SlideShare a Scribd company logo
1 of 30
Lightning Login: The Best Feature
You've Never Heard About
SmithMichael@Salesforce.com, @force2b_Mike
Michael Smith, Senior Member of Technical Staff – Salesforce.org
Forward-Looking Statements
Statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if
any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-
looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of
product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of
management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments
and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our
service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of
growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and
any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain,
and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling
non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the
financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form
10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the
Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may
not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently
available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
What is Lightning Login?
What is Lightning Login?
Lightning Login will allow you to log into Salesforce using only your
Username and your mobile device.
Lightning Login is enabled for all Users by default
Lightning Login has no direct relationship with the Lightning
Experience (LEX).
• Works in Classic!
• The Lightning Experience does not need to be
enabled to use Lightning Login
What is Lightning Login?
Lightning Login will work in all editions of Salesforce and any type
of Org - Production, Sandbox, Dev, and even Scratch Orgs.
Works for Internal Users only – not external Community Users
MyDomain does not need to be enabled either
(though everyone should be using this already!)
It can be restricted to specific Users through a
Permission Set or a Profile
What are the Requirements to use Lightning Login?
1. An Android or iOS mobile device with the Salesforce
Authenticator app installed
2. Each User must individually enroll in Lightning Login (i.e., link
their mobile device to their Salesforce User account).
Why Use Lightning Login?
Why Use Lightning Login?
Lightning Login is super convenient for Users
• Log in with only your Username and your mobile device!
Adds a layer of security by requiring two-factors authentication for
every login
• Factor 1: Something you know or have (Fingerprint or PIN)
• Factor 2: Something you have (Mobile Device with the
Salesforce Authenticator installed)
How does it differ from standard Two-Factor Authentication
Standard Two Factor Authentication requires:
• Username and Password
• Second form of authentication – Mobile Device, YubiKey, or other unique
code generator
Lightning Login can be used in Orgs that have 2FA enabled
• When 2FA is enabled Lightning Login will require an
extra fingerprint or PIN entry on the mobile device.
What does logging in with
Lightning Login look like?
How do you login with Lightning Login?
On your computer:
• Enter your username and leave the password field blank
How do you login with Lightning Login?
On your computer:
• OR Click on the remembered Username when prompted
How do you login with Lightning Login?
On your mobile device:
Enabling Lightning Login in
your Organization
Configuring Lightning Login
By default, Lightning Login is already enabled in all
organizations.
Lightning Login can be further secured with some
additional settings:
• The “Allow only for Users with the Lightning Login User
permission” option on the Session Settings page can be
used to control individual access to Lightning Login.
• Lightning Login can be added to the High Assurance
Session Security Level. This is useful in organizations that
require a higher level of security to access Reports,
Dashboards, and/or Connected Apps.
Enable Lightning Login in your organization
How a User enrolls in Lightning Login
How a User Enrolls in Lightning Login
Admin’s cannot enroll their Users in Lightning
Login for them!
Users must first install the Salesforce Authenticator
on their mobile device
From within Salesforce, have the User go to Settings
by clicking on their name/icon at the top of the page
and select “Settings”
Each User that wants to use Lightning Login must go through this process
How a User Enrolls in Lightning Login
Expand the Personal section on the left and click on
Advanced User Details
Don’t click the Edit button at the top of the page
Each User that wants to use Lightning Login must go through this process
How a User Enrolls in Lightning Login
Scroll down on the page and look for an “Enroll” link
next to “Lightning Login”
Have the user click the Enroll link
Each User that wants to use Lightning Login must go through this process
How a User Enrolls in Lightning Login
Depending on the Org’s security settings, the User
may be asked to confirm their identity through one of
the following:
• Log in a second time (enter their Username/Password)
• Enter a one-time verification code sent by SMS or email
• Approve an authenticator notification
How a User Enrolls in Lightning Login
Finally the User is asked to register the mobile
device to use with Lightning Login by entering a two-
word phrase.
Open the Salesforce Authenticator App from your
mobile device
The Salesforce Authenticator is NOT the
Salesforce app
How a User Enrolls in Lightning Login
Open the Salesforce Authenticator app on your
mobile device
Click the +New Account button at the bottom
How a User Enrolls in Lightning Login
Enter the two word
phrase displayed on
your mobile device into
the prompt on your
computer and click
[Connect]
How a User Enrolls in Lightning Login
On your mobile device, click the
[Connect] button and then the
[Approve] button on the final
screen.
How a User Enrolls in Lightning Login
AND NOW … A LIVE DEMO
Followed shortly by
more coffee!
 Video: https://sfdc.co/df17lightninglogin
Trailhead: Identity Login
Trailhead: Security Basics
For more information visit:
QUESTIONS?
(Salesforce) Lightning Login - Dreamforce 2017

