Ana səhifə

2011 Administrator’s Guide Copyright


Yüklə 0.73 Mb.
səhifə4/37
tarix18.07.2016
ölçüsü0.73 Mb.
1   2   3   4   5   6   7   8   9   ...   37

Set system-wide privacy preferences


Can I do this task?

This task requires the System Administrator security role or equivalent permissions. More information about specific permissions and performing this task while offline: Configuration Permissions

Your organization can participate in the Customer Experience Improvement Program for Microsoft Dynamics CRM. If you participate, Microsoft collects anonymous information about your hardware configuration and how you use Microsoft hardware and services in order to identify trends and usage patterns. No personal information is collected. Microsoft uses this information to improve the products and features you use most often.


  1. In the Navigation Pane, click Settings, click Administration, and then click Privacy Preferences.

For more information about the Customer Experience Improvement Program program, click the Learn more about what Microsoft Dynamics CRM data will be collected and sent to Microsoft link.

  1. Select or clear the check box.

  2. Click Save or Save and Close.



Determining E-mail Access for Your Organization


People in your organization can send or receive e-mail with Microsoft Dynamics CRM and the messages are saved as e-mail activities. If your organization does not use Microsoft Dynamics CRM to send or receive messages, then you do not need to do anything further and the rest of this topic does not apply.

Important If someone on your system tries to send e-mail, and the system is not set up correctly, the e-mail record status may show as "Sent", but a warning will indicate that the e-mail is waiting to be submitted.

Controlling Data Access


To control data access, you must set up an organizational structure that both protects sensitive data and enables collaboration where appropriate. You do this by setting up business units, security roles, and field security profiles.

Business Units


A business unit basically is a group of users. Large organizations with multiple customer bases often use multiple business units to control data access and define security roles so that users can access records only in their own business unit.

Security Roles


A security role defines how different types of records can be accessed by one category of users, such as all salespeople. To control access to data, you can modify existing security roles, create new security roles, or change which security roles are assigned to each user. Each user can have multiple security roles.

Security role privileges are cumulative: when a user has more than one security role, the user will have any privilege allowed in any of the assigned security roles.

Each security role consists of record-level privileges and task-based privileges. The access level for each privilege determines which records can be accessed: None, User, Business Unit, Parent: Child Business Unit, and Organization.

Each type of record is either user-owned or organization-owned. Record-level privileges define what tasks a user with access to the record can do, such as Read, Create, Delete, Write, Assign, Share, Append, and Append To.


Overriding Security Roles


The owner of a record or a person who has the Share privilege on a record can share a record with other users or teams. Sharing can add Read, Write, Delete, Append, Assign, and Share privileges for specific records. More information: Share or Assign Records and Views

Teams are used primarily for sharing records that team members ordinarily couldn't access. More information: Work with Teams (on page 14)

It is not possible to remove access for a particular record. Any change to a security role privilege applies to all records of that record type.

Securing Custom Fields


In Microsoft Dynamics CRM, fields on forms can have read, create, and update permissions. Create or change custom field permissions using the Field Security setting on the field customization form and by establishing Field Security Profiles.

Field security profiles are similar to security roles in Microsoft Dynamics CRM. Both specify what users or groups of users can see, modify, or create in Microsoft Dynamics CRM.

When creating a custom field on a form, you have the option to use field security. Using field security for a field limits access to a field based on a user's field security profile. Not using field security for a field bases any restrictions to the field only on a user's security role.

Work with Security Roles


Can I do this task?

This task requires the System Administrator security role or equivalent permissions. More information about specific permissions and performing this task while offline: Configuration Permissions

Before editing a security role, you should understand how data access is controlled. More information: Controlling Data Access (on page 8)

The recommended way to create a new security role is to copy an existing security role and modify it. More information: Select the Copy a security role option.



  1. In the Navigation Pane, click Settings, click Administration, and then click Security Roles.

  2. To edit a security role, double-click the security role.

- OR -

To create a new security role, on the Actions toolbar, click New, and on the the Common tab, type the name of the security role.

Tip

You cannot modify the System Administrator security role. To create a security role similar to the System Administrator security role, copy the System Administrator security role to a new security role, and make changes to the new security role.



  1. Set the privileges on each tab.

To change the access level for a privilege, click the symbol. Every time that you click, the access level changes and the symbol cycles through the applicable symbols for that record and access level. The possible access levels depend on whether the record type is organization-owned or user-owned.

Tip


To cycle through the access levels, you can also click the privilege column heading, or click the record type multiple times.

  1. Click Save or Save and Close.

Note

If you need to back up your security role changes, or export security roles for use in a different implementation of Microsoft Dynamics CRM, you can export them as part of exporting customizations. More information: Export Customizations and Configurations


Related Topics


Controlling Data Access 8

View Your User Profile 25

Work with Security Roles 9


Can I do this task?

This task requires the System Administrator security role or equivalent permissions. More information about specific permissions and performing this task while offline: Configuration Permissions

If you want to create a security role that is similar to another security role, you can copy a security role with a new name and then modify the privileges and access levels for the new security role. You cannot copy a security role to a different business unit.


  1. In the Navigation Pane, click Settings, click Administration, and then click Security Roles.

  2. Select the security role you want to copy.

  3. On the Actions toolbar, click Actions, and then click Copy Role.

  4. In the Copy Security Role dialog box, in the New Role Name box, type the name for the new security role.

  5. If you want to change the privileges for the new security role, select the Open a new security role when copying is complete check box.

  6. Click OK.

Note

If you need to back up your security role changes, or export security roles for use in a different implementation of Microsoft Dynamics CRM, you can export them as part of exporting customizations. More information: Export Customizations and Configurations


Related Topics


Controlling Data Access 8

Manage a User's Record 16

Work with Security Roles 9


Can I do this task?

This task requires the System Administrator security role or equivalent permissions. More information about specific permissions and performing this task while offline: Configuration Permissions



  1. In the Navigation Pane, click Settings, click Administration, and then click Users.

  2. In the list, select the user to whom you want to assign a security role.

  3. On the Actions menu, click Manage Roles. The security roles listed are those that have been created for the business unit associated with the user or users. Note that this means users can be assigned only the security roles for the business unit with which they have been associated.

  4. In the Manage User Roles dialog box, select one or more of the security roles that you want to assign to the user or users, and then click OK.

Related Topics


Controlling Data Access 8

Manage a User's Record 16

Work with Security Roles 9

Work with Your User Record and Work Hours 17




1   2   3   4   5   6   7   8   9   ...   37


Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©atelim.com 2016
rəhbərliyinə müraciət