Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic

Scalable Security Modeling with Microsoft Dynamics CRM 2011

Author: Roger Gilchrist

Published: June 2013

Summary

Microsoft Dynamics CRM offers a wide range of security modeling features, and it is important to choose the most appropriate approach to implementing a particular solution. This paper describes how security modeling features in Microsoft Dynamics CRM related to for authorization work at scale, the associated implications, and guidance on common and recommended usage patterns for modeling Microsoft Dynamics CRM security at scale, incorporating teams as appropriate.

Applies To

  • Microsoft Dynamics CRM 2011

Introduction

Microsoft Dynamics CRM offers a wide range of security modeling features, and it is important to choose the most appropriate approach to implementing a particular solution. Each feature offers a combination of characteristics that provide a balance between granularity of access control, administrative ease, and impact on scalability. Having an understanding of the underlying mechanisms supporting each security modeling feature can be useful when selecting the best approach to solving a particular challenge, especially when planning to develop a large volume system.

Granting access for a user to the system can be broken out into:

  • Authentication, which determines who users are and confirms that they are who they say they are

  • Authorization, which determines whether the authenticated users are entitled to access the system and what within the system they are permitted to see or do

Authentication in Dynamics CRM is handled using platform features such as Integrated Windows Authentication or Claims Based Authentication with an identity provider such as Active Directory Federation Services. These all determine the user identity requesting access to the system. The deployment and scalability of the technologies supporting authentication is best described by resources focused specifically on those technologies and is therefore out of the scope of this document.

After a user has been identified, information recorded about the user within the Dynamics CRM system itself, such as their security roles and team memberships, is used to determine whether they are allowed to use the system and what they are allowed to see and do within the system i.e. what they are authorized to do.

This paper describes how these security modeling features in Microsoft Dynamics CRM for authorization work at scale, the implications associated with these features functioning at high volumes, and guidance on common and recommended usage patterns for modeling Microsoft Dynamics CRM security at scale, incorporating teams as appropriate.

 

Download Scalable Security Modeling with Microsoft Dynamics CRM 2011 from the Microsoft Download Center.

 
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft. All rights reserved.