More Related Content

What's hot

Accessing soft layer
Accessing soft layerAccessing soft layer
Accessing soft layercarlito dizon
 
Salesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every AdminSalesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every AdminCloud Analogy
 
Visitor Management SOlution
Visitor Management SOlutionVisitor Management SOlution
Visitor Management SOlutionVIKAS MODI
 
Developing on the Salesforce Platform With Clicks, Not Code
Developing on the Salesforce Platform With Clicks, Not CodeDeveloping on the Salesforce Platform With Clicks, Not Code
Developing on the Salesforce Platform With Clicks, Not CodeSalesforce Developers
 
Applied Recognition Face Biometrics Presentation for Silicon Halton Meetup
Applied Recognition Face Biometrics Presentation for Silicon Halton MeetupApplied Recognition Face Biometrics Presentation for Silicon Halton Meetup
Applied Recognition Face Biometrics Presentation for Silicon Halton MeetupRick Stomphorst
 
MavMLM_Brochure_English
MavMLM_Brochure_EnglishMavMLM_Brochure_English
MavMLM_Brochure_Englishadam webb
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleSalesforce Developers
 
Visitor Management Solution
Visitor Management Solution Visitor Management Solution
Visitor Management Solution RITESH HELONDE
 
Visitor management System Call Now 9034757673
Visitor management System Call Now 9034757673Visitor management System Call Now 9034757673
Visitor management System Call Now 9034757673Mayank Jain
 

What's hot (9)

Accessing soft layer
Accessing soft layerAccessing soft layer
Accessing soft layer
 
Salesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every AdminSalesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every Admin
 
Visitor Management SOlution
Visitor Management SOlutionVisitor Management SOlution
Visitor Management SOlution
 
Developing on the Salesforce Platform With Clicks, Not Code
Developing on the Salesforce Platform With Clicks, Not CodeDeveloping on the Salesforce Platform With Clicks, Not Code
Developing on the Salesforce Platform With Clicks, Not Code
 
Applied Recognition Face Biometrics Presentation for Silicon Halton Meetup
Applied Recognition Face Biometrics Presentation for Silicon Halton MeetupApplied Recognition Face Biometrics Presentation for Silicon Halton Meetup
Applied Recognition Face Biometrics Presentation for Silicon Halton Meetup
 
MavMLM_Brochure_English
MavMLM_Brochure_EnglishMavMLM_Brochure_English
MavMLM_Brochure_English
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
 
Visitor Management Solution
Visitor Management Solution Visitor Management Solution
Visitor Management Solution
 
Visitor management System Call Now 9034757673
Visitor management System Call Now 9034757673Visitor management System Call Now 9034757673
Visitor management System Call Now 9034757673
 

Similar to (Salesforce) Lightning Login - Dreamforce 2017

What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceShesh Kondi
 
Take Security to the Next Level w/ Lightning Login
Take Security to the Next Level w/ Lightning Login Take Security to the Next Level w/ Lightning Login
Take Security to the Next Level w/ Lightning Login Salesforce Admins
 
