Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » What’s New in Dynamics 365 for Finance and Operations Security Permissions?
Cybersecurity

What’s New in Dynamics 365 for Finance and Operations Security Permissions?

Alex MeyerBy Alex MeyerJanuary 16, 2021Updated:June 18, 20213 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email

There are a lot of questions about security in D365FO and how it differs from previous versions of AX. If we look specifically at user permissions we can see a couple of things that have changed.

In AX the access level is hierarchy based with one access level being assigned to each object:

No Access -> Read -> Update -> Create -> Correct -> Delete (Full Control)

An excerpt from an MSDN on the topic has the following:

“Read is the weakest permission, and Delete is the strongest. Delete permission includes every other permission. Create permission includes Update and Read. You can set the permission value to NoAccess to prevent all access to the entry point.

The Correct permission applies only when a time state table is involved. This permission authorizes you to issue update records in a time state table.”

Below you can see that you are only able to assign one Access Level per object.

ax_maintainvendors

In D365FO the permissions still follow this hierarchy of permission strength but allow for a piecemeal assignment. This means you can individually select Read, Update, Create, or Delete for each object you are securing. There are also different access types for each access level: Unset, Grant, and Deny. Grant means that the user has the ability to this access level for this object, and Deny means that the user is explicitly being denied this access, and Unset means you are not granting nor denying access to the object so if another role, duty, or privilege grants access to the object then the user will have access.

One thing to keep in mind, is that the Deny access type overrides any Grants assigned to the user for this object from any role, duty, or privilege.

d365_maintainvendors

D365FO also has a new data type called a Data Entity. A data entity is basically a SQL view that will take a normalized database object that could exist across multiple SQL tables and creates one object that an end user can interact with. It is a very powerful feature that can be used by developers and 3rd party applications to interface with D365FO.

Permissions for a data entity include one more property called Integration Mode. This setting will dictate if this element is accessible from OData and/or an import/export or connector integration.

d365_integration

Entry pointDescriptionData servicesThe ability to use OData services (API) for the entity.Data managementThe ability to use asynchronous integration options for the entity, such as import/export and connector integration.

These changes in the security model will need to be kept in mind when designing and applying security to an end user.

You can find more posts like this on my blog at: http://d365foblog.com

Dynamics 365 CE / CRM
Share. Facebook Twitter LinkedIn Email
Alex Meyer

My name is Alex Meyer and I graduated from Iowa State University with a Bachelor of Science degree in Computer Engineering. My focus area in my degree is in networking and security. I am a current Microsoft MVP in Business Applications. I currently work as the Director of Dynamics AX/365 Finance and Operations Development at Fastpath Inc. in Des Moines, Iowa.

Related Posts

How ISVs Like SignUp Software Are Transforming Dynamics 365 ERP with AI and Automation

July 16, 2025

Oracle and AWS Ceasefire Triggers 10 Big Benefits for Customers

July 14, 2025

IBM Launches Industry-First Governance Tools for Agentic AI Security

July 11, 2025

Agentic AI in Action: Bearing’s Vision for the Future of Corporate Security on ServiceNow

July 9, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft MCP Server Gives Broad AI Access to Corporate Assets Stored in Dataverse
  • Oracle’s $30B Cloud Deal Marks Historic Growth Shift
  • Google Cloud U.K. Moonshots Aim to Save $50 Billion and Engineer Time 
  • Google Cloud: U.K. Customers Showcase Power of AI and Cloud
  • SAP Partners with JA Worldwide to Equip 85,000+ Youth for Future Careers

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Special Report: Cloud Wars 2025 CEO Outlook

February 12, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }