Book Image

Microsoft Dynamics CRM 2016 Customization - Second Edition

By : Nicolae Tarla
Book Image

Microsoft Dynamics CRM 2016 Customization - Second Edition

By: Nicolae Tarla

Overview of this book

Microsoft Dynamics CRM is a Microsoft solution to satisfy the various needs of customer relationship management and is already equipped to be flexible to meet the needs of businesses. With Microsoft Dynamics CRM 2016, many new features were added for social, marketing, sales, and integration with other tools. These features add many dimensions to customization. This book will not only showcase how CRM can be customized, but will also be your guide on how the latest advancements in Dynamics CRM 2016 can be used to benefit your business. You will learn how to enhance the functionality of Microsoft Dynamics CRM 2016 and use it to serve different businesses of various scales. You will see how to get ready to customize CRM and then quickly move on to grasp the CRM app structure, which will help you customize Dynamics CRM better. You will find out how to customize CRM for sales, service, marketing, and social. We’ll also show you how CRM 2016 can be seamlessly embedded into various productivity tools, and how to customize CRM for machine learning and contextual guidance. Finally, we’ll also cover the latest advancements in CRM’s mobile capabilities and its complete offline support so you can better customize it.
Table of Contents (13 chapters)
Microsoft Dynamics CRM 2016 Customization Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Defining Security Roles


Once you have the Business Units defined in your organization, the next step is to start configuring the necessary Security Roles. A Security Role is a collection of privileges to various components of the organization. Entities and other security elements are grouped in categories, and presented on various tabs. The following screenshot presents the settings for the Core Records tab:

Observe how for each entity we have the various options to configure Create, Read, Write, Delete, Append, Append To, Assign, and Share permissions. In addition, at the bottom of the screen we can see the representation for the scope. We can give no permissions at all, or permission at the User level, Business Unit, Parent: Child Business Unit, or the entire Organization. Each scope is larger than the previous one, and is represented as such through the graphical filling of the circle symbol.

When creating new security roles, always create them within a Solution package, so they can be...