Redaguoti

Bendrinti naudojant


Payment service provider user roles and access

This article describes how to configure user access for payment service provider (PSP) roles in Microsoft Dynamics 365 Fraud Protection.

Payment service providers (PSPs) can grant users of Microsoft Dynamics 365 Fraud Protection various levels of access, based on logical or functional roles. PSPs can include any organization that provides payment services to other organizations (also referred to as "payment gateways," "payment processors," etc.). This article applies to both PSPs and merchants that were onboarded to Fraud Protection by their PSP.

Important

Information in this article is subject to change at any time.

Assign PSP roles

Users are managed through your assigned Microsoft Entra tenant.

Roles can be assigned to either of the following types of users:

  • Users inside the organization's Azure tenant
  • Users outside the organization's Azure tenant, who will be invited to join the tenant as guest users

Important

Users inside the organization's Azure tenant who are member users can view a list of all other users in the tenant. By contrast, users outside the tenant who join as guest users can view only users who are in the same Fraud Protection environment that they have access to. Assign member or guest roles to users according to your business privacy requirements.

For more information about how to directly add users to your Microsoft Entra tenant as members or nonguest users, see Create a user account in Microsoft Entra ID.

Assign PSP roles to users in Fraud Protection

To assign PSP roles to users in Fraud Protection, follow these steps.

  1. Open the Fraud Protection portal page.
  2. In the left navigation pane, select Settings, and then select User access.
  3. Select Assign role(s).
  4. Enter the name or email address of the person or group that you want to assign a Fraud Protection PSP role to.

Note

In the Azure tenant, suggestions for users will appear while you type. Select a suggestion if it matches the user that you want to assign a user role to. Otherwise, a message informs you that an invitation email is sent to the person or group that you entered, so that the person or group can join the Fraud Protection environment.

  1. In the Roles field, select one or more defined roles that you want to assign to the user.
  2. Select Assign role(s).

Note

Users outside the Azure tenant will join the tenant as guest users and will appear in the User access grid after they accept the invitation that is emailed to them and complete the sign-in/sign-up process.

Edit assigned roles

To edit the role that is assigned to a user in Fraud Protection, select the user in the Member list, and then select Edit.

In this part of the page, roles can be added to or deleted from a user. If you edit your own account (for example, if you delete your own administrative role), your edits might interfere with your ability to use some features of Fraud Protection. If you must restore permissions, you can reset them in the Azure portal.

To learn more about the available PSP roles, see the PSP user roles and access section of this article.

Revoke user access to the environment

To revoke a user's access to the current environment, select the user in the member list, and then select Revoke access.

Important

When you revoke access for a user, the user is removed from the current environment. However, they might still have access to other environments in the hierarchy. To fully remove a user's access to Fraud Protection, delete the user from your Microsoft Entra tenant. In this way, you completely remove the user's access to your tenant and its associated applications or services.

PSP user roles and access

Fraud Protection offers a defined set of user roles, each of which has access to specific features and functions. You can select the appropriate role when you assign a user to the system. The following roles are available:

  • PSP Admin – This role is a high-level administrative account that has full access to all PSP-related features. A user in this role can manage Fraud Protection for a PSP and its merchant customers.
  • Fraud Manager – This role is an internal role in a PSP. A user in this role is intended to manage Fraud Protection for the PSP's merchant customers.
  • Fraud Supervisor – This role provides the highest level of authority in a PSP's merchant customer. A user in this role can access merchant-facing functions that the PSP delegates to them.
  • Fraud Analyst – This role is intended for a PSP's merchant customer who runs analysis and reports. A user in this role has read-only access to the merchant customer's data.
  • Manual Review Agent – A user in this role is responsible for reviewing individual transactions and approving or declining them. Although manual review agents don't have direct access to the Support Lists page, they can modify the status of an entry in the support list through the Transaction Search page.
  • Technical Developer – A user in this role is responsible for managing the technical configurations and integrations of a Fraud Protection instance for a PSP.
  • Customer Service Support – A user in this role can view the transaction details and is provided with information that is required to handle customer queries.
  • Reporting – A user in this role can view reports and access activity logs.

Note

If you are shown a different selection of roles than those detailed below, you may be using the standard version of Fraud Protection. Go to Configure user roles and access instead.

Permissions

Members can access Fraud Protection by visiting https://dfp.microsoft.com/ and using a Microsoft Entra account to sign in. Tables below describe permissions that different roles have on various functionalities within Fraud Protection.

Summary report, Rule report, Threat report & Monitoring

Permission Roles
Read only Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor, Fraud Analyst, Reporting
No access Manual Review Agent, Technical Developer, Customer Service Support

Score report

Permission Roles
Read only Product Admin, PSP Admin, Fraud Manager, Reporting
No access Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support

Search, View Transaction Details & Export

Permission Roles
Read only Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Customer Service Support
No access Technical Developer, Reporting

Notes

Permission Roles
Read/Write Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor, Manual Review Agent, Customer Service Support
Read only Fraud Analyst
No access Technical Developer, Reporting

Decision Rules, Branches, Functions & Velocities

Permission Roles
Read/Write Product Admin, PSP Admin, Fraud Manager
Read only Fraud Supervisor, Fraud Analyst
No access Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Custom Lists & Support Lists

Permission Roles
Read/Write Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor
Read only Fraud Analyst
No access Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Note

Users with the Manual Review Age** role can add or remove items to the Support list on the Transaction details page. However, they can't access the full Support lists page.

