Download our free white paper on Copilot in Microsoft Business Central! Download Now

Mastering Permissions and Security in Business Central

Kery Nguyen
By Kery Nguyen

2025-01-28

Microsoft Business Central handles your company's most sensitive information—financial records, customer data, employee details, pricing structures, and strategic planning. Without proper security controls, you risk:

  • Employees viewing salary information they shouldn't access
  • Sales teams altering prices beyond approved limits
  • Temporary workers maintaining access long after their contracts end
  • Accounting staff accidentally modifying closed financial periods

I've seen each of these scenarios play out, and the consequences ranged from minor embarrassment to regulatory fines. The good news? Business Central comes equipped with powerful security tools—when you know how to use them.

The Security Building Blocks You Actually Need to Understand

Skip past the marketing language. Here's what actually makes up Business Central's security architecture:

User Accounts: Your First Line of Defense

Every person accessing Business Central needs their own user account—no sharing, no exceptions. Each account:

  • Links to a specific Microsoft 365 identity
  • Contains personal settings and preferences
  • Maintains an audit trail of actions taken
  • Connects to assigned permission sets

Pro tip: Create a standardized naming convention for users before you start adding people. Something like FirstInitialLastName (JSmith) makes management much easier as your company grows.

Permission Sets: The Real Security Workhorse

Think of permission sets as security packages you assign to users. They define exactly what someone can see and do within Business Central. Microsoft provides about 80 predefined sets, but many companies need custom ones.

Permission sets control whether users can:

  • View specific data
  • Create new records
  • Modify existing information
  • Delete records
  • Run reports or processes

What surprised my clients most: Adding someone to the "Super" permission set gives them god-mode access to everything—including the ability to change financial records without leaving an audit trail. Never use this except for system administrators.

Object-Level Permissions: Getting Granular

Business Central organizes everything into objects—tables (data storage), pages (what users see), reports, and codeunits (business logic). Security can be applied to each:

  • Tables: Control who can read, insert, modify, or delete data
  • Pages: Determine who can open, view, or edit screens
  • Reports: Manage who can run or modify reports
  • Codeunits: Restrict who can execute processes

A manufacturing client discovered they had given warehouse staff unintended access to cost information simply by not setting proper table permissions.

Setting Up Security: A Practical Walkthrough

I'm skipping the theoretical approach you'll find in most guides. Instead, here's how I actually implement security for new clients:

Step 1: Map Your Organizational Roles

Before touching Business Central, create a simple spreadsheet with:

  • Job titles/roles in your company
  • Key tasks each role performs in the system
  • Sensitive data they should NOT access

A healthcare services company I worked with identified 14 distinct roles, from front desk staff to financial controllers, each needing different permission levels.

Step 2: Create Your First User

  1. From the Business Central admin center, select Environments
  2. Choose your environment
  3. Select Users
  4. Click Add User
  5. Enter their work email address
  6. Assign a license
  7. Save the new user

What many guides miss: New users can't do anything until you assign permission sets—which is actually a good security practice.

Step 3: Build Custom Permission Sets

The pre-built permission sets rarely match exactly what you need. Here's how I create custom ones:

  1. In Business Central, search for Permission Sets
  2. Select New to create a custom set
  3. Name it clearly (e.g., "AR-Clerk-Full" for accounts receivable clerks)
  4. Add permissions by selecting Permissions
  5. Choose objects and set appropriate access levels

Real-world example: For an accounting clerk who handles vendor invoices but shouldn't see banking info, I created a permission set that allowed:

  • Full access to vendor and purchase tables
  • Read-only access to GL accounts
  • No access to bank account details or customer credit card data

Step 4: Apply Permission Sets to Users

  1. Go back to Users
  2. Select the user you want to modify
  3. Choose Permission Sets
  4. Add the appropriate sets
  5. Remove any unnecessary default permissions

A common mistake I see: Leaving the default "SUPER" permission active alongside role-specific permissions, effectively negating your security setup.

Practical Security Scenarios I've Implemented

After dozens of implementations, these scenarios come up repeatedly:

The Temporary Worker Problem

Challenge: Your company hires seasonal accounting help during tax season who need system access for 3 months only.

Solution: Rather than managing permissions manually, I create:

  1. A dedicated user group for temporary workers
  2. Time-limited Microsoft 365 accounts
  3. Scheduled monthly access reviews
  4. An automated offboarding process

A retail client cut unauthorized access incidents by 90% using this approach for their seasonal staff.

The Multi-Company Maze

Challenge: Your business has multiple legal entities in Business Central, but most users should only access one or two.

Solution: I implement:

  1. Company-specific permission sets (e.g., "UK-Sales" vs "US-Sales")
  2. A naming convention that clearly identifies the company
  3. Regular access audits comparing job functions to permissions

A distribution company with operations in three countries successfully prevented cross-company data exposure using this method.

