Security

Security measures at a business solution or ERP must have a built-in security system that aids protect your database and the data that it contains from unauthorized access. It must also permit you to define what authenticated users are permitted to do in the database, such as what data they can read and modify. 

Data Security System in Business Central Delegation 

The Business Central Delegation security system enables you to manage which records a user can access within each database. You can select the type of access that each user has to these tables and records, whether they can read, modify, or enter data. This means that permissions can be allocated at both the table level and the record level. 

The security system contains details about the approvals that have been granted to each user who can access the delegation log table. Here the information includes the roles which the users have been assigned, as well as any other permissions that they have been granted to individual users. 

These security systems can be represented as the following layers. 

  • Add user roles to manage the delegation 
  • View the delegation and approval exception table

Application Security System in Business Central Delegation 

Application and all its data would reside in Business Central tenant and only accessible to authorised users. Feel free to ask any questions with regards to data management and Security by reaching out to support team

Get In Touch If You Have A Business Query

Related Posts