Edit

Share via


Data security in Business Central

The Business Central security system allows you to control which objects or tables a user can access within each database. You can specify the type of access that each user has to these objects and tables, whether they're able to read, modify, or enter data.

You can specify which records are stored in the tables that each user is allowed to access. This means that permissions can be allocated at both the table level and the record level.

The security system contains information about the permissions that are granted to each user who can access a particular database.

This information includes the roles that the users are assigned, and any permissions that they're granted to individual users.

There are four different levels of security:

  • Database
  • Company
  • Object
  • Record

Graphically, these levels can be represented as the layers, where the central layer is the records in the database.

Security overview.

This applies only to on-premises versions of Business Central. For online versions, encryption is always enabled and you cannot turn it off.

The first layer of security when you open Business Central is database security.

After you start Business Central and attempt to open the database, your credentials are checked. Learn more about granting a user permission to create or work with a Business Central database in Setting Database Owner and Security Administration Permissions.

Database logins

Users get a database sign in when they have their own user ID and password in Business Central. The user must enter the user ID and password to access the database.

Note

Database logins are only valid for connecting to the database from the Business Central.

How database logins work

Users must also have a sign-in on SQL Server. SQL Server has its own authentication of the user's ID and password. SQL Server checks whether a SQL Server sign-in with this user's ID and password is created.

A SQL Server administrator with a SQL Server tool must first create the sign-in. If a SQL Server sign-in isn't set up, authentication fails and the user receives an error. Learn more in Setting Database Owner and Security Administration Permissions.

The server grants the user access after authenticating their sign-in. Database security then validates the user's permissions by checking the database user accounts on the server. The user's database user account determines the permissions the user receives for various objects within the database, such as tables. This account also contains information about any extra permissions the user might have to alter the database itself.

Customer-managed encryption key
Users and credential types
Security considerations