Jihun Jung will give a presentation on Salesforce data accessibility architecture. The presentation will include an introduction, overview of different types of data access including license models and sharing model components, and considerations for implementation. The sharing model components that will be covered include profiles and permission sets, record ownership, organization-wide defaults, role hierarchy, public groups, sharing rules, teams, territory management, and programmatic sharing. Best practices for implementation such as limiting the number of hierarchies, groups, and rules will also be discussed.
Introduction to the sharepoint 2013 userprofile service By QuontraQUONTRASOLUTIONS
- The document discusses connecting user profiles to the SharePoint portal through the user profile service application, which contains user profiles, profile synchronization, audiences, my sites, social tags, and the newsfeed.
- It provides an overview of the user profile service application and how it connects to my sites, social features, and the skydrive pro document synchronization service.
- Key components that the user profile service relies on are also summarized, including the managed metadata, search, and business connectivity services.
Managed metadata in SharePoint 2010 allows organizations to centrally manage taxonomies and content types across sites and farms. Key features include content type syndication, term stores to organize hierarchical term sets, and managed metadata columns to tag content with predefined terms. Metadata is critical for improving content discoverability through refined searches. While powerful, the managed metadata system has some limitations around security, extensibility, and client support that require consideration during design and governance.
This document discusses database concepts including different types of databases, data storage and retrieval methods, database models, and data schemas. It provides definitions and examples of operational databases, analytical databases, data warehouses, distributed databases, end user databases, external databases, sequential organization, indexed sequential organization, inverted list organization, direct access organization, hierarchical data model, network data model, relational data model, external schema, conceptual schema, internal schema, and mapping between schemas.
This document discusses database concepts including different types of databases, data storage and retrieval methods, database models, and schemas. It defines key terms like records, files, databases, operational databases, analytical databases, data warehouses, distributed databases, end user databases, external databases, data definition language, data manipulation language, and data dictionary. It also summarizes data storage methods like sequential organization, indexed sequential organization, inverted list organization, and direct access organization.
The document discusses different levels of data organization in databases from lowest to highest - character, field, record, file, and database. It then outlines objectives and types of databases including operational, analytical, data warehouse, distributed, end user, and external databases. Finally, it describes database management systems (DBMS), their components like data definition and manipulation languages, data dictionaries, and functions like organizing, integrating, and retrieving data.
The document discusses master data management (MDM), which aims to integrate tools, people and practices to organize an enterprise view of key business information like customers, suppliers, products, and employees. MDM seeks to consolidate common data concepts, subject that data to analysis to benefit the organization. It allows organizations to clearly define business concepts, integrate related data sets, and make the data available across the organization. The document outlines the typical technical capabilities of MDM, including a core master data hub, data integration, master data services, integration and delivery, access control, synchronization, and data governance. It provides advice for evaluating MDM software and transitioning to an MDM program.
Playing Tag: Managed Metadata and Taxonomies in SharePoint 2010Henry Ong
This slide deck was presented by Henry Ong at SharePoint Saturday Los Angeles on April 14, 2012. The original content was contributed by Chris McNulty, Strategic Product Manager for Quest Software. There are notes in many of the slides so you may want to download this presentation to get all the content.
Introduction to the sharepoint 2013 userprofile service By QuontraQUONTRASOLUTIONS
- The document discusses connecting user profiles to the SharePoint portal through the user profile service application, which contains user profiles, profile synchronization, audiences, my sites, social tags, and the newsfeed.
- It provides an overview of the user profile service application and how it connects to my sites, social features, and the skydrive pro document synchronization service.
- Key components that the user profile service relies on are also summarized, including the managed metadata, search, and business connectivity services.
Managed metadata in SharePoint 2010 allows organizations to centrally manage taxonomies and content types across sites and farms. Key features include content type syndication, term stores to organize hierarchical term sets, and managed metadata columns to tag content with predefined terms. Metadata is critical for improving content discoverability through refined searches. While powerful, the managed metadata system has some limitations around security, extensibility, and client support that require consideration during design and governance.
This document discusses database concepts including different types of databases, data storage and retrieval methods, database models, and data schemas. It provides definitions and examples of operational databases, analytical databases, data warehouses, distributed databases, end user databases, external databases, sequential organization, indexed sequential organization, inverted list organization, direct access organization, hierarchical data model, network data model, relational data model, external schema, conceptual schema, internal schema, and mapping between schemas.
