Describe the Power Platform and Security Model

  1. Home
  2. Describe the Power Platform and Security Model

Microsoft Dataverse earlier known as Common Data Service offers a security model used to protect data integrity and privacy. Also, the security model supports efficient data access and collaboration. Some of the important goals of the model are –

  • Firstly, it provides users with access specifically to the appropriate levels of information required to perform their jobs.
  • Secondly, it helps categorize users by role and thereby restrict access based on those roles.
  • Also, it supports data sharing to grant access to users and teams records that they do not own for a specified collaborative effort.
  • Next, it prevents a user’s access to records the user does not own or share.

Types of Security

Following are the types of Security –

Role-based security

We shall now be discussing the features of role-based security.

  • Firstly, roled-based focuses on grouping a set of privileges together that describe the tasks to be performed for a user.
  • Secondly, Microsoft Dataverse includes a set of predefined security roles.
  • Further, each aggregates a set of user rights to make user security management easier.
  • Also, each application deployment can define its own roles to meet the needs of different users.
  • Security roles are associated with a business unit.
Record-based security

The record-based security primarily focuses on access rights to specific records. Some of the features include –

  • Firstly, the field-level security restricts access to specific high business impact fields in an entity only to specified users or teams.
  • Secondly, it helps combine role-based security, record-level security, and field-level security to define the overall security rights within Power Apps application.

Being developer, we must know that queries in the code run in the context of a user, and will only return records that the user entitles to read. Additionally, the code will only be able to perform operations based on the privileges assigned to the user account through the security roles or team membership.

Learn more here.

Menu