Book Image

Microsoft Dynamics 365 Extensions Cookbook

Book Image

Microsoft Dynamics 365 Extensions Cookbook

Overview of this book

Microsoft Dynamics 365 is a powerful tool. It has many unique features that empower organisations to bridge common business challenges and technology pitfalls that would usually hinder the adoption of a CRM solution. This book sets out to enable you to harness the power of Dynamics 365 and cater to your unique circumstances. We start this book with a no-code configuration chapter and explain the schema, fields, and forms modeling techniques. We then move on to server-side and client-side custom code extensions. Next, you will see how best to integrate Dynamics 365 in a DevOps pipeline to package and deploy your extensions to the various SDLC environments. This book also covers modern libraries and integration patterns that can be used with Dynamics 365 (Angular, 3 tiers, and many others). Finally, we end by highlighting some of the powerful extensions available. Throughout we explain a range of design patterns and techniques that can be used to enhance your code quality; the aim is that you will learn to write enterprise-scale quality code.
Table of Contents (19 chapters)
Title Page
Credits
Foreword
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Setting up teams and sharing


Another great security feature in Dynamics 365 is team ownership. Team ownership greatly enhances complex sharing scenarios across different business units.

As discussed previously in this chapter, the Dynamics 365 security model is driven by record ownership and business unit structure. In the Configuring business unit hierarchies recipe earlier in this chapter, we discussed how users belonging to different business units, and with different security roles, will have access to different records with different levels of privileges. In this recipe we will demonstrate how a user who usually doesn't have full privileges to a record can easily get correct access by becoming a member of a team with the correct security role.

Leveraging the security model created in this chapter's Configuring business unit hierarchies, we will extend the example to include a team belonging to the United States business unit and with the global security role to show how team membership...