Book Image

Microsoft Power Platform Functional Consultant: PL-200 Exam Guide

By : Julian Sharp
Book Image

Microsoft Power Platform Functional Consultant: PL-200 Exam Guide

By: Julian Sharp

Overview of this book

The Power Platform Functional Consultant Associate (PL-200) exam tests and validates the practical skills of Power Platform users who are proficient in developing solutions by combining the tools in Power Platform and the Microsoft 365 ecosystem based on business needs. This certification guide offers complete, up-to-date coverage of the PL-200 exam so you can prepare effectively for the exam. Written in a clear, succinct way with self-assessment questions, exam tips, and mock exams with detailed explanations of solutions, this book covers common day-to-day activities involved in configuring Power Platform, such as managing entities, creating apps, implementing security, and managing system change. You'll also explore the role of a functional consultant in creating a data model in the Microsoft Dataverse (formerly Common Data Service). Moving ahead, you'll learn how to design the user experience and even build model-driven and canvas apps. As you progress, the book will show you how to manage automation and create chatbots. Finally, you'll understand how to display your data with Power BI and integrate Power Platform with Microsoft 365 and Microsoft Teams. By the end of this book, you'll be well-versed with the essential concepts and techniques required to prepare for the PL-200 certification exam.
Table of Contents (34 chapters)
Section 1: Introduction
Section 2: Microsoft Dataverse
Section 3: Power Apps
Section 4: Automation
Section 5: Power Virtual Agents
Section 6: Integrations

Security roles

The CDS employs the concept of Role-Based Access Control (RBAC). Note that roles within the CDS are referred to as security roles. A security role is a collection of privileges and access levels. There are several security roles provided to enable you to get started quickly, for example, the Common Data Service User role shown in the following screenshot:

Figure 8.5 – Common Data Service User security role

There are two types of privilege contained in a security role:

  • Record-level: For entities and records
  • Task-based: For specific features or operations

The following screenshot shows some of the record-level privileges in a security role:

Figure 8.6 – Record-level privileges

As shown in the previous screenshot, record-level privileges define the operations that a user can perform for each entity, and for the records of that entity:

  • Create: Used to create a new record.
  • Read: Used to view records.
  • Write: Used to edit or update records.
  • Delete...