Dynamics CRM Deep Dive: Security


Dive deep into the Dynamics CRM 2011 security and discover what really happens behind €“the €“scenes. We will cover the following topics:

  • Business units
  • Security roles and privileges
  • Users and teams
  • Auditing
  • Field-level security
  • Record ownership and sharing
  • How Dynamics CRM applies security at the Active Directory and SQL levels

You'll learn how to troubleshoot security-related issues and learn how the design of your entities and the relationships with other entities effects security..

We'll also show you how to create custom security roles for users of your Help Desk and that need to have form customization capabilities but not be able to change or remove metadata.

Also included is a complete list of Dynamics CRM security privileges which allows you to cross reference the information found in the Dynamics CRM user interface with their internal names.

Finally, we'll discuss best practices as applied to each security sub-topic to help you to quickly get up to speed with Dynamics CRM security.

Download the excerpt.

Price: $19.95




Add to Cart

View Cart

Paperback AmazonUS  

Via SmashWords

Formats:Kindle, Apple iPad/iBooks, Nook, Sony Reader, Kobo, and most e-reading apps including Stanza, Aldiko, Adobe Digital Editions.


Table of Contents


  • Chapter 1: Dynamics CRM 2011 Security Overview
  • Chapter 2: Business Units
  • Overview
  • Root Business Unit
  • All Other Business Units
  • Actions that can be applied to a Business Unit
  • Additional Notes
  • Chapter 3: Security Roles and Privileges
    • Overview
    • Pre €“Defined Security Roles
    • Privileges
    • Access Levels
    • Actions that can be applied to a Security Role
    • Creating New Security Roles
    • Delete a Security Role
    • Copy a Security Role
    • Editing an Existing Security Role
    • Importing/Exporting Security Roles via Solutions
    • Role Inheritance
    • Additional Notes
    • Best Practices
  • Chapter 4: Users
    • Actions that can be applied to a User
    • Additional Notes
  • Chapter 5: Teams
    • Business €“Unit Teams
    • User €“Created Teams
    • Actions that can be applied to a Team
    • Team Views and Their Filter Criteria
    • Teams vs. Users
    • Teams
    • Users
    • Performance Implications
    • Additional Notes
  • Chapter 6: Privacy Preferences
    • Usage Reporting
    • Error Reporting
  • Chapter 7: Auditing
    • What is Not Audited
    • What does Dynamics CRM Audit?
    • Enabling Auditing (Overview)
    • Enable Auditing for the Organization
    • Enable Auditing for Each Entity
    • Enable Auditing for Each Field
    • Security Requirements for Auditing
    • Viewing the Audit History
    • Record Audit History
    • System Audit Summary
    • Auditing User Access
    • Auditing Metadata Changes
    • Audit Log Management
    • Auditing Caveats
    • Best Practices
  • Chapter 8: Field €“Level Security
    • Enable Field Security on the field
    • Create a Field Security Profile, if one does not exist.
    • Edit the Field Security Profile
    • Select Users or Teams
    • Checking Your Work
    • Auditing Field €“Level Security
    • Best Practices
  • Chapter 9: Sharing
    • Sharing Basics
    • Sharing Privileges
    • Sharing Guidelines
    • What Can Be Shared?
    • Caveats
    • Best Practices
  • Chapter 10: Changing Record Ownership (Assign)
    • The Assign Process
    • Share with the original owner
    • Cascading Effects
  • Chapter 11: Custom Entities
    • Security
    • Entity Ownership
  • Chapter 12: One to Many Relationships
    • Relationship Behavior: Parental
    • Relationship Behavior: Referential
    • Relationship Behavior: Referential, Restrict Delete
    • Relationship Behavior: Configurable Cascading
    • Cascade All
    • Cascade Active
    • Cascade User €“Owned
    • Cascade None
  • Chapter 13: Active Directory
    • Security Groups
    • PrivReportingGroup
    • PrivUserGroup
    • ReportingGroup
    • SQLAccessGroup
    • Security Group Naming
  • Chapter 14: SQL Server
    • CRM Database Design Primer
    • Tables
    • Views
    • Security
    • SQL Server Logins
    • Database Users
    • Database Roles
    • Reporting and External Queries
    • SQL Server Report Reporting Services (SSRS)
    • Microsoft Excel
  • Chapter 15: CRM Software Development Kit (SDK)
    • Authentication
    • Authorization
  • Chapter 16: Special Users
  • Chapter 17: Dynamics CRM Licenses
    • Read €“Write Access Mode
    • Read Access Mode
    • Administrative Access Mode
  • Chapter 18: Enhancing Dynamics CRM 2011
    • Create a Help Desk Security Role
    • Create a Form Customization Security Role
    • Enable Auditing to Track System Level Changes
  • Chapter 19: Troubleshooting Security Errors
  • Appendix A: Security Role and Privilege Definitions
    • Core Records Privileges
    • Miscellaneous Core Record Privileges
    • Marketing Privileges
    • Miscellaneous Marketing Privileges
    • Sales Privileges
    • Miscellaneous Sales Privileges
    • Service Privileges
    • Miscellaneous Service Privileges
    • Business Management Privileges
    • Miscellaneous Business Management Privileges
    • Service Management Privileges
    • Service Management Miscellaneous Privileges
    • Customization Privileges
    • Miscellaneous Customization Privileges
  • Appendix B: Security Access Level and Rights Definitions
  • Appendix C: References and Resources
  • Index
  • 80 thoughts on “Dynamics CRM Deep Dive: Security”

    Comments are closed.

    Sharing information and lessons learned with other developers

    Sign up for our new KnowledgeBits service and get news, tips and tricks and more, delivered straight to your inbox.