Security Tips for Business Users
This article describes how you can work with users and configure their devices to improve security.
Important
Use this article together with industry standard security practices for securing users and their access to company data.
Kiosks and shared devices
Customers using kiosks, where multiple users sign in to Business Central with their own identity from a single terminal, should apply additional security practices for an appropriate level of isolation between users:
- Before ending a session at the kiosk, business users should remember to sign out of Business Central, then close all browser windows. Closing the Business Central browser tab or closing the browser without signing out might not fully complete the signout process.
- Each user should use private or guest browsing modes so that any data cached by Business Central is discarded when the browser is closed. Users should be made aware that private or guest browsing can degrade some Business Central features and performance optimizations that are only available when the browser provides access to its storage mechanisms.
See Also
Security and Protection
Application Security
Online Security
On-Premises Security
Feedback
https://aka.ms/ContentUserFeedback.
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see:Submit and view feedback for