The Sensitive Financial Data Situation

Challenge: Your CFO needs certain managers to see budgets but not actual salary details.

Solution: I create:

  1. Custom permission sets with field-level security
  2. Filtered views of financial data
  3. Role-targeted reports showing only relevant information

One non-profit organization used this approach to allow program managers to track departmental spending without exposing individual salary information.

Common Security Mistakes That Create Vulnerabilities

These are the actual security errors I find when auditing existing Business Central implementations:

The "Just Make Them an Admin" Trap

When users need access during implementation, many companies make them admins "temporarily"—then forget to change it. One manufacturing client had 17 users with full system admin rights, including former employees whose accounts remained active.

Fix: Conduct quarterly permission audits and implement a proper role request process.

Permission Creep

Over time, users accumulate more and more permissions as they temporarily cover for colleagues or take on new responsibilities. I found one user with 22 different permission sets, many contradicting each other.

Fix: Implement a "permission cleanup" during annual review cycles, removing unnecessary access.

The Shared Login Nightmare

Despite clear security best practices, companies still share login credentials among staff. A retail chain had an "inventory" user that eight different people used to receive stock.

Fix: Create individual accounts for everyone, then use permission sets to grant appropriate access.

Auditing Your Security: How to Check If You're Vulnerable

Here's my actual security audit process for Business Central clients:

  1. Generate User Permission Reports

    • From Business Central, go to Permission Sets
    • Select User Permissions report
    • Export to Excel for analysis
  2. Cross-Check Active Directory

    • Compare Business Central users with active employees
    • Identify terminated employees with lingering access
  3. Review Permission Assignments

    • Look for users with excessive permissions
    • Identify permission sets that grant more access than needed
  4. Test Practical Scenarios

    • Can users from one department see sensitive data from another?
    • Are critical financial records properly restricted?

A financial services client found and fixed 34 security issues through this audit process, including access paths they never knew existed.

Advanced Security Tactics for Business Central

For companies with stringent compliance needs, these advanced techniques add extra protection:

Field-Level Security: The Ultimate Granular Control

Standard permission sets control access to entire tables or pages. Field-level security goes deeper, allowing you to:

  • Hide specific fields (like Social Security Numbers) from certain users
  • Make sensitive data read-only for most staff
  • Track who views particularly sensitive information

This approach requires more setup time but proves invaluable for businesses handling protected health information or financial data.

Automating Security with Power Automate

Rather than manually managing permissions, I build workflows that:

  • Automatically grant appropriate permissions based on HR status changes
  • Notify administrators when permission changes occur
  • Document approval processes for permission modifications
  • Generate weekly security reports for compliance teams

A healthcare client reduced security administration time by 70% using these automated processes.

Final Thoughts: Security as a Business Process

The most secure Business Central environments I've built share a common trait: they treat security as an ongoing business process, not a one-time technical setup.

Successful companies:

  • Include permission reviews in employee onboarding, role changes, and offboarding
  • Regularly educate users about security practices
  • Document their permission structure and the reasoning behind it
  • Test their security setup against real-world scenarios

Remember that perfect security doesn't exist—the goal is appropriate protection that balances accessibility with risk management. With thoughtful planning and regular maintenance, Business Central can maintain a security posture that protects your data without impeding your operations.

This guide draws from my experience implementing and auditing Business Central security for more than 45 organizations across multiple industries. Security best practices continue to evolve, so consult with a qualified Microsoft partner for guidance specific to your situation.

Business CentralSecurityPermissionsData IntegrityERP
Choosing the right ERP consulting partner can make all the difference. At BusinessCentralNav, we combine deep industry insight with hands-on Microsoft Business Central expertise to help you simplify operations, improve visibility, and drive growth. Our approach is rooted in collaboration, transparency, and a genuine commitment to delivering real business value—every step of the way.

Let`'s talk

Explore Business Central Posts

image

10 Must-Know Features of Microsoft Dynamics Business Central

Discover the top 10 most valuable features in Microsoft Dynamics 365 Business Central and how they help businesses streamline operations, automate tasks, and improve decision-making.

By

Kery Nguyen

Date

2025-03-09

image

Improve Speed and Efficiency in Business Central

A comprehensive guide to enhancing system performance, ensuring effective resource utilization, and deploying practical solutions for common issues in Microsoft Dynamics 365 Business Central.

By

Kery Nguyen

Date

2025-03-04

image

Connect Dynamics 365 Business Central to Power Apps

A step-by-step guide to seamlessly connecting Microsoft Dynamics 365 Business Central with Dataverse and Power Apps, enhancing data flow and automating business operations for greater efficiency.

By

Kery Nguyen

Date

2025-02-02