When implementing Microsoft Dynamics CRM, many people save security for last because of the many screens and questions that need to be answered, or worst yet, some give everyone Administrator access so they do not have to configure it. In my 8+ years of implementing Microsoft Dynamics CRM, I have seen many companies struggle with this. In almost all of the cases, the security setup has inflamed the user’s lack of adoption of a system that should have worked for them. In this post I will review a methodology to starting the security tailoring process within Microsoft Dynamics CRM. This methodology is not going to dive into every little detailed aspect of security, but take a broad look and approach to security setup within CRM. If you cannot get it started correctly, it doesn’t matter what the details are if your foundation is faulty. If however, you have a strong foundation and you must rebuild your security house, you can with fewer issues and less stress on your users.
There are two approaches to security administration that you need to decide upon. Ask yourself if you will have one role per security group, or will you build a layered security methodology? Many people will take the first approach and in fact Microsoft’s out-of-box security roles are named to suggest this approach. I suggest thinking about your options and picking the one you really need. The second approach is the layered security methodology. With this approach you start with a basic/general security role that all users must have and add more roles on top to add additional security. For example, let us say we have a security role called “standard users” which give read access to accounts and read/write access to contacts. In our organization only managers can update accounts. We would then have another security group called “managers” where this security group is blank with the exception of Accounts where we now have modify access checked.
1 thought on “Top Tips to Setting-Up Security in Microsoft Dynamics CRM”
Mike Kolling
Hi
Can you email me the two PDFs referenced in the text as the links don't work?
Cheers
MIke
Comments are closed.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Hi
Can you email me the two PDFs referenced in the text as the links don't work?
Cheers
MIke