Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Dynamics CRM Deep Dive: Security
Dynamics CRM Deep Dive: Security
Dynamics CRM Deep Dive: Security
Ebook137 pages1 hour

Dynamics CRM Deep Dive: Security

Rating: 4 out of 5 stars

4/5

()

Read preview

About this ebook

A deep dive into all aspects of security related to the Microsoft Dynamics CRM application and its related components

LanguageEnglish
PublisherMitch Milam
Release dateMar 10, 2012
ISBN9781938097010
Dynamics CRM Deep Dive: Security
Author

Mitch Milam

I have been a technology professional for over 27 years and have pursued every imaginable role within the computer industry, but mostly focusing on software. I am currently working as an independent consultant, focusing exclusively on creating products and solutions which utilize Microsoft Dynamics CRM as an xRM platform which could include: o xRM Solution Architecture o xRM Development o xRM Developer training I am a Microsoft Certified Training and a six-time Microsoft Most Valuable Professional (MVP).

Related to Dynamics CRM Deep Dive

Related ebooks

Applications & Software For You

View More

Related articles

Reviews for Dynamics CRM Deep Dive

Rating: 4 out of 5 stars
4/5

2 ratings1 review

What did you think?

Tap to rate

Review must be at least 10 words

  • Rating: 5 out of 5 stars
    5/5
    oppo

Book preview

Dynamics CRM Deep Dive - Mitch Milam

Dynamics CRM

Deep Dive:

Security

Published by CRM Accelerators at SmashWords

Copyright 2012 by Mitch Milam

6401 W. Eldorado Parkway, Suite 106

McKinney, TX 75070

http://www.crmaccelerators.net

ISBN: 1938097017

ISBN–13: 978-1-938097-01-0

Smashwords Edition, License Notes

This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to Smashwords.com and purchase your own copy. Thank you for respecting the hard work of this author.

Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of CRM Accelerators.

Making unauthorized copies, adaptations, compilations, or derivative works for commercial distribution is prohibited and constitutes a punishable violation of the law.

Microsoft, MS-DOS, Windows, Windows Server, Windows Vista, Microsoft Dynamics, Active Directory, BizTalk, and Outlook are trademarks or registered trademarks of the Microsoft group of companies.

All other trademarks are property of their respective owners.

Editor: Jennifer Franz Milam

Technical Reviewer: Josh Behl (summitgroupsoftware.com)

Cover: Donna Casey (digitaldonna.com)

Bonus material:

If you would like to obtain an electronic copy of the SQL scripts used to research this book and a solution containing the Help Desk and Form Customizer security roles, send an email to: books@crmaccelerators.net with a subject line of: 94911

Contents

Chapter 1: Dynamics CRM 2011 Security Overview

Chapter 2: Business Units

Chapter 3: Security Roles and Privileges

Chapter 4: Users

Chapter 5: Teams

Chapter 6: Privacy Preferences

Chapter 7: Auditing

Chapter 8: Field–Level Security

Chapter 9: Sharing

Chapter 10: Changing Record Ownership (Assign)

Chapter 11: Custom Entities

Chapter 12: One to Many Relationships

Chapter 13: Active Directory

Chapter 14: SQL Server

Chapter 15: CRM Software Development Kit (SDK)

Chapter 16: Special Users

Chapter 17: Dynamics CRM Licenses

Chapter 18: Enhancing Dynamics CRM 2011

Chapter 19: Troubleshooting Security Errors

Chapter 20: Security Role and Privilege Definitions

Chapter 21: Security Access Level and Rights Definitions

Chapter 22: References and Resources

ACKNOWLEDGMENTS

I would like to thank the following people who were indispensable in the production of this book:

Amy Langlois, Corey Hanson, Jennifer Franz Milam, Josh Behl

Chapter 1:Dynamics CRM 2011 Security Overview

Microsoft Dynamics CRM uses role–based security to grant access to resources within the Dynamics CRM system using the following components:

Business Units are the main container for security objects which include: Users, Teams, and Security Roles.

Users are accounts which are authenticated personnel which map to either Active Directory or Windows Live users.

Security Roles are defined per business unit to identify a type of person or a job description for people accessing the Dynamics CRM system.

Privileges exist within each security role and represent an action that can be taken on an entity. For example, the Create Account, Update Contact, or Delete Case privileges define the privilege for creating Accounts, updating Contacts, and deleting Cases (respectively) in Dynamics CRM.

Access Levels within each Privilege determine the scope of access for a privilege within a specific security role.

The fundamental concept of role–based security is that a security role contains privileges that define a set of

Enjoying the preview?
Page 1 of 1