This is a bit old now, but maybe help someone. But Hosk has some good details on this topic here. crmbusiness.wordpress.com/.../crm-20112013-what-security-roles-do-you-to-need-to-run-a-dialog
↧