security
    • Enable Field Security on the field
    • Create a Field Security Profile, if one does not exist.
    • Edit the Field Security Profile
    • Select Users or Teams
    • Checking Your Work
    • Auditing Field-Level Security
    • Best Practices
  • Chapter 9: Sharing
    • Sharing Basics
    • Sharing Privileges
    • Sharing Guidelines
    • What Can Be Shared?
    • Caveats
    • Best Practices
  • Chapter 10: Changing Record Ownership (Assign)
    • The Assign Process
    • Share with the original owner
    • Cascading Effects
  • Chapter 11: Custom Entities
    • Security
    • Entity Ownership
  • Chapter 12: One to Many Relationships
    • Relationship Behavior: Parental
    • Relationship Behavior: Referential
    • Relationship Behavior: Referential, Restrict Delete
    • Relationship Behavior: Configurable Cascading
    • Cascade All
    • Cascade Active
    • Cascade User-Owned
    • Cascade None
  • Chapter 13: Active Directory
    • Security Groups
    • PrivReportingGroup
    • PrivUserGroup
    • ReportingGroup
    • SQLAccessGroup
    • Security Group Naming
  • Chapter 14: SQL Server
    • CRM Database Design Primer
    • Tables
    • Views
    • Security
    • SQL Server Logins
    • Database Users
    • Database Roles
    • Reporting and External Queries
    • SQL Server Report Reporting Services (SSRS)
    • Microsoft Excel
  • Chapter 15: CRM Software Development Kit (SDK)
    • Authentication
    • Authorization
  • Chapter 16: Special Users
  • Chapter 17: Dynamics CRM Licenses
    • Read-Write Access Mode
    • Read Access Mode
    • Administrative Access Mode
  • Chapter 18: Enhancing Dynamics CRM 2011
    • Create a Help Desk Security Role
    • Create a Form Customization Security Role
    • Enable Auditing to Track System Level Changes
  • Chapter 19: Troubleshooting Security Errors
  • Appendix A: Security Role and Privilege Definitions
    • Core Records Privileges
    • Miscellaneous Core Record Privileges
    • Marketing Privileges
    • Miscellaneous Marketing Privileges
    • Sales Privileges
    • Miscellaneous Sales Privileges
    • Service Privileges
    • Miscellaneous Service Privileges
    • Business Management Privileges
    • Miscellaneous Business Management Privileges
    • Service Management Privileges
    • Service Management Miscellaneous Privileges
    • Customization Privileges
    • Miscellaneous Customization Privileges
  • Appendix B: Security Access Level and Rights Definitions
  • Appendix C: References and Resources
  • Index
Top