-
Back-up of an environment should be download to local
In many business scenarios, having long-term access to backup data is critical for compliance, audit trails, and data recovery. Currently, Dynamics 365 only allows backups to be managed in the cloud, and the retention period is limited based on system policies.
This feature would enable administrators to download a full backup of their Dynamics 365 environment directly to a local machine, ensuring that they can retain it indefinitely or for as long as required by business needs or regulatory requirements. With a downloadable backup, organizations can maintain control over their data for extended periods, providing added security and flexibility in managing data retention policies independently of cloud limitations.
This capability would be particularly valuable for industries with stringent data retention requirements or for organizations that need long-term access to historical data for analysis or auditing purposes.
-
Optimizing Error Messages for Better Readability and User Experience
When users attempt to access data for which they do not have read or modify permissions, the system displays a default error message. Currently, these messages are only available in English and are complex and difficult to understand, leading to numerous user complaints.
To improve user experience, we suggest allowing customization of these error messages. Our goal is to make them simpler, more readable, and support multiple languages.
Thank you for considering this suggestion. We believe it will greatly enhance the usability of our system and address a common user concern.
-
Make self-elevate be compatible with the PIM feature of Entra ID
Customer is currently leveraging the Privileged Identity Management (PIM) feature of Entra ID to elevate permissions only when necessary. These elevated permissions automatically expire after 8 hours, at which point users can re-elevate if needed. This approach aligns with the customer’s ISO security certification requirements and reflects the company’s commitment to best security practices. In my view, Entra ID’s PIM feature is specifically designed to support this model.
However, even after applying for the system admin role via PIM, the customer encountered an error when using the self-elevate function in PPAC, with the system indicating insufficient privileges. Backend data confirms that the customer is not recognized as a system admin following the application.
We hope the product team will consider addressing this issue in a future update.