Note: Modifying security roles and privileges can have significant implications for your organization's security model. It's important to thoroughly test any changes in a non-production environment before applying them to a live system.
Access the Security Configuration Workspace:
In D365FO, go to the "System administration" module.
Navigate to "Setup" > "Security" > "Security configuration".
Duplicate Privileges:
Find the privilege you want to duplicate in the list.
Right-click on the privilege and select "Duplicate privilege."
Modify the name, label, and any other settings as needed.
Duplicate Duties:
In the "Security configuration" workspace, navigate to the "Duties" tab.
Find the duty you want to duplicate.
Right-click on the duty and select "Duplicate duty."
Adjust the name, label, and other properties as required.
Duplicate Roles:
In the "Security configuration" workspace, navigate to the "Roles" tab.
Locate the role you want to duplicate.
Right-click on the role and select "Duplicate role."
Modify the name, label, and other attributes as necessary.
Assign Privileges to Duties and Duties to Roles:
Open the duplicated duty.
Add the duplicated privileges to the duty.
Open the duplicated role.
Add the duplicated duties to the role.
Modify the Role Hierarchy (if needed):
If the duplicated role has a parent role in the hierarchy, you might need to adjust the parent-child relationship.
Test and Validate:
After duplicating and configuring the new role, privilege, and duty, test the setup thoroughly in a non-production environment.
Make sure the security model behaves as expected and that users have the appropriate access.
Deploy to Production:
If the testing is successful, deploy the duplicated security elements to your production environment.
Ensure that proper change management and communication processes are followed to inform stakeholders of the changes.
Ongoing Maintenance:
As your organization evolves and requirements change, regularly review and update the duplicated security elements to match your needs.