Advanced Uses of Salesforce's Login Flows
Advanced Uses of Salesforce's Login FlowsAdvanced Uses of Salesforce's Login Flows
Advanced Uses of Salesforce's Login FlowsSalesforce Developers
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSalesforce Developers
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSalesforce Admins
 
Build Your Lightning Rollout Plan - September 2017
Build Your Lightning Rollout Plan - September 2017Build Your Lightning Rollout Plan - September 2017
Build Your Lightning Rollout Plan - September 2017Salesforce Admins
 
Introduction to lightning out df16
Introduction to lightning out   df16Introduction to lightning out   df16
Introduction to lightning out df16Mohith Shrivastava
 
[Delivering Salesforce secure access to remote workforce
[Delivering Salesforce secure access to remote workforce[Delivering Salesforce secure access to remote workforce
[Delivering Salesforce secure access to remote workforceAnna Loughnan Colquhoun
 
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherTwo-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherSalesforce Admins
 
How to Become a Security-Minded Admin
How to Become a Security-Minded AdminHow to Become a Security-Minded Admin
How to Become a Security-Minded AdminSalesforce Admins
 
Mobile Application Security: How Financial Services Companies Do It
Mobile Application Security: How Financial Services Companies Do ItMobile Application Security: How Financial Services Companies Do It
Mobile Application Security: How Financial Services Companies Do ItSalesforce Developers
 
Administer on the Go with SalesforceA, Even from a Chinook Helicopter by Dona...
Administer on the Go with SalesforceA, Even from a Chinook Helicopter by Dona...Administer on the Go with SalesforceA, Even from a Chinook Helicopter by Dona...
Administer on the Go with SalesforceA, Even from a Chinook Helicopter by Dona...Salesforce Admins
 
Your Lightning Game Plan in 3 Steps
Your Lightning Game Plan in 3 StepsYour Lightning Game Plan in 3 Steps
Your Lightning Game Plan in 3 StepsSalesforce Admins
 
Advanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social AuthenticationAdvanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social AuthenticationSalesforce Developers
 
Salesforce Identity Management
Salesforce Identity ManagementSalesforce Identity Management
Salesforce Identity ManagementJayant Jindal
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...Salesforce Developers
 
Deep dive into salesforce connected app part 1
Deep dive into salesforce connected app   part 1Deep dive into salesforce connected app   part 1
Deep dive into salesforce connected app part 1Mohith Shrivastava
 
NYC Admin Zone: Build Your Security Superpowers
NYC Admin Zone:  Build Your Security SuperpowersNYC Admin Zone:  Build Your Security Superpowers
NYC Admin Zone: Build Your Security SuperpowersSalesforce Admins
 
Salesforce: Go Faster with Lightning (DocuSign DevCon)
Salesforce: Go Faster with Lightning (DocuSign DevCon)Salesforce: Go Faster with Lightning (DocuSign DevCon)
Salesforce: Go Faster with Lightning (DocuSign DevCon)Mary Scotton
 

Similar to (Salesforce) Lightning Login - Dreamforce 2017 (20)

What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
Take Security to the Next Level w/ Lightning Login
Take Security to the Next Level w/ Lightning Login Take Security to the Next Level w/ Lightning Login
Take Security to the Next Level w/ Lightning Login
 
Advanced Uses of Salesforce's Login Flows
Advanced Uses of Salesforce's Login FlowsAdvanced Uses of Salesforce's Login Flows
Advanced Uses of Salesforce's Login Flows
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
 
Build Your Lightning Rollout Plan - September 2017
Build Your Lightning Rollout Plan - September 2017Build Your Lightning Rollout Plan - September 2017
Build Your Lightning Rollout Plan - September 2017
 
Introduction to lightning out df16
Introduction to lightning out   df16Introduction to lightning out   df16
Introduction to lightning out df16
 
Building BOTS on App Cloud
Building BOTS on App CloudBuilding BOTS on App Cloud
Building BOTS on App Cloud
 