This document discusses database concepts including different types of databases, data storage and retrieval methods, database models, and schemas. It defines key terms like records, files, databases, operational databases, analytical databases, data warehouses, distributed databases, end user databases, external databases, data definition language, data manipulation language, and data dictionary. It also summarizes data storage methods like sequential organization, indexed sequential organization, inverted list organization, and direct access organization.
The document discusses different levels of data organization in databases from lowest to highest - character, field, record, file, and database. It then outlines objectives and types of databases including operational, analytical, data warehouse, distributed, end user, and external databases. Finally, it describes database management systems (DBMS), their components like data definition and manipulation languages, data dictionaries, and functions like organizing, integrating, and retrieving data.
The document discusses master data management (MDM), which aims to integrate tools, people and practices to organize an enterprise view of key business information like customers, suppliers, products, and employees. MDM seeks to consolidate common data concepts, subject that data to analysis to benefit the organization. It allows organizations to clearly define business concepts, integrate related data sets, and make the data available across the organization. The document outlines the typical technical capabilities of MDM, including a core master data hub, data integration, master data services, integration and delivery, access control, synchronization, and data governance. It provides advice for evaluating MDM software and transitioning to an MDM program.
Playing Tag: Managed Metadata and Taxonomies in SharePoint 2010Henry Ong
This slide deck was presented by Henry Ong at SharePoint Saturday Los Angeles on April 14, 2012. The original content was contributed by Chris McNulty, Strategic Product Manager for Quest Software. There are notes in many of the slides so you may want to download this presentation to get all the content.
Introduction to the SharePoint 2013 User Profile ServiceRegroove
The SharePoint User Profile Service (UPS) is an evolving facet of SharePoint that allows centralized storage of info about individual users such as name, department, photo etc. and integrates in various ways with your organizations "people" system - Active Directory.
UPS has been greatly improved in SharePoint 2013, allowing easier setup and configuration, and facilitates SharePoint social features including MySites, Audiences, Social tags and notes. This allows you to get the positive aspects of the Facebook/Twitter/Yammer-style user experience baked directly into your SharePoint portal.
This presentation will be for SharePoint'ers of all technical levels so have no fear - come on down and learn a bit about one of the areas of SharePoint that brings the "wow" factor into your SharePoint portal.
The document discusses managed metadata and term stores in SharePoint 2010. It explains that managed metadata allows for a centralized, hierarchical collection of terms that provides a single source of truth for data context. It recommends creating term sets and metadata columns to utilize the managed metadata and provide consistency, central management, and the ability to adapt the terms over time. The document also demonstrates how to manage term stores through the central administration interface and use managed metadata columns in lists.
The SIF IDM 101 document provides an introduction and overview of the SIF IDM profile. It discusses:
1. The need for a common identity management profile to support single sign-on and seamless authentication across SIF enabled systems.
2. The key components of the SIF IDM profile including the logical data model, individual entity objects like OrganizationUser, Application, Authentication, and Authorization, and a recommended workflow.
3. How the SIF IDM profile aligns with standards like CEDS and provides a migration path from previous versions as well as use case examples.
The document introduces the core concepts and components of the SIF IDM profile in 3 sentences or less.
This document provides an overview of managed metadata and taxonomies in SharePoint 2010. It discusses metadata definitions and usage scenarios, folksonomies versus formal taxonomies, taxonomy management features including term sets and tags, content type hubs for sharing across sites, and configuration considerations. The presentation includes demonstrations of tagging, term sets, and content type hubs. It provides guidance on taxonomy design regarding dynamic external tags, security, open versus closed term sets, and the role of Master Data Services.
The document discusses potential future technology ideas for an university including desktop as a service, increased wireless infrastructure, identity management, Microsoft System Center solutions, SharePoint features and functionality, working with SharePoint lists and libraries, communicating with team members using discussion boards, blogs and wikis, using My Sites, integrating Office applications with SharePoint, and improved search capabilities.
