Configure environment security
Common Data Service uses a role-based security model to help secure access to the database. This topic explains how to create the security artifacts that you must have to help secure an app. The user roles control run-time access to data and are separate from the Environment roles that govern environment administrators and environment makers. For an overview of environments, see Environments overview.
Assign security roles to users
Security roles control a user’s access to data through a set of access levels and permissions. The combination of access levels and permissions that are included in a specific security role sets limits on the user’s view of data and on the user’s interactions with that data.
To assign a user to an environment role, an Environment Admin can take these steps in the Power Apps Admin center:
Select the environment in the environments table.
Select Security tab.
View if the user already exists in the environment, by selecting view the list of users in the environment.
In case user doesn’t exist, you can add the user from Power Apps Admin center Add the user by mentioning the email address of the user, in your organization, and selecting Add user.
Wait for a few minutes to check if the user is available in the list of users in the environment.
Select the user from the list of users in the environment.
Assign the role to the user.
Select OK to update the assignments to the environment role.
Predefined security roles
The Power Apps environment includes predefined security roles that reflect common user tasks with access levels defined to match the security best-practice goal of providing access to the minimum amount of business data required to use the app.
|Security role||*Database Privileges||Description|
|System Administrator||Create, Read, Write, Delete, Customizations, Security Roles||Has full permission to customize or administer the environment, including creating, modifying, and assigning security roles. Can view all data in the environment. More information: Privileges required for customization|
|System Customizer||Create (self), Read (self), Write (self), Delete (self), Customizations||Has full permission to customize the environment. However, can only view records for environment entities that they create. More information: Privileges required for customization|
|Environment Maker||Customizations||Can create new resources associated with an environment including apps, connections, custom APIs, gateways, and flows using Microsoft Power Automate. However, does not have any privileges to access data within an environment. More information: Environments overview|
|Common Data Service User||Read (self), Create (self), write (self), delete (self)||Can run an app within the environment and perform common tasks for the records that they own. Note: this only applies to non-custom entities. See Create or configure a custom security role.|
|Delegate||Act on behalf of another user||Allows code to run as another user or impersonate. Typically used with another security role to allow access to records. More information: Impersonate another user|
*Privilege is global scope unless specified otherwise.
The Environment Maker role can not only create resources within an environment, but can also distribute the apps they build in an environment to other users in your organization. They can share the app with individual users. For more information, see Share an app in Power Apps.
For the users making apps which are connecting to the database and needs to create or update entities and security roles, should be assigned System Customizer role as well, along with the Environment Maker as Environment Maker role, has no privileges on the database.
Create or configure a custom security role
If your app uses a custom entity, its privileges must be explicitly granted in a security role before your app can be used. You can either add these privileges in an existing security role or create a custom security role. There are a set of minimum privileges that are required in order for the new security role to be used - see Minimum privileges to run app.
If you want to create a custom security role with the minimum required privileges to run an app, check out the section below: Minimum privileges to run app.
The environment might maintain the records which can be used by multiple apps, you might need multiple security roles to access the data with different privileges. e.g.
- Some of the users (Type A) might only need to read, update, and attach other records so their security role will have read, write, and append privileges.
- Other users might need all the privileges that users of Type A has, plus the ability to create, append to, delete, and share, so their security role will have create, read, write, append, delete, assign, append to, and share privileges.
For more information about access and scope privileges, see Security roles.
In Power Apps Admin center select the environment where you want to update a security role.
Click on the Dynamics 365 Administration Center link in the Details tab to manage the environment in the Dynamics 365 admin center.
Select the environment (with the same name of environment) and select Open.
If you see published apps and tiles, look in the upper-right corner and select the Gear icon (). Then select Advanced settings.
In the menu bar, select Settings > Security.
Select Security roles.
From the security role designer, enter a role name in the Details tab. From the other tabs, you'll select the actions and the scope for performing that action.
Select a tab and search for your entity; for example - Custom Entities tab, for setting permissions on a custom entity.
Select the privileges Read, Write, Append.
Select Save and Close.
Minimum privileges to run app
When you create a custom security role, you need to include a set of minimum privileges into the security role in order for a user to run an app. We've created a solution you can import that provides a security role with the required minimum privileges.
Start by downloading the solution from the Download Center: Common Data Service minimum privilege security role.
Then, follow the directions to import the solution: Import, update, and export solutions.
When you import the solution, it creates the min prv apps use role which you can copy (see: Create a security role by Copy Role). When Copying Role is complete, navigate to each tab - Core Records, Business Management, Customization, etc - and set the appropriate privileges.
You should try out the solution in a development environment before importing into a production environment.