Views:

Details

Scenarios / Symptoms

  • Need to segregate access for multiple departments (e.g., Customer Service vs. Finance).
  • Require cross‑team collaboration without exposing all records.
  • Need a scalable model for regional or functional divisions.

Root Cause

Security issues often arise from:

  • Misaligned Business Unit (BU) structure.
  • Overreliance on user‑level roles rather than team‑based access.
  • Mixing owner and access team concepts without clear governance.

Resolution Steps

1) Plan the Business Unit Structure

  • Use Business Units to create logical security boundaries (e.g., UK, EMEA, APAC or Customer Service vs. Field Service).
  • Keep the number of BUs minimal to reduce complexity.
  • Place users and owner teams in the BU where their primary work happens.

Navigation:
Power Platform Admin CenterEnvironmentsSelect EnvironmentSettingsUsers + permissionsBusiness units.


2) Choose Record Ownership Model

  • User/Team-owned tables (e.g., Case, Account) for Customer Service records.
  • Use Owner Teams to centralize ownership for shared queues or shared workload.
  • Use Access Teams for fine-grained sharing on individual records (ad-hoc collaboration).

3) Assign Security Roles at the Right Level

  • Grant Security Roles to Teams first (preferred), then add users to those teams.
  • Use least privilege:
    • Organization-level only when necessary.
    • Prefer Business Unit or Parent: Child Business Units scope.
  • Example roles for Customer Service:
    • CSR – Case Agent
    • CSR – Supervisor
    • CSR – Knowledge Manager
    • CSR – Queue Manager

Navigation:
Power Platform Admin CenterEnvironmentsEnvironmentSettingsUsers + permissionsSecurity roles.


4) Use Teams for Flexibility

  • Owner Teams: Own records; have roles; belong to a BU.
  • Access Teams: Do not own records; provide shared access; dynamic team membership through rules or manually.
  • Azure AD (Microsoft Entra) Group Teams: Map M365 groups to Dataverse teams for automated membership.

Navigation:
Advanced SettingsSecurityTeamsNew.


5) Optional: Hierarchy Security

  • Enable Manager hierarchy to allow managers to access subordinates’ records.
  • Restrict by depth and scopes to avoid overexposure.

Navigation:
SettingsSecurityHierarchy Security.


Validation / Expected Outcome

  • Users only see what they need based on BU, team membership, and role scopes.
  • Supervisors can see team records via hierarchy or team ownership.
  • Collaboration enabled via Access Teams/sharing without over-permissioning.

FAQs / Notes

  • Prefer team-based roles for simplified provisioning.
  • Keep BU changes minimal—moving users across BUs impacts access and may trigger reindexing.
  • For omnichannel scenarios, align queues and routing with teams to simplify security.