Securing Dataverse-based applications
In this section, we will discuss how to secure Dataverse and the applications that use its security framework. We will start by looking at how users interact with the solution, tailoring the security settings to enable authorized tasks and restrict other activities.
Common usage patterns for security design
When defining the security model, solution architects assess how the system will be used. The following table lists the key patterns for users looking to access Power Platform applications:
When defining the security model, solution architects analyze how users interact with data and whether they work by themselves or interact with other team members.
Best practices
Power Platform solution architects secure Dataverse solutions with the following best practices in mind:
- Design security to cater to the majority of access patterns...