Skip to content

Latest commit

 

History

History
23 lines (17 loc) · 1.72 KB

Security-Considerations.md

File metadata and controls

23 lines (17 loc) · 1.72 KB
title description author ms.topic ms.author ms.date ms.custom ms.reviewer
Security considerations in Business Central
Learn about the some of the most important aspects to take into consideration when you configure security for your Business Central solution.
jswymer
conceptual
jswymer
12/20/2023
bap-template
jswymer

Security considerations

The following list contains some important things to consider when setting up your [!INCLUDEprod_short] security system.

  • The [!INCLUDEprod_short] security system is initiated when you create the first login. Until you create the first login, any user can have full access to carry out any transaction in a [!INCLUDEprod_short] database. Therefore, the first login that you create must be a superuser (that is, should be assigned the SUPER permission set). The superuser must own and administer all access to the database from within [!INCLUDEprod_short]. We recommend that the user who administers security in [!INCLUDEprod_short] be a superuser.

  • One of the first things that the superuser should do is create logins for the other users that have access to the database and grant them the appropriate permissions.

  • In [!INCLUDEprod_short], a table can contain a FlowField, which generates sums based on values that are stored in another table. When using a FlowField, a user must have permission to read both tables, or they won't be allowed to read the first table.

See also

Security and Protection