This document provides an introduction and overview of database management systems (DBMS). It discusses what a DBMS is, its functions such as data definition, manipulation, retrieval and administration. It also covers the history of DBMS, differences between file systems and DBMS, and concepts like data abstraction. DBMS has advanced significantly in the last 20-22 years and makes it easier to store, retrieve and manipulate data from a database in an accurate and reliable manner compared to traditional file systems.
This document provides an introduction and overview of databases. It discusses what a database is, the functions of databases which include storing and retrieving data, multiuser access control, data storage management, backup and recovery, and transaction atomicity. It also describes different types of databases such as relational, document oriented, embedded, graph, hypertext, distributed, and operational databases. Finally, it lists some common applications of databases in banking, airlines, universities, credit cards, sales, and human resources.
Share point server 2016 as a document management solutionRaghunathan M.S.
SharePoint 2016 can serve as a document management system by providing core document management capabilities out of the box such as metadata, security, versioning, collaboration, indexing and publishing. It allows companies to ensure document control and compliance. SharePoint 2016 can be deployed on-premises, as infrastructure as a service (IaaS), or in the cloud as SharePoint Online. On-premises provides more control but higher costs, while Online provides less customization but lower costs and simpler maintenance. SharePoint offers improved mobility, collaboration and document management over traditional file servers.
SharePoint 2010 Managed Metadata Service ApplicationMohamed Abdeen
This document provides an overview of the SharePoint 2010 Managed Metadata Service.
It defines metadata and taxonomy, and explains that a managed metadata service allows terms to be organized hierarchically in term sets. The document describes how term sets can be global or local in scope. Keywords are also discussed as an unmanaged tagging system.
The document outlines the main applications of the managed metadata service: 1) taxonomies using term sets, 2) folksonomies using keywords, and 3) syndicated content types that can be published from a hub site collection.
SharePoint 2010 Managed Metadata, presented by Nick Hobbs at Capgemini UK, 2nd May 2012.
Please note, the presentation included a live demo showing how to use Managed Metadata via the UI. This obviously cannot be included in the slides.
These are the topics discussed:
- What is Managed Metadata?
- Why use it?
- How can I use Managed Metadata via the UI?
- How does it work behind-the-scenes?
- How can I use it programmatically?
- What problems and limitations are there?
This document provides an overview of database creation, granting user rights, threats and security, and backup. It discusses creating a database, defining tables and fields, granting users access to tables, common database threats and how to manage security, and the importance of backups. Physical database design involves translating the logical data model into technical specifications for storing and retrieving data efficiently while maintaining integrity, security, and recoverability.
This document is a 36 slide PowerPoint presentation by Metataxis on metadata management in SharePoint 2013. It provides an overview of key concepts like columns, content types, term sets, and the managed metadata service. It also discusses best practices for information architecture, governance, and ongoing management of metadata in SharePoint. The presentation aims to be interactive and cover both technical and practical information management topics at a level that is not purely technical.
This document provides an overview of database management systems and the normalization process. It begins with definitions of data hierarchy and traditional file processing approaches. It then describes the benefits of a database approach using a DBMS, including features like querying, backup/replication, and security. Components of a DBMS are explained, including data definition languages, data manipulation languages, and the data dictionary. Common data models like hierarchical, network, relational, and object models are also summarized. The document concludes by defining key concepts in normalization like functional dependencies and normal forms, and providing an overview of the normalization process.
This document discusses challenges in developing master data models across multiple domains. Some key challenges include conflicting data structures and semantics between different models, the expectation that each real-world entity should have only one master record even when represented in different domains, and the need to create horizontal views across domains to provide full visibility of entity data. The document argues that a governed, model-driven approach is needed to reduce duplication and inconsistencies when integrating multiple legacy models into a unified master data environment.
The document discusses database concepts and components. It lists the group members working on the project as Raja Muhammad noman, Muhammad aqib, Haider abbas, and Farhad abbas. It then covers topics such as the hierarchy of data, maintaining data through adding, changing and deleting records, and validating data. It also compares file processing and database approaches. The roles of database analysts and administrators in managing the database are also summarized.
Enterprise Information Catalogue Another WayVictor Zhang
Here I present another perpective on how to organize,catalogue,share and access information or knowledge within enterprise.
It has some ideas on typical scenarios on how we utilize the information to fulfill daily job and also briefs the features of a software which I used to implement the ideas.
