Book Image

Microsoft Dynamics 365 Extensions Cookbook

Book Image

Microsoft Dynamics 365 Extensions Cookbook

Overview of this book

Microsoft Dynamics 365 is a powerful tool. It has many unique features that empower organisations to bridge common business challenges and technology pitfalls that would usually hinder the adoption of a CRM solution. This book sets out to enable you to harness the power of Dynamics 365 and cater to your unique circumstances. We start this book with a no-code configuration chapter and explain the schema, fields, and forms modeling techniques. We then move on to server-side and client-side custom code extensions. Next, you will see how best to integrate Dynamics 365 in a DevOps pipeline to package and deploy your extensions to the various SDLC environments. This book also covers modern libraries and integration patterns that can be used with Dynamics 365 (Angular, 3 tiers, and many others). Finally, we end by highlighting some of the powerful extensions available. Throughout we explain a range of design patterns and techniques that can be used to enhance your code quality; the aim is that you will learn to write enterprise-scale quality code.
Table of Contents (19 chapters)
Title Page
Credits
Foreword
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Building cumulative security roles


The Dynamics 365 authorization mechanism is comprehensive and flexible. One of its greatest features is its capability to provide users with cumulative privileges as more security roles are added.

In this recipe we will build three cumulative roles: a base role that every user logging in through the web user interface must have, a read role, and a write role. The union of all three roles will enable users to read/write account and contact entities.

Getting ready

As per most recipes in this chapter, a Packt solution to store your configuration is recommended but not mandatory. You will also need the correct privileges to configure the security roles. Typically, a System Administrator role is used to configure security roles, as the role includes all the necessary privileges required to 'transfer' those privileges into a role. However, the main security privilege required is CRUD to security roles located under Business Management | Entity in security roles...