Dynamics CRM Deep Dive: Security
By Mitch Milam
4/5
()
About this ebook
A deep dive into all aspects of security related to the Microsoft Dynamics CRM application and its related components
Mitch Milam
I have been a technology professional for over 27 years and have pursued every imaginable role within the computer industry, but mostly focusing on software. I am currently working as an independent consultant, focusing exclusively on creating products and solutions which utilize Microsoft Dynamics CRM as an xRM platform which could include: o xRM Solution Architecture o xRM Development o xRM Developer training I am a Microsoft Certified Training and a six-time Microsoft Most Valuable Professional (MVP).
Related to Dynamics CRM Deep Dive
Related ebooks
The SAM Leader Survival Guide: A Practical Success Guide for Software Asset Management Professionals Rating: 0 out of 5 stars0 ratingsMDM master data management Third Edition Rating: 0 out of 5 stars0 ratingsIBM Curam A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCRM SALES Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsMicrosoft® Dynamics AX® Interview Questions: Unofficial Microsoft Dynamics AX Axapta Certification Review Rating: 0 out of 5 stars0 ratingsAMS: The next stage in the evolution of IT Outsourcing Rating: 0 out of 5 stars0 ratingsThe Standard for Risk Management in Portfolios, Programs, and Projects (GERMAN) Rating: 0 out of 5 stars0 ratingsSAP Cloud Strategy A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsOperational efficiency Standard Requirements Rating: 0 out of 5 stars0 ratingsMDM of Product Data Solutions Second Edition Rating: 0 out of 5 stars0 ratingsVoice of the customer A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThe Robert Donato Approach to Enhancing Customer Service and Cultivating Relationships Rating: 0 out of 5 stars0 ratingsEnterprise Dark Data A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsMendix Competitors A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsBudget process A Complete Guide Rating: 0 out of 5 stars0 ratingsCloud Transformation A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSalesforce B2C Solution Architect's Handbook: Leverage Salesforce to create scalable and cohesive business-to-consumer experiences Rating: 0 out of 5 stars0 ratingsField Service Management Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsSalesforce Sales Cloud – An Implementation Handbook: A practical guide from design to deployment for driving success in sales Rating: 0 out of 5 stars0 ratings2021 BRM Benchmarking Compensation Analysis Report Rating: 0 out of 5 stars0 ratingsCustomer Support A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSupply Chain Network Design A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsIncident and Problem Management The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsSalesforce Services A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsRelease and deployment management Complete Self-Assessment Guide Rating: 4 out of 5 stars4/5Single customer view Second Edition Rating: 0 out of 5 stars0 ratingsCustomer Master Data A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIT Managed Services A Complete Guide Rating: 0 out of 5 stars0 ratingsInsurance Data Platforms A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratings
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 4 out of 5 stars4/5Storytelling with Data: Let's Practice! Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Data Analytics for Beginners: Introduction to Data Analytics Rating: 4 out of 5 stars4/5Algorithms to Live By: The Computer Science of Human Decisions Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5The Alignment Problem: How Can Machines Learn Human Values? Rating: 4 out of 5 stars4/5Narrative Design for Indies: Getting Started Rating: 4 out of 5 stars4/5Get Into UX: A foolproof guide to getting your first user experience job Rating: 4 out of 5 stars4/5The Unaccountability Machine: Why Big Systems Make Terrible Decisions - and How The World Lost its Mind Rating: 0 out of 5 stars0 ratingsPython for Finance Cookbook: Over 50 recipes for applying modern Python libraries to financial data analysis Rating: 0 out of 5 stars0 ratingsBlack Holes: The Key to Understanding the Universe Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5How Do I Do That In InDesign? Rating: 5 out of 5 stars5/5Python