It's just a platform which for in-house use and I think it really make some difference to the way how I and my team to tidy-up and share the information.
Welcome any ideas, comments and discussions. You can reach me at victor.reload@gmail.com
This document provides an introduction and overview for a course on Relational Database Management Systems. It outlines the instructor details, evaluation criteria including assignments and tests, marks distribution across internal and external assessments. Required textbooks are listed for both theory and practical components. Previous year question papers are linked. The course syllabus is broken down into four main sections covering database concepts, data models, relational model and relational query language SQL. Key points are highlighted regarding attendance, assignment deadlines, and accessing course materials on the college server.
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Usman Tariq
In this PPT, you will learn:
• About data modeling and why data models are important
• About the basic data-modeling building blocks
• What business rules are and how they influence database design
• How the major data models evolved
• About emerging alternative data models and the needs they fulfill
• How data models can be classified by their level of abstraction
Author: Carlos Coronel | Steven Morris
The document discusses making content easy to find through effective metadata strategies and content modeling. It notes that as digital content expands rapidly, better information organization is needed to improve access. Metadata provides a way to organize large amounts of content and is critical for effective search and records management. The document provides examples of metadata standards and tags that can be used to classify and describe different types of content.
The document discusses sharing and settings in Salesforce, including organization-wide defaults (OWD), sharing rules, and territory management. OWD determine the baseline access and permissions users have to records they do not own. There are different OWD levels of access. Sharing rules extend sharing access to users in groups, roles, or territories, providing exceptions to the OWD. There are owner-based and criteria-based sharing rules. Territory management allows grouping customer accounts based on defined criteria using territory types, models, and hierarchies.
Salesforce sharing and visibility Part 1Ahmed Keshk
This document provides an overview of Salesforce sharing and visibility settings including profiles, permission sets, field level security, record level security, organization wide defaults, and role hierarchies. It discusses how profiles control user access and permissions. Permission sets extend user access without changing profiles. Field level security controls field visibility. Record level security and organization wide defaults specify default sharing while role hierarchies ensure managers have access to subordinate records.
Introduction to the SharePoint 2013 User Profile ServiceRegroove
The SharePoint User Profile Service (UPS) is an evolving facet of SharePoint that allows centralized storage of info about individual users such as name, department, photo etc. and integrates in various ways with your organizations "people" system - Active Directory.
UPS has been greatly improved in SharePoint 2013, allowing easier setup and configuration, and facilitates SharePoint social features including MySites, Audiences, Social tags and notes. This allows you to get the positive aspects of the Facebook/Twitter/Yammer-style user experience baked directly into your SharePoint portal.
This presentation will be for SharePoint'ers of all technical levels so have no fear - come on down and learn a bit about one of the areas of SharePoint that brings the "wow" factor into your SharePoint portal.
The document discusses managed metadata and term stores in SharePoint 2010. It explains that managed metadata allows for a centralized, hierarchical collection of terms that provides a single source of truth for data context. It recommends creating term sets and metadata columns to utilize the managed metadata and provide consistency, central management, and the ability to adapt the terms over time. The document also demonstrates how to manage term stores through the central administration interface and use managed metadata columns in lists.
The SIF IDM 101 document provides an introduction and overview of the SIF IDM profile. It discusses:
1. The need for a common identity management profile to support single sign-on and seamless authentication across SIF enabled systems.
2. The key components of the SIF IDM profile including the logical data model, individual entity objects like OrganizationUser, Application, Authentication, and Authorization, and a recommended workflow.
3. How the SIF IDM profile aligns with standards like CEDS and provides a migration path from previous versions as well as use case examples.
The document introduces the core concepts and components of the SIF IDM profile in 3 sentences or less.
This document provides an overview of managed metadata and taxonomies in SharePoint 2010. It discusses metadata definitions and usage scenarios, folksonomies versus formal taxonomies, taxonomy management features including term sets and tags, content type hubs for sharing across sites, and configuration considerations. The presentation includes demonstrations of tagging, term sets, and content type hubs. It provides guidance on taxonomy design regarding dynamic external tags, security, open versus closed term sets, and the role of Master Data Services.
