Skip to content

Commit 7e1d9b9

Browse files
committed
Incorp tech review feedback
1 parent 33f4710 commit 7e1d9b9

File tree

4 files changed

+6
-10
lines changed

4 files changed

+6
-10
lines changed

powerapps-docs/developer/common-data-service/security-access-coding.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ search.app:
1515
- PowerApps
1616
- D365CE
1717
---
18+
1819
# Verifying access in code
1920

2021
[!INCLUDE[cc-data-platform-banner](../../includes/cc-data-platform-banner.md)]
@@ -54,7 +55,7 @@ new record. Testing whether the user can create a new record requires using the
5455
other strategy (mentioned above) to check the user’s security privileges.
5556

5657
However, if the user was successful in retrieving entity records using a query, you
57-
can then test an entity instance using <xref:Microsoft.Crm.Sdk.Messages.RetrievePrincipalAccessRequest>.
58+
can then test an entity instance using the `RetrievePrincipalAccess` message (<xref:Microsoft.Dynamics.CRM.RetrievePrincipalAccess>, <xref:Microsoft.Crm.Sdk.Messages.RetrievePrincipalAccessRequest>).
5859

5960
The following sample method uses the .NET SDK assemblies to allow retrieving a
6061
set of access rights defined within the [AccessRights Enum](/dotnet/api/microsoft.crm.sdk.messages.accessrights).
@@ -71,8 +72,6 @@ set of access rights defined within the [AccessRights Enum](/dotnet/api/microsof
7172
static AccessRights GetAccessRights(IOrganizationService svc, EntityReference
7273
user, EntityReference entity) {
7374

74-
// TODO Consider adding a test for the user being a system user or part of a team.
75-
7675
try
7776
{
7877
var accessRightsRequest = new RetrievePrincipalAccessRequest()
@@ -124,7 +123,7 @@ those access rights on a record using the <xref:Microsoft.Crm.Sdk.Messages.Retri
124123

125124
When you don’t have a specific entity record to test, such as whether they can
126125
create a new entity record, you must rely on checking the user’s security
127-
privileges. These privileges are stored in the [Privilege entity](reference/entities/privilege).
126+
privileges. These privileges are stored in the [Privilege entity](reference/entities/privilege.md).
128127

129128
There are nearly one thousand individual privileges in the Dataverse database and the
130129
number will grow with every entity or custom action that is added to the system.

powerapps-docs/developer/common-data-service/security-concepts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Security concepts (Microsoft Dataverse) | Microsoft Docs"
2+
title: "Security concepts for developers (Microsoft Dataverse) | Microsoft Docs"
33
description: "A brief summary of security concepts."
44
ms.custom: ""
55
ms.date: 12/10/2020
@@ -15,7 +15,7 @@ search.app:
1515
- PowerApps
1616
- D365CE
1717
---
18-
# Security concepts
18+
# Security concepts for developers
1919

2020
[!INCLUDE[cc-data-platform-banner](../../includes/cc-data-platform-banner.md)]
2121

powerapps-docs/developer/common-data-service/security-model.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,3 @@ As a developer, you should know that the data operations in your code run in the
3434
The first step is to understand the security concepts that apply to data access. You should understand how to configure and manage security roles because you will need to apply them when you test your code. But this is beyond the scope of this topic. You can find more information about security concepts in general and security configuration tasks in [Security concepts in Microsoft Dataverse](/power-platform/admin/wp-security-cds).
3535

3636
In the security related topics that follow, we will assume that you have have a basic understanding of Microsoft Dataverse security concepts and administration so that we can proceed with addressing the security and data access APIs that you will need to use in your plug-in or application.
37-
38-
### See Also
39-

powerapps-docs/developer/common-data-service/security-sharing-assigning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,4 +79,4 @@ operation. If **Share reassigned records with original owner** is selected (se
7979
shares the record with all access rights after the assign operation. Otherwise,
8080
the previous owner does not share the record and may not have access to the
8181
record, depending on his or her privileges. The Organization entity's
82-
[ShareToPreviousOwnerOnAssign](reference/entities/organization#sharetopreviousowneronassign-options) attribute controls this setting.
82+
[ShareToPreviousOwnerOnAssign](reference/entities/organization.md#sharetopreviousowneronassign-options) attribute controls this setting.

0 commit comments

Comments
 (0)