[Delivering Salesforce secure access to remote workforce
[Delivering Salesforce secure access to remote workforce[Delivering Salesforce secure access to remote workforce
[Delivering Salesforce secure access to remote workforce
 
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherTwo-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
 
How to Become a Security-Minded Admin
How to Become a Security-Minded AdminHow to Become a Security-Minded Admin
How to Become a Security-Minded Admin
 
Mobile Application Security: How Financial Services Companies Do It
Mobile Application Security: How Financial Services Companies Do ItMobile Application Security: How Financial Services Companies Do It
Mobile Application Security: How Financial Services Companies Do It
 
Administer on the Go with SalesforceA, Even from a Chinook Helicopter by Dona...
Administer on the Go with SalesforceA, Even from a Chinook Helicopter by Dona...Administer on the Go with SalesforceA, Even from a Chinook Helicopter by Dona...
Administer on the Go with SalesforceA, Even from a Chinook Helicopter by Dona...
 
Your Lightning Game Plan in 3 Steps
Your Lightning Game Plan in 3 StepsYour Lightning Game Plan in 3 Steps
Your Lightning Game Plan in 3 Steps
 
Advanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social AuthenticationAdvanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social Authentication
 
Salesforce Identity Management
Salesforce Identity ManagementSalesforce Identity Management
Salesforce Identity Management
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
 
Deep dive into salesforce connected app part 1
Deep dive into salesforce connected app   part 1Deep dive into salesforce connected app   part 1
Deep dive into salesforce connected app part 1
 
NYC Admin Zone: Build Your Security Superpowers
NYC Admin Zone:  Build Your Security SuperpowersNYC Admin Zone:  Build Your Security Superpowers
NYC Admin Zone: Build Your Security Superpowers
 
Salesforce: Go Faster with Lightning (DocuSign DevCon)
Salesforce: Go Faster with Lightning (DocuSign DevCon)Salesforce: Go Faster with Lightning (DocuSign DevCon)
Salesforce: Go Faster with Lightning (DocuSign DevCon)
 

