Power Baseball League: Security Roles

Hashtag the monkey at Washington Nationals Park
Somehow Hashtag got past security at Washington Nationals Park. This demonstrates why it is important for the Power Baseball League to talk about Security Roles.

It’s time for the Power Baseball league to tackle Security Roles. We will jump right in to the wonderful world of system security! This topic can be scary. However, it’s critical to plan your security model when implementing or managing any kind of system. 

Dataverse security can be overwhelming! There are so many tools that you can take advantage of to secure your system. Let’s get started with Security Roles.

The security role matrix is filled with dots for nearly every system component you can think of. Those dots are used to control the level of access across various types of actions such as create, read, update, delete, (commonly referred to as “CRUD”), among others. 

Join Malcolm and I as we talk through our approach to Security Role creation for our Power Baseball League system. We also share some tips and considerations you’ll want to make as you dive into the matrix for yourself.

Power Baseball League: Security Roles

This is just the tip of the iceberg! There are so many more facets to security for you to dive into. Start with what you can do with Security Roles and then determine what else you need.


Check out these resources to learn more! (Note some of these require a paid subscription or free membership to view)

This is part of the Power Baseball League Series with Malcolm McAuley (follow him on LinkedInTwitter or his Blog). You can follow the series on the Power Baseball League Series Page and the Power Baseball League YouTube Playlist as they are added.

One thought on “Power Baseball League: Security Roles

Leave a Reply