The document discusses potential future technology ideas for an university including desktop as a service, increased wireless infrastructure, identity management, Microsoft System Center solutions, SharePoint features and functionality, working with SharePoint lists and libraries, communicating with team members using discussion boards, blogs and wikis, using My Sites, integrating Office applications with SharePoint, and improved search capabilities.
This document provides an introduction and overview of database management systems (DBMS). It discusses what a DBMS is, its functions such as data definition, manipulation, retrieval and administration. It also covers the history of DBMS, differences between file systems and DBMS, and concepts like data abstraction. DBMS has advanced significantly in the last 20-22 years and makes it easier to store, retrieve and manipulate data from a database in an accurate and reliable manner compared to traditional file systems.
This document provides an introduction and overview of databases. It discusses what a database is, the functions of databases which include storing and retrieving data, multiuser access control, data storage management, backup and recovery, and transaction atomicity. It also describes different types of databases such as relational, document oriented, embedded, graph, hypertext, distributed, and operational databases. Finally, it lists some common applications of databases in banking, airlines, universities, credit cards, sales, and human resources.
Share point server 2016 as a document management solutionRaghunathan M.S.
SharePoint 2016 can serve as a document management system by providing core document management capabilities out of the box such as metadata, security, versioning, collaboration, indexing and publishing. It allows companies to ensure document control and compliance. SharePoint 2016 can be deployed on-premises, as infrastructure as a service (IaaS), or in the cloud as SharePoint Online. On-premises provides more control but higher costs, while Online provides less customization but lower costs and simpler maintenance. SharePoint offers improved mobility, collaboration and document management over traditional file servers.
SharePoint 2010 Managed Metadata Service ApplicationMohamed Abdeen
This document provides an overview of the SharePoint 2010 Managed Metadata Service.
It defines metadata and taxonomy, and explains that a managed metadata service allows terms to be organized hierarchically in term sets. The document describes how term sets can be global or local in scope. Keywords are also discussed as an unmanaged tagging system.
The document outlines the main applications of the managed metadata service: 1) taxonomies using term sets, 2) folksonomies using keywords, and 3) syndicated content types that can be published from a hub site collection.
SharePoint 2010 Managed Metadata, presented by Nick Hobbs at Capgemini UK, 2nd May 2012.
Please note, the presentation included a live demo showing how to use Managed Metadata via the UI. This obviously cannot be included in the slides.
These are the topics discussed:
- What is Managed Metadata?
- Why use it?
- How can I use Managed Metadata via the UI?
- How does it work behind-the-scenes?
- How can I use it programmatically?
- What problems and limitations are there?
This document provides an overview of database creation, granting user rights, threats and security, and backup. It discusses creating a database, defining tables and fields, granting users access to tables, common database threats and how to manage security, and the importance of backups. Physical database design involves translating the logical data model into technical specifications for storing and retrieving data efficiently while maintaining integrity, security, and recoverability.
This document is a 36 slide PowerPoint presentation by Metataxis on metadata management in SharePoint 2013. It provides an overview of key concepts like columns, content types, term sets, and the managed metadata service. It also discusses best practices for information architecture, governance, and ongoing management of metadata in SharePoint. The presentation aims to be interactive and cover both technical and practical information management topics at a level that is not purely technical.
This document provides an overview of database management systems and the normalization process. It begins with definitions of data hierarchy and traditional file processing approaches. It then describes the benefits of a database approach using a DBMS, including features like querying, backup/replication, and security. Components of a DBMS are explained, including data definition languages, data manipulation languages, and the data dictionary. Common data models like hierarchical, network, relational, and object models are also summarized. The document concludes by defining key concepts in normalization like functional dependencies and normal forms, and providing an overview of the normalization process.
This document discusses challenges in developing master data models across multiple domains. Some key challenges include conflicting data structures and semantics between different models, the expectation that each real-world entity should have only one master record even when represented in different domains, and the need to create horizontal views across domains to provide full visibility of entity data. The document argues that a governed, model-driven approach is needed to reduce duplication and inconsistencies when integrating multiple legacy models into a unified master data environment.
The document discusses database concepts and components. It lists the group members working on the project as Raja Muhammad noman, Muhammad aqib, Haider abbas, and Farhad abbas. It then covers topics such as the hierarchy of data, maintaining data through adding, changing and deleting records, and validating data. It also compares file processing and database approaches. The roles of database analysts and administrators in managing the database are also summarized.
