Solved

crm 2011 - Delimma of assigning owner

Posted on 2012-04-06
4
456 Views
Last Modified: 2012-06-21
We have sales person that will work with their own set of contacts.  They will not be sharing their contact. So it sounds like we should set the Owner of the contacts  to be their sales person.  However,  We can only want them to read but not able to change any fields except notes or the contact phone number.

How would I achieve that,
1. Sales have their own set of contacts
2. Sales can only able to write to a limit set of fields of the contact or  some fields of related entity of the contact.

What option do I have?
0
Comment
Question by:tommym121
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 27

Assisted Solution

by:Chinmay Patel
Chinmay Patel earned 334 total points
ID: 37819711
Hi tommym121,

1. Using Security role you can make sure that they have only read permissions  on those contacts  records which they have created.  Also give them "Append" permission on Contact and "Append To" on Annotations.
2. Use Role based forms and create a form with limited fields on which you want to provide "Update".
3. Use field levle security, create a profile and include all "Sales" people in that profile, in Field Level Security profile configure it to make all other fields read-only except contact phone number.

Regards,
Chinmay.
0
 
LVL 29

Assisted Solution

by:Feridun Kadir
Feridun Kadir earned 166 total points
ID: 37823549
Just to clarify field-level security, at the moment it is only available with custom fields so you cannot use field level security on any of the out-of-the-box fields.

Another option to consider is to use javascript on the OnLoad event of a form to disable all fields on the form except the phone number one.
0
 
LVL 27

Accepted Solution

by:
Chinmay Patel earned 334 total points
ID: 37826134
0
 

Author Closing Comment

by:tommym121
ID: 37852961
Thanks
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a walkthrough guide I wrote whilst upgrading my on-premise MS Dynamics CRM 3.0 deployment to 4.0. This covers the actual installation of the product to a working level for my system, I ran into a lot of issues that the steps below fixed so h…
Having trouble getting your hands on Dynamics 365 Field Service or Project Service trial? Worry No More!!!
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question