External Calls & Event Tracing

Permission Roles
Read/Write Product Admin, PSP Admin
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Routing rules

Permission Roles
Read/Write Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor
Read only Fraud Analyst
No access Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Queues

Permission Roles
Read/Write Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor
Read only Fraud Analyst, Manual Review Agent
No access Technical Developer, Customer Service Support, Reporting

Note

Users with the Manual Review Agent role can make decisions (for example, Approve, Reject, or Send back to queue) on cases in queues. However, they can't modify queue settings.

Assign users to queues

Permission Roles
Read/Write Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor
No access Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Case Review

Permission Roles
Read/Write Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor, Manual Review Agent
Read only Fraud Analyst
No access Technical Developer, Customer Service Support, Reporting

Case Review Reports

Permission Roles
Read only Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor
No access Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Data Upload

Permission Roles
Read/Write Product Admin, PSP Admin, Fraud Manager
No access Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

API Management

Permission Roles
Read only Product Admin, PSP Admin, Technical Developer
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Customer Service Support, Reporting

Templates

Template Type Permission Roles
Rules Read/Write/Export Product Admin, PSP Admin, Fraud Manager
Rules No access Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting
Environment Read/Write/Export Product Admin, PSP Admin
Environment No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Note

  • To create a template from a resource, the user must have read permission on the resource as well as write permission on the template.
  • To create a resource using a template, the user must have write permission on the resource as well as read permission on the template.

Integration - Dashboard

Permission Roles
Read only Product Admin, PSP Admin, Technical Developer
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Customer Service Support, Reporting

Integration - Entra Applications and SSL Certificate

Permission Roles
Read/Write Product Admin, PSP Admin, Technical Developer
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Customer Service Support, Reporting

Note

To create a Microsoft Entra application, the user must also be assigned the Application Administrator, Cloud Application Administrator, or Global Administrator role in your Microsoft Entra tenant.

Settings - Usage

Permission Roles
Read only Product Admin, PSP Admin
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Settings - Activity Logs

Permission Roles
Read only Product Admin, PSP Admin, Reporting
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support

Settings - Access Control (Users & Entra Groups)

Permission Roles
Read/Write Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor
No access Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Note

  • PSP Admin can assign all roles except Product Admin.
  • Fraud Manager can assign all roles except Product Admin, PSP Admin, and Reporting.
  • Fraud Supervisor can assign all roles except Product Admin, PSP Admin, Reporting, and Fraud Manager.

Settings - Access Control (API roles for Microsoft Entra applications)

Permission Roles
Read/Write Product Admin
Read-only PSP Admin, Technical Developer
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Customer Service Support, Reporting

Settings - Subject Requests

Permission Roles
Read/Write Product Admin, PSP Admin
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Settings - Transaction acceptance booster

Permission Roles
Read/Write Product Admin, PSP Admin
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Notifications

Notification Type Roles that have permissions to view and dismiss
Environment Management, Event tracing, Subscription Expiry, Subject requests, SSL certificate & External call Product Admin, PSP Admin
Actions Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor, Fraud Analyst
Search & Notes Product Admin, PSP Admin, Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Customer Service Support

Manage Environments - Create and delete root environments

Permission Roles
Read/Write Product Admin
No access PSP Admin, Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Note

PSP Admin can't create or delete root (top-level) environments. They can only create or delete children environments.

Manage Environments - Update root environments

Permission Roles
Read only Product Admin, PSP Admin, Fraud Manager
No access Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Note

Update includes updating name and tags, and assigning APIs.

Manage Environments - Create, update and delete non-root environments

Permission Roles
Read/Write Product Admin, PSP Admin, Provisioning_API (under the root environment the Entra application is authorized for)
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Note

You can use an Entra application with an assigned Provisioning_API role to create, update, or delete non-root environments via an API call. To learn how to assign API roles to Entra applications, refer to the Configure Microsoft Entra app access article.

Admin Settings - Subscription

Permission Roles
Read only Product Admin
No access PSP Admin, Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Admin Settings - Configuration

Permission Roles
Read only Product Admin, PSP Admin
No access Fraud Manager, Fraud Supervisor, Fraud Analyst, Manual Review Agent, Technical Developer, Customer Service Support, Reporting

Member access

Members can access Fraud Protection at https://dfp.microsoft.com/ and by using a Microsoft account to sign in.

Guest user access

Guest users can access Fraud Protection after they accept an email invitation and sign up (or sign in). To accept an invitation to Fraud Protection, follow these steps.

  1. Check your email inbox for an email that has the subject line "<Name> invited you to access applications within their organization."
  2. Select Accept invitation.
  3. If an existing Microsoft account or related account uses your email address, you're prompted to use that account to sign in. Otherwise, follow the setup process to sign up for a new account. After you're fully signed in, you should have access to Fraud Protection.
  4. Return to the invitation email, and write down or bookmark the exact link that appears after the text "If you accept this invitation, you will be sent to...." This link is in the format https://dfp.microsoft.com/.../.... Each time that you access Fraud Protection, you must use this exact link.
  5. For future access, go to https://dfp.microsoft.com/ and sign in with the guest user account.

Switch between tenants

You can use the tenant picker to select which tenant you want to be in, provided you have multiple tenants with Fraud Protection provisioned.

The tenant picker can be found by selecting the profile symbol on the top right of the dashboard, and then selecting Switch tenant. The tenant picker gives you a set of options to pick from. The options are only tenants that you, as a guest or administrator, have access to. To change to a different tenant, select the tenant name you want to be in to be redirected.

If you receive an error that says global administrator privileges are required, select Switch tenant at the bottom of the screen. The tenant picker opens and you can select the proper tenant.

Additional resources

Configure user access

Create a user account in Microsoft Entra ID

Assign a user account to an enterprise application