Book Image

Microsoft Power Platform Enterprise Architecture

By : Robert Rybaric
Book Image

Microsoft Power Platform Enterprise Architecture

By: Robert Rybaric

Overview of this book

For forward-looking architects and decision makers who want to craft complex solutions to serve growing business needs, Microsoft Power Platform Enterprise Architecture offers an array of architectural best practices and techniques. With this book, you’ll learn how to design robust software using the tools available in the Power Platform suite and be able to integrate them seamlessly with various Microsoft 365 and Azure components. Unlike most other resources that are overwhelmingly long and unstructured, this book covers essential concepts using concise yet practical examples to help you save time. You’ll develop the skills you need to architect, design, and manage a complex solution as you follow the journey of a fictitious enterprise customer as they enter the world of Power Platform. Throughout the book, you’ll discover how to combine the functionality of Power Apps, Power Automate, Power BI, and Power Virtual Agents with various methodologies to effectively address application lifecycle management, security, and extensibility. Finally, you'll learn how to overcome common challenges in migrating data to and from Microsoft Power Platform using proven techniques. By the end of this book, you’ll have the strategic perspective of an enterprise architect to make accurate architectural decisions for your complex Power Platform projects.
Table of Contents (15 chapters)
1
Section 1: The Basics
4
Section 2: The Architecture
8
Section 3: Implementation

Presenting security best practices

In this section, you will make yourself familiar with some best practices for building a robust and mature Power Platform security model. Following the best practices can ensure that your Power Platform solution fulfills the necessary security standards and that you are building a solution that can be maintained and upgraded in the future.

CDS security roles

In this section, we will present some proven best practices for designing, implementing, and using CDS security roles.

Modifying security roles

Security configuration in CDS applications can be very simple, where the default CDS or Dynamics 365 security roles can be used without any modification. However, if the security requirements are specific and detailed, there might be a need to tailor the standard permissions. In such a case, it is highly recommended not to modify the default security roles, but rather create new custom roles. The best method is to select the best suitable standard...