Security

In this chapter, we will cover the following recipes:

  • Building cumulative security roles
  • Configuring business unit hierarchies
  • Configuring access based on hierarchical positions
  • Configuring and assigning field-level security
  • Setting up teams and sharing
  • Setting up Access Teams
  • Encrypting data at rest to meet the FIPS 140-2 standard
  • Managing your Dynamics 365 online SQL TDE encryption key
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.196.175