Table of Contents Entity-based security privilegesAccess levelsTask-based security privileges There are two types of security privileges – entity based and task based security privileges.
The entity-based security privileges define the actions that a user or team can perform on an entity. An entity-based privilege is defined as a combination of an entity action and access level.
Entity actions
The actions that a user can perform on an entity as follows:
Often a combination of privileges is required to achieve an action. For example, to add a contact to an account, a user will require the read, write, and append privileges on the contact entity and the append to privilege on the account entity.
The access level defines the scope of an entity action. The levels of access that a privilege can have for the user or team owned entities, such as the account or contact system entities, are as follows:
Sharing a record with a user who would otherwise not have access to the record, effectively creates an exception to the normal security configuration granted by the security role, security privileges, and access-level combination.
For the organization-owned entities, such as the product or contact template system entities, the only level of access are as follows:
The task-based security privileges define the features that a user or team can use.
Examples of task-based privileges are as follows:
The task-based security privileges are either granted or denied. Access levels do not apply to most task-based privileges. Access levels apply to a few task-based privileges, such as the pricing override privileges, in the same way as the entity-based privileges.
Carsten Siemens edited Revision 1. Comment: Pirated Content - see my comment
Fernando Lugão Veltem edited Original. Comment: added toc and tags
NOTE: This article was reported as Pirated/Plagiarized Content (content you didn't write) and will be removed. Please do not steal content from others. If you feel we are mistaken, please leave a comment or email tnwiki at Microsoft with a link to this article and with clear and detailed reasons why you own the content or have explicit permission from the author.
Content was taken from: "Microsoft Dynamics CRM 2011 - Customization & Configuration - (MB2-866) Certification Guide - Chap. 3 - Page 63-65"
Published by Neil Benson (Packt Publishing)
www.packtpub.com/.../9781849685801_Chapter_03.pdf