for Beginners: A Crash Course to Learn Python Programming in 1 Week Rating: 0 out of 5 stars0 ratingsAdvances in Financial Machine Learning Rating: 5 out of 5 stars5/5Learn Algorithmic Trading: Build and deploy algorithmic trading systems and strategies using Python and advanced data analysis Rating: 0 out of 5 stars0 ratingsDjango Building Dynamic Website With Django : A Complete Step By Step Guide To Learn to Build Modern Web Application with a Python Rating: 0 out of 5 stars0 ratingsArtificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5Blender 3D Basics Beginner's Guide Second Edition Rating: 5 out of 5 stars5/5Learn SAP MM in 24 Hours Rating: 0 out of 5 stars0 ratingsDeep Learning with PyTorch Rating: 5 out of 5 stars5/5ITIL® 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond, second edition Rating: 5 out of 5 stars5/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 4 out of 5 stars4/5
Reviews for Dynamics CRM Deep Dive
2 ratings1 review
- Rating: 5 out of 5 stars5/5oppo
Book preview
Dynamics CRM Deep Dive - Mitch Milam
Dynamics CRM
Deep Dive:
Security
Published by CRM Accelerators at SmashWords
Copyright 2012 by Mitch Milam
6401 W. Eldorado Parkway, Suite 106
McKinney, TX 75070
http://www.crmaccelerators.net
ISBN: 1938097017
ISBN–13: 978-1-938097-01-0
Smashwords Edition, License Notes
This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to Smashwords.com and purchase your own copy. Thank you for respecting the hard work of this author.
Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of CRM Accelerators.
Making unauthorized copies, adaptations, compilations, or derivative works for commercial distribution is prohibited and constitutes a punishable violation of the law.
Microsoft, MS-DOS, Windows, Windows Server, Windows Vista, Microsoft Dynamics, Active Directory, BizTalk, and Outlook are trademarks or registered trademarks of the Microsoft group of companies.
All other trademarks are property of their respective owners.
Editor: Jennifer Franz Milam
Technical Reviewer: Josh Behl (summitgroupsoftware.com)
Cover: Donna Casey (digitaldonna.com)
Bonus material:
If you would like to obtain an electronic copy of the SQL scripts used to research this book and a solution containing the Help Desk and Form Customizer security roles, send an email to: books@crmaccelerators.net with a subject line of: 94911
Contents
Chapter 1: Dynamics CRM 2011 Security Overview
Chapter 2: Business Units
Chapter 3: Security Roles and Privileges
Chapter 4: Users
Chapter 5: Teams
Chapter 6: Privacy Preferences
Chapter 7: Auditing
Chapter 8: Field–Level Security
Chapter 9: Sharing
Chapter 10: Changing Record Ownership (Assign)
Chapter 11: Custom Entities
Chapter 12: One to Many Relationships
Chapter 13: Active Directory
Chapter 14: SQL Server
Chapter 15: CRM Software Development Kit (SDK)
Chapter 16: Special Users
Chapter 17: Dynamics CRM Licenses
Chapter 18: Enhancing Dynamics CRM 2011
Chapter 19: Troubleshooting Security Errors
Chapter 20: Security Role and Privilege Definitions
Chapter 21: Security Access Level and Rights Definitions
Chapter 22: References and Resources
ACKNOWLEDGMENTS
I would like to thank the following people who were indispensable in the production of this book:
Amy Langlois, Corey Hanson, Jennifer Franz Milam, Josh Behl
Chapter 1:Dynamics CRM 2011 Security Overview
Microsoft Dynamics CRM uses role–based security to grant access to resources within the Dynamics CRM system using the following components:
tmp_3f1287501d607612bb21db980152d85b_221pr3_html_4ee0f0cb.pngBusiness Units are the main container for security objects which include: Users, Teams, and Security Roles.
Users are accounts which are authenticated personnel which map to either Active Directory or Windows Live users.
Security Roles are defined per business unit to identify a type of person or a job description for people accessing the Dynamics CRM system.
Privileges exist within each security role and represent an action that can be taken on an entity. For example, the Create Account, Update Contact, or Delete Case privileges define the privilege for creating Accounts, updating Contacts, and deleting Cases (respectively) in Dynamics CRM.
Access Levels within each Privilege determine the scope of access for a privilege within a specific security role.
The fundamental concept of role–based security is that a security role contains privileges that define a set of