Enterprise Information Catalogue Another WayVictor Zhang
Here I present another perpective on how to organize,catalogue,share and access information or knowledge within enterprise.
It has some ideas on typical scenarios on how we utilize the information to fulfill daily job and also briefs the features of a software which I used to implement the ideas.
It's just a platform which for in-house use and I think it really make some difference to the way how I and my team to tidy-up and share the information.
Welcome any ideas, comments and discussions. You can reach me at victor.reload@gmail.com
This document provides an introduction and overview for a course on Relational Database Management Systems. It outlines the instructor details, evaluation criteria including assignments and tests, marks distribution across internal and external assessments. Required textbooks are listed for both theory and practical components. Previous year question papers are linked. The course syllabus is broken down into four main sections covering database concepts, data models, relational model and relational query language SQL. Key points are highlighted regarding attendance, assignment deadlines, and accessing course materials on the college server.
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Usman Tariq
In this PPT, you will learn:
• About data modeling and why data models are important
• About the basic data-modeling building blocks
• What business rules are and how they influence database design
• How the major data models evolved
• About emerging alternative data models and the needs they fulfill
• How data models can be classified by their level of abstraction
Author: Carlos Coronel | Steven Morris
The document discusses making content easy to find through effective metadata strategies and content modeling. It notes that as digital content expands rapidly, better information organization is needed to improve access. Metadata provides a way to organize large amounts of content and is critical for effective search and records management. The document provides examples of metadata standards and tags that can be used to classify and describe different types of content.
The document discusses sharing and settings in Salesforce, including organization-wide defaults (OWD), sharing rules, and territory management. OWD determine the baseline access and permissions users have to records they do not own. There are different OWD levels of access. Sharing rules extend sharing access to users in groups, roles, or territories, providing exceptions to the OWD. There are owner-based and criteria-based sharing rules. Territory management allows grouping customer accounts based on defined criteria using territory types, models, and hierarchies.
Salesforce sharing and visibility Part 1Ahmed Keshk
This document provides an overview of Salesforce sharing and visibility settings including profiles, permission sets, field level security, record level security, organization wide defaults, and role hierarchies. It discusses how profiles control user access and permissions. Permission sets extend user access without changing profiles. Field level security controls field visibility. Record level security and organization wide defaults specify default sharing while role hierarchies ensure managers have access to subordinate records.
2020 07-22 fireside chat : Record Ownership Deep DiveJihun Jung
Jihun Jung will give a presentation on record ownership in Salesforce. The presentation will include a deep dive on sharing rows and hierarchy-based inheritance, ownership-based sharing rules, and how record ownership relates to data security and performance. Attendees will have a chance to provide feedback and take a screenshot at the end.
The document discusses Salesforce's record sharing model. It covers key concepts like record ownership, organization-wide defaults, roles and role hierarchy, and different methods of sharing records including sharing rules, manual sharing, and Apex sharing. The document uses an example scenario at a company called Universal Containers to demonstrate how these concepts work together to determine access to records in Salesforce.
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...BMC Software
Today we will be looking at migrating data into Remedyforce- a SaaS help desk solution in the cloud. Remedyforce is built on Salesforce App Cloud for IT Service Management. We will consider The movement of data from an existing IT service management or help desk system (legacy or prior) to a new high-speed IT service management that is built on the Salesforce App Cloud. You can deliver better more thorough digital services if you migrate the right data over.
This PPT contains around 100 Salesforce Interview question. 50 questions are from configuration part and other 50 are from coding Part. This will help the Salesforce aspirant to refresh the Salesforce knowledge on a go.
This document provides an overview of administering Active Directory. It discusses security principals like user accounts, groups, and computer accounts that serve as the basis for Active Directory security. It also covers organizational units that provide logical grouping of resources and allow delegating administrative control. Group policies and properties of Active Directory objects like groups are also summarized, including details on group types, scopes, and inheritance settings.
This document provides an overview of Microsoft Active Directory, including definitions of key terms like domain, domain controller, organizational units, and group policy objects. It also discusses why PPM standalone may not work in an Active Directory environment due to Microsoft defaults preventing unknown programs from running and potential group policy restrictions. The document emphasizes getting accurate details about any issues and working with domain administrators, and reassures that the Level 2 support team can help if needed.
