Ensure security and data protection

Objective

On this page, you find a guide to the Advanced Settings to ensure the Hierarchy Security Model has been configured correctly during the technical setup.

The Hierarchy Security Model is designed to simplify the challenge of creating a security concept.
Assuming that the data is correctly maintained, a security concept is automatically created in the background using the Microsoft platform and automation by us.

Process

System Admin
Configures security in the technical setup of HR for Dynamics
HR Manager
Checks the Advanced Settings to make sure security has been configured correctly
HR Manager
Security and data protection are ensured

Prerequisites

  • You are HR Manager and want to ensure security and data protection for your HR for Dynamics system
  • The Hierarchy Security Model has been installed and enabled during the technical setup
  • To be able to view these settings, you need to use a System Admin Account

Click Through

  • Log in to your HR System
  • Select the gear icon in the upper right corner
  • Navigate to Advanced Settings to enter the system area
  • Select the Settings icon
  • Click on Security
  • Click on Hierarchy Security
  • Make sure Enable Manager Hierarchy Model is selected
  • Make sure the number of levels (hierarchy depth) is set correctly
    • The number of levels defines the amount of hierarchy levels for which subordinate employee records will be visible for supervisors.
  • In the drop-down next to the Search bar under Hierarchy Table Management, switch from 'Show all tables' to Show excluded tables
  • Make sure the following tables are excluded:
    • Activity
    • Applicant
    • Application
    • Notification
    • Personal Quick Reply
    • Payment Summary
  • If everything is set up correctly, your system has a working security concept and data protection is ensured.
  • If you made changes to the settings, make sure to click on Save in the top bar before leaving the page.

Hint

  • You can find more information on access rights and technical configuration on the security setup page in the technical setup.

Result

Below, you find a screenshot of the Hierarchy Security settings page with all configurations set correctly. Be aware the Hierarchy Depth may differ for companies with more hierarchy levels.
Image

Next step

HR