Book Image

Becoming a Dynamics 365 Finance and Supply Chain Solution Architect

By : Brent Dawson
Book Image

Becoming a Dynamics 365 Finance and Supply Chain Solution Architect

By: Brent Dawson

Overview of this book

Implementing an ERP project is a daunting task, and it can often get derailed due to several reasons, including but not limited to inefficient planning, inadequate resource scoping, insufficient working knowledge of ERP systems, and more. Becoming a Dynamics 365 Finance and Supply Chain Solution Architect helps you understand the intricacies of ERP project implementation for seamless deployment. This comprehensive guide helps you gain a deep understanding of how to implement and optimize robust business applications that meet the evolving needs of organizations. You’ll discover various integration methodologies to integrate different software applications and plan successful data migration seamlessly. By leveraging the author’s expertise, you’ll explore different challenges that can lead to project failure or cost/time overruns, along with customized solutions to maneuver past those issues for a successful outcome. By the end of the book, you’ll be able to identify potential issues that can negatively impact the delivery of the project and make design decisions that will prevent any potential negative impact on the design and functionality of the system at go-live stage.
Table of Contents (18 chapters)
1
Part 1: Architectural Considerations and Best Practices for D365 Finance and SCM
8
Part 2: From Solution Design to Deployment – Practical Advice

What does security look like in D365 F&SCM?

Security in D365 F&SCM is one of the most important, but also complicated, jobs that an administrator must manage daily. No matter how much a business identifies and configures security during the project, there will always be some reason for it to change. Mostly, it’s due to a lack of ability of out-of-the-box roles to fulfil a requirement. The security architecture is based on roles, duties, privileges, and permissions.

D365 security architecture

The security model is based on a hierarchy. The different levels represent differing degrees of detail. The following figure shows how the hierarchy is laid out:

Figure 4.2: Security model in D365 F&SCM

Figure 4.2: Security model in D365 F&SCM

The security model is designed in such a way that each level is responsible for a different piece of the system. The following make up the hierarchy:

  • Azure Active Directory: This is the primary part that validates the user is authentic...