Skip to content

Commit e31469c

Browse files
authored
Merge pull request #9198 from MicrosoftDocs/paulliew-patch-4
Update security-access-rights.md
2 parents 69b147b + f239e36 commit e31469c

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

powerapps-docs/developer/data-platform/security-access-rights.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Data operations and access rights (Microsoft Dataverse) | Microsoft Docs"
33
description: "Describes the access rights needed for specific data operations."
44
ms.custom: ""
5-
ms.date: 03/11/2021
5+
ms.date: 02/26/2024
66
ms.reviewer: "pehecke"
77

88
ms.topic: "article"
@@ -18,7 +18,7 @@ search.audienceType:
1818

1919
Let's talk about the data operations that you can perform and the access rights required for each. The following table lists the messages that correspond with common data operations and the access rights required to execute those messages.
2020

21-
| Message(s) | Access rights required |
21+
| Messages | Access rights required |
2222
|---|---|
2323
| **Create** | CREATE |
2424
| **Retrieve**, **RetrieveMultiple** | READ |
@@ -31,11 +31,11 @@ Let's talk about the data operations that you can perform and the access rights
3131

3232
## Dependencies between access rights
3333

34-
Sometimes, security dependencies exist because it is necessary to have more than
34+
Sometimes, security dependencies exist because it's necessary to have more than
3535
one access right to perform a given action. For example, if you have the
3636
**create** access right for accounts, you can create a record of the account
3737
table type. However, unless you also have **read** access for accounts, you
38-
cannot create an account record and be the owner of that new record.
38+
can't create an account record and be the owner of that new record.
3939

4040
The following table lists the access right dependencies for the actions
4141
specified.
@@ -44,12 +44,15 @@ specified.
4444
|---|---|
4545
| Create a record and be the record owner | CREATE, READ |
4646
| Share a record | SHARE. This right is required by the person doing the share operation.<p/> READ. This right is required by the person doing the share operation and also by the person with whom the record is being shared.|
47-
| Assign a record | ASSIGN, WRITE, READ |
47+
| Assign a record | ASSIGN, WRITE, READ <sup>1</sup> |
4848
| Append to a record | WRITE, READ, APPENDTO |
4949
| Append a record | WRITE, READ, APPEND |
5050

51+
<sup>1</sup> To provide granular level control on whom a record can be assigned to, switch the **AssertOwnershipAppendToAccess** [orgdbsettings](/power-platform/admin/environment-database-settings#install-the-organizationsettingseditor-tool) to **true**. This setting additionally requires the caller to have **AppendTo** access on the assignee (the user/team record being assigned as the owner).
52+
When [record ownership](/power-platform/admin/wp-security-cds#record-ownership-in-modernized-business-units) in modernized business units is enabled, and **OwningBusinessUnit** is being changed, the caller is required to have **AppendTo** access on the new business unit.
53+
5154
Another type of dependency exists when objects are subordinate to another
52-
object. For example, the opportunity object cannot exist on its own. Each
55+
object. For example, the opportunity object can't exist on its own. Each
5356
opportunity is always attached to an account or contact. To create an
5457
opportunity, you must have the access right **appendto** on accounts and the
5558
access right **append** on opportunities.

0 commit comments

Comments
 (0)