Recently uploaded

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 

Recently uploaded (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 

(Salesforce) Lightning Login - Dreamforce 2017

  • 1. Lightning Login: The Best Feature You've Never Heard About SmithMichael@Salesforce.com, @force2b_Mike Michael Smith, Senior Member of Technical Staff – Salesforce.org
  • 2. Forward-Looking Statements Statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward- looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 3.
  • 5. What is Lightning Login? Lightning Login will allow you to log into Salesforce using only your Username and your mobile device. Lightning Login is enabled for all Users by default Lightning Login has no direct relationship with the Lightning Experience (LEX). • Works in Classic! • The Lightning Experience does not need to be enabled to use Lightning Login
  • 6. What is Lightning Login? Lightning Login will work in all editions of Salesforce and any type of Org - Production, Sandbox, Dev, and even Scratch Orgs. Works for Internal Users only – not external Community Users MyDomain does not need to be enabled either (though everyone should be using this already!) It can be restricted to specific Users through a Permission Set or a Profile
  • 7. What are the Requirements to use Lightning Login? 1. An Android or iOS mobile device with the Salesforce Authenticator app installed 2. Each User must individually enroll in Lightning Login (i.e., link their mobile device to their Salesforce User account).
  • 9. Why Use Lightning Login? Lightning Login is super convenient for Users • Log in with only your Username and your mobile device! Adds a layer of security by requiring two-factors authentication for every login • Factor 1: Something you know or have (Fingerprint or PIN) • Factor 2: Something you have (Mobile Device with the Salesforce Authenticator installed)
  • 10. How does it differ from standard Two-Factor Authentication Standard Two Factor Authentication requires: • Username and Password • Second form of authentication – Mobile Device, YubiKey, or other unique code generator Lightning Login can be used in Orgs that have 2FA enabled • When 2FA is enabled Lightning Login will require an extra fingerprint or PIN entry on the mobile device.
  • 11. What does logging in with Lightning Login look like?
  • 12. How do you login with Lightning Login? On your computer: • Enter your username and leave the password field blank
  • 13. How do you login with Lightning Login? On your computer: • OR Click on the remembered Username when prompted
  • 14. How do you login with Lightning Login? On your mobile device:
  • 15. Enabling Lightning Login in your Organization
  • 16. Configuring Lightning Login By default, Lightning Login is already enabled in all organizations. Lightning Login can be further secured with some additional settings: • The “Allow only for Users with the Lightning Login User permission” option on the Session Settings page can be used to control individual access to Lightning Login. • Lightning Login can be added to the High Assurance Session Security Level. This is useful in organizations that require a higher level of security to access Reports, Dashboards, and/or Connected Apps. Enable Lightning Login in your organization
  • 17. How a User enrolls in Lightning Login
  • 18. How a User Enrolls in Lightning Login Admin’s cannot enroll their Users in Lightning Login for them! Users must first install the Salesforce Authenticator on their mobile device From within Salesforce, have the User go to Settings by clicking on their name/icon at the top of the page and select “Settings” Each User that wants to use Lightning Login must go through this process
  • 19. How a User Enrolls in Lightning Login Expand the Personal section on the left and click on Advanced User Details Don’t click the Edit button at the top of the page Each User that wants to use Lightning Login must go through this process
  • 20. How a User Enrolls in Lightning Login Scroll down on the page and look for an “Enroll” link next to “Lightning Login” Have the user click the Enroll link Each User that wants to use Lightning Login must go through this process
  • 21. How a User Enrolls in Lightning Login Depending on the Org’s security settings, the User may be asked to confirm their identity through one of the following: • Log in a second time (enter their Username/Password) • Enter a one-time verification code sent by SMS or email • Approve an authenticator notification
  • 22. How a User Enrolls in Lightning Login Finally the User is asked to register the mobile device to use with Lightning Login by entering a two- word phrase. Open the Salesforce Authenticator App from your mobile device The Salesforce Authenticator is NOT the Salesforce app
  • 23. How a User Enrolls in Lightning Login Open the Salesforce Authenticator app on your mobile device Click the +New Account button at the bottom
  • 24. How a User Enrolls in Lightning Login Enter the two word phrase displayed on your mobile device into the prompt on your computer and click [Connect]
  • 25. How a User Enrolls in Lightning Login On your mobile device, click the [Connect] button and then the [Approve] button on the final screen.
  • 26. How a User Enrolls in Lightning Login
  • 27. AND NOW … A LIVE DEMO Followed shortly by more coffee!
  • 28.  Video: https://sfdc.co/df17lightninglogin Trailhead: Identity Login Trailhead: Security Basics For more information visit:

