Book Image

Microsoft Power Platform Functional Consultant: PL-200 Exam Guide

By : Julian Sharp
Book Image

Microsoft Power Platform Functional Consultant: PL-200 Exam Guide

By: Julian Sharp

Overview of this book

The Power Platform Functional Consultant Associate (PL-200) exam tests and validates the practical skills of Power Platform users who are proficient in developing solutions by combining the tools in Power Platform and the Microsoft 365 ecosystem based on business needs. This certification guide offers complete, up-to-date coverage of the PL-200 exam so you can prepare effectively for the exam. Written in a clear, succinct way with self-assessment questions, exam tips, and mock exams with detailed explanations of solutions, this book covers common day-to-day activities involved in configuring Power Platform, such as managing entities, creating apps, implementing security, and managing system change. You'll also explore the role of a functional consultant in creating a data model in the Microsoft Dataverse (formerly Common Data Service). Moving ahead, you'll learn how to design the user experience and even build model-driven and canvas apps. As you progress, the book will show you how to manage automation and create chatbots. Finally, you'll understand how to display your data with Power BI and integrate Power Platform with Microsoft 365 and Microsoft Teams. By the end of this book, you'll be well-versed with the essential concepts and techniques required to prepare for the PL-200 certification exam.
Table of Contents (34 chapters)
Section 1: Introduction
Section 2: Microsoft Dataverse
Section 3: Power Apps
Section 4: Automation
Section 5: Power Virtual Agents
Section 6: Integrations

Business units, users, and security roles

Business units are the cornerstone of security in the CDS. All users must belong to one, and only one, business unit. A user's access to records flows from their place in the business unit hierarchy.

This section explains how business units, users, and security roles come together to give users access to data. Security starts from the hierarchy of business units and the location of a user within this hierarchy. The following diagram shows an example business unit hierarchy with users assigned to different business units:

Figure 8.10 – Users and business units

Let's look at the Read Account privilege for a security role using the business unit hierarchy in the preceding diagram:

  • A user in the North business unit with a Read Account privilege access level set to Business Unit will be able to view accounts that they own and accounts that are owned by the other users who are in the North business unit.
  • A user in the Sales...