{Customer Insights} Role based access control data access governance

User Review
0 (0 votes)

Hi Everyone,

Today I am going to share my thoughts on preview feature on Dynamics 365 Customer Insights.

Let’s get’s started.
In Dynamics 365 Customer Insights, you can govern data access using role-based access control (RBAC). 
Let me break it down for you:

1. What is Role based access control(RBAC)?
RBAC allows adminstrators to regulate access to customer profiles, segments and measures based on business units.
These controls are applied to the data in Microsoft Dataverse (formerly known as Common Data Service).
The integrity of these controls propagates automatically to all other Dynamics 365 and Power Platform applications.
2. Business Value:
Implementing data access controls is crucial, especially involving multigeo and multi brand contexts.
RBAC enables admins to:
Define access rules based on business units.

Manage the global data estate of an organization.

Configure business units within the Power Platform admin center.

Assign ownership based on identifiers like associated brand or geographic location.

Control accesss to segments and measures across global and business unit contexts.
This functionality not only saves time during implementation but also enhances security and control over data.
3. Features Details:
Data access defintions are established in Dataverse and extend to other applications built on top of it(such as Dynamics 365 apps).
Different permissions and access rights apply based on user roles:
Own and manage the global data estate.

Configure business units.

Define data mappings.

Access segments and measures globally and within business units.
Business users:
Access records within their business units.
Cannot access or share data from other business units.
Control Dynamics 365 Customer Insights segements and measures within their unit.
Can activate segments for use in other Dynamics 365 and Power Platform applications.
Remember, this RBAC functionality ensures that data is available only to the intended users, enhancing both security and data management efficiency.
That’s it for today.
I hope this helps.
Malla Reddy Gurram

Leave a Reply