23 views 13 April 2018 0
The Power BI for Office 365 cloud service works with Microsoft Dynamics 365 to provide a self-service analytics solution. Power BI automatically refreshes the Microsoft Dynamics 365 (online) data displayed. With Power BI Desktop or Microsoft Office Excel Power Query for authoring reports and Power BI for sharing dashboards and refreshing data from Microsoft Dynamics 365 (online), sales, marketing, and service personnel in your organization have a powerful new way to work with Dynamics 365
37 views 23 March 2018 1
Registering, debugging and deploying plug-ins can be done using the plug-in registration tool.
1. Get the PluginRegistration.exe tool, located in the Tools\PluginRegistration folder of the SDK. Download the Microsoft Dynamics CRM SDK package.
2. Obtain a system user account on a Microsoft Dynamics 365 server.
3. User account must have the System Customizer or System Administrator role.
A. Connecting to the Server
B. Registering the Assembly
81 views 23 March 2018 0
The hierarchy security model is an extension to the existing Microsoft Dynamics 365 security models that use business units, security roles, sharing, and teams. It can be used in conjunction with all other existing security models. The hierarchy security offers a more granular access to records for an organization and helps to bring the maintenance costs down.
Security models for hierarchies:
1. Manager hierarchy:
The Manager hierarchy security model is based on the management
23 views 23 March 2018 0
To execute a FetchXML query in Microsoft Dynamics 365 and Microsoft Dynamics 365 (online), it is necessary to first build the XML query string. After creating the query string, use the IOrganizationService.RetrieveMultiple method to execute the query string. The privileges of the logged on user affects the set of records returned. Only records for which the logged on user has read access will be returned.
The FetchXML query string must conform to the schema definition for the FetchXML
79 views 26 February 2018 0
Record-level permissions are granted at the entity level, but there may be certain fields associated with an entity that contain data that is more sensitive than the other fields. In such cases, use field level security to control access to specific fields. The scope of field level security is organization-wide and applies to all data access requests including the following:
Data access requests from within a client application, such as web browser, mobile client, or Microsoft Dynamics 365
83 views 26 February 2018 0
1. Form Scripts:
In order to have actions performed in form scripts JS is used. The results of this style are instantaneous; it is the most preferred method and the most used. It is also highly adaptable to interact with various customer scenarios. Form scripts are used most for the following tasks:
Process enhancement and enforcement
To configure commands for the controls those are added to the ribbon
86 views 26 February 2018 0
In Microsoft Dynamics CRM 2015 and Microsoft Dynamics 365 (online) the fundamental concept in role-based security is that a role contains privileges that define a set of actions that can be performed within the organization. Roles are grouped under different tabs based on their functionality. These groups include: Core Records, Marketing, Sales, Service, Business Management, Service Management, Customization and Custom Entities.
Roles: Microsoft Dynamics 365
63 views 26 February 2018 0
n entity is used to model and manage business data in CRM. Contacts, Cases, Accounts, Leads, Opportunities, Activities, etc. are all entities which hold data records. Conceptually, a CRM entity is equivalent to a database table. Leads, Opportunities, Contacts and Accounts are entities in CRM.
1. Accounts: Accounts are organizations with which user has a relationship. Accounts can also contain other types of records including prospects, vendors, business partners, and other organizations that
65 views 26 February 2018 0
Microsoft Dynamics 365 Activities are used to record a specific type of communication, as well as the subject, time and details of that communication. Activities are actions such as emails, phone calls, meetings, etc.
Types of activities:
1. Phone Calls: Used to record information and the details of an inbound or outbound call.
2. Emails: Used to track email messages that are sent or received.
3. Tasks: Used to keep track of action items or other “To Do” items.
87 views 26 February 2018 0
Record-based security applies to individual records. It is provided by using access rights. The relationship between an access right and a privilege is that access rights apply only after privileges have taken effect.
Access rights :
An access right is granted to a user for a particular record. Types of access rights that can be granted are:
AccessRights enumeration value
Controls whether the user can read a