Editor's Notes

  1. Good morning and welcome to what will be a short presentation on one of my favorite and under-used features – Lightning Login My name is Michael Smith. I work for Salesforce.org as a developer on the Nonprofit Success Pack. Prior to that I was a consultant for 8 years, and that is where I was first introduced to this feature.
  2. Before I begin, just a quick note that when considering future developments you should always base your purchasing decisions on what is currently available and not discussions on what functionality may or may not be released in the future.
  3. When I did this at Dreamforce, it was the first session on morning after the concert. So, coffee was needed for everyone. Today, it's not too early, unless like me you were up at 4:30AM.
  4. So, you might ask - What is lightning login?
  5. The quick definition is that it allows you to log into Salesforce very fast using only your username and your mobile device. It’s LIGHTNING FAST login. First released in Winter ‘17 to not much fan-fare, the feature is automatically enabled for all Orgs and all Users Even though it starts with the word LIGHTNING, it really has no direct connection to the Lightning Experience. WORKS IN CLASSIC. Yes it does!!
  6. Works in any org – Production, Sandbox, Dev Org, and even Scratch Orgs Supports Internal Users only, but not external Community or Chatter Free users. Doesn’t require that LEX or MyDomain be enabled in your org. Though, honestly if you’re already using MyDomain – I highly recommend it. For those orgs that want to restrict its usage, as with most Salesforce functionality Lightning Logic can be locked down to work only for specific Users through Profile or Permission Set assignments.
  7. To use Lightning Login, your end users must do two things: Install the Salesforce Authenticator App from the App Store or Google Play Store Enroll in Lightning Login from within Salesforce - which effectively links their User account to the Salesforce Authenticator app on their phone
  8. You might ask – why should we use this
  9. It’s a REALLY fast way of logging in. Don’t give in to Users lobbying for less stringent password requirements It adds a layer of extra security by requiring something extra or at least different to login. The User would need to know their Username – which they all do; and they would need access to their mobile device (and who doesn’t have their phone on them nearly 24x7). To protect your company and customer data, all Salesforce organizations should of course have strong password complexity requirements and require frequent password changes, but you don’t want to make it impossible for your users to log into Salesforce either. Lightning Login can bridge that gap.
  10. Lightning Login in different than standard 2 Factor Authentication though. Standand 2FA requires three things Username Password A second form of authentication – For example Mobile Device with SMS or an authenticator app, a Yubikey, or some other form of RSA code generator The first two constitute something you know, while the last one is something you have. This is the basis of most 2 factor authentication schemes. Personally I use 2FA on all social media and email accounts. What if someone hacks Yahoo and steals their Usernames and Password; oops. That’s already happened. Glad I use 2FA.
  11. Alright, so what does logging in with Lightning Login actually look like for the Users
  12. They’ll start on the basic login page. That could be one like this asking for a Username and a Password. Here the User only needs to enter their Username. The password field can be left blank.
  13. Or if they checked the “Remember Me” option, the login page might look like this. Here they just click their Username.
  14. In either of those cases, if Lightning Login has been enabled for that User, they’ll receive a notification on their mobile device. They simply press on the notification, authenticate into the phone with a thumbprint or a PIN, and then click the [Appove] button. If the org has Two Factor Authentication enabled and required for the User, then they’ll also be asked to re-authenticate their phone by using their thumbprint or PIN a second time.
  15. How do you as an Admin enable/configure Lightning Login?
  16. As I mentioned earlier, Lightning Login is already enabled by default in all Salesforce orgs You can further lock it down by checking the option for “Allow only for Users with Lightning Login user Permission” on the Session Settings page under Setup.
  17. Finally, how do you or your users enroll in Lightning Login for your org? It’s easy and only takes a couple of minutes ; or maybe a little longer if you need to download the Salesforce Authenticator app
  18. First thing to know: Admins cannot enroll their Users in Lightning Login for them. They must do it themselves. Step 1: Download and Install the Salesforce Authenticator app from the Google Play or Apple App Store Step 2: From within Salesforce on a computer, have their User click on their name/icon at the top right of the page and select Settings
  19. Step 3: Click on “Advanced User Details” – DON’T CLICK EDIT
  20. Step 4: Scroll down on the page and click ENROLL next to “Lightning Login”
  21. Depending on the Organizations current security settings, they will be asked to verify their identity. This might be as simple as entering a verification code sent through email or SMS or it might require them to log in a second time or to use an authenticator token.
  22. Finally, the User will be asked to register their Salesforce Authenticator app. This is EASY, but the User needs to have the app installed. Don’t forget that this is not the Salesforce1 app (now called the Salesforce Mobile App).
  23. Open the Salesforce Authenticator App on your phone Click the [New Account] button at the bottom of the screen
  24. A simple two word phrase will be displayed on your mobile device Now just enter that same phrase onto your computer and click [Connect]
  25. You’ll be asked to approve that connection on your phone by clicking [Connect] and then [Approve]
  26. And that’s it. You’re done. Now you can log in to Salesforce as fast as a bolt of lightning, or something along those lines.
  27. Demo time
  28. Coffee …. As promised