Using the Security governance workspace to audit your roles in Dynamics 365 can help you save money on licensing costs. Microsoft will begin validating users’ licenses on January 15, 2026. This guide walks you through how to use the Security governance tool to clean up roles by creating custom duties, adjusting permissions, publishing changes, and tailoring security roles to fit user needs while keeping license costs down.
Table of Contents
The User license summary page in the Security governance workspace shows how roles and permissions drive license requirements in Dynamics 365 Finance & Operations.
Microsoft Learn reference: User security governance license usage summary – Finance & Operations | Dynamics 365 | Microsoft Learn
Steps:
Categories are used in the Process roles maintain module to organize roles by department or workstream. Setting up categories correctly reduces development costs when future security upgrades are needed.
Set up security categories – Finance & Operations | Dynamics 365 | Microsoft Learn
There are two ways to create a category:
An alternative way to create security categories is captured in the screenshots below:
A process hierarchy organizes and manages business processes by linking tasks, roles, entry points, and privileges. It allows roles to be built around position-based responsibilities, ensuring that access is aligned with the organization’s structure.
As a high-level guide, you can think of the areas in the Security process roles maintain form (also known as the Process hierarchy form) as follows:
This approach makes roles easier to understand and define, while also improving UI effectiveness, controlling license costs, and reducing risk of data fraud.
There are multiple ways to populate a new task, including creation from task existing tasks, security objects (user ID, roles, duties, privileges), or task recordings.
In this scenario, we want to make sure an existing role is fully read-only. To do this, we’ll import entry points from another role. This can be a role currently in use or an out-of-the-box role.
Steps:
Out-of-the-box duties should not be edited, since they may be shared across multiple roles. Instead, create custom duties for this specific use case.
Steps:
Note: When you click OK to create a duty, it is immediately published into the system. If you are working in production, remember that these changes take effect right away.
After creating the custom duties, the next step is to set up a new role.
Steps:
At this stage, the new role will look the same as the role it was based on since the duties and privileges themselves haven’t yet been modified.
After publishing the new role, confirm that the custom duties are correctly assigned.
Steps:
After confirming that we’re working only with custom duties (and not editing the out-of-the-box ones), the next step is to change their entry points to read-only.
Result: all entry points for this duty are now read-only, with no update, create, correct, or delete access.
Once the permissions are updated, the next step is to save the duty privileges as unpublished.
There’s a small quirk in the system here: the button is labeled “Save & unpublish duty privilege,” but what it really does is save the duty and privilege as unpublished.
For each duty:
Next, go to Security Configuration to publish the changes.
Once the objects are published, you can verify the results.
After publishing, return to the License Usage Summary screen.
Speak with a Microsoft Dynamics 365 licensing expert today. Reach out to us for a free license mapping assessment: we’ll help you identify potential cost savings and how you can optimize your Dynamics 365 licenses.