Microsoft Office SharePoint Server 2007 (MOSS 2007) includes core components that provide collaboration, portal, search, content management, forms, and business intelligence capabilities. It utilizes a logical architecture with pillars for these functions and a physical architecture that includes front-end web servers and a back-end database server. Administration of MOSS 2007 is configured through central administration and site settings.
Microsoft Office SharePoint Server 2007 (MOSS 2007) includes core components that provide collaboration, portal, search, content management, forms, and business intelligence capabilities. It utilizes a logical architecture with pillars for these functions and a physical architecture that includes front-end web servers and a back-end database server. Administration of MOSS 2007 is configured through central administration and site settings.
Running head DATABASE PROJECT 1DATABASE PROJECT 1Database S.docxtodd271
Running head: DATABASE PROJECT 1
DATABASE PROJECT 1
Database Systems Project
Connie G Farris
Colorado Technical University
Advanced Database Systems
(CS352-1804A-01)
Jeffrey Karlberg
Database Systems Project
Table of Contents
Database Systems Project 1
Project Outline 3
A description of the 3-level ANSI architecture model 4
A description of data independence 5
The difference in responsibility between Data administrator and Database administrator 6
ERD Screenshot 7
A description about the relationship setup and multiplicity………………….8
References: 11
Project OutlineOur company desires to consolidate the database for the company and acquire a database warehouse. Over the time frame of this course we will research all the elements of the proper database for this company, each week we will examine different components until we compile the final production.
A description of the 3-level ANSI architecture model
Data storage is a complex affair. Data is stored in form of bits where there are different levels of architecture involved. The following are levels of architecture used in data storage. External level is the top level in the architecture of the database management system. It is the level in which end users access data. The data in this level is simple as the end user does not need to understand data complexity. Data in the external level is viewed separately by users depending on their access rights. Conceptual level is the middle level is the database architecture. It the level that determines what data can be stored in the database. Conceptual level also defines the relationship among the stored data. This level of the database is managed by the database administrator (Kroenke, Auer, Vandenberg & Yoder, 2018). . Internal level defines how data is stored on the secondary storage devices. This data is organized in form of folders and files. The internal level is tasked with providing the storage spaces needed to store data
A description of data independence
Data independence is the ability of making changes in one level of the database without making changes in the other levels. Databases with levels or layers make data independence possible. In databases that are not layered, any changes made affect the entire database and thus data independence cannot be achieved. Data independence could also be defined as the separation of data and the applications that process it. There are two types of data dependence; logical and physical data independence. Logical data independence is the process of modifying data patterns without affecting the programs that they run on. It refers to changes made in conceptual level of the database (Mullins, 2012). These changes do not affect the view of data at the external level. Logical data independence is relatively difficult to achieve. Physical data independence is the process of making changes in the internal level of the database without these changes affecting the other levels in the .
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records vraopolisetti
Dynamic sharing rules allow flexible and automatic sharing of records between users based on criteria. They can be used to share records like opportunities, projects, and cases between roles like salespeople and project managers. The sharing is implemented through Apex triggers that evaluate criteria like which user is associated with a record and automatically update the sharing tables. However, criteria-based sharing rules cannot currently be created dynamically, and there are some limitations around sharing with owners. Customer portal roles also need to be considered for dynamic sharing of records to portal users.
This document discusses sharing and security controls in Salesforce, including profiles, permission sets, and record-level security. Profiles control object, field, and user permissions, while permission sets can grant additional access. Record-level security can be set at the organization, manual sharing, role hierarchy, and sharing rule levels to determine which users can access individual records.
SharePoint Site IA Architecture Design Considerations - Innovate Vancouver.pdfInnovate Vancouver
This document discusses different options for structuring an intranet site. It begins by explaining the goals of intranet design including easy navigation, searchability, and content management. It then presents 4 options for structuring the site:
1) By strategic pillars with departments organized underneath each pillar.
2) By organizational structure with departments as top-level sections.
3) A hybrid model with pillars as top headers and departments structured underneath.
4) Allowing different views like pillars or the organizational chart as headers.
It evaluates each option based on navigation, content management, adherence to policies, and supporting engagement. The best structure would logically organize content, be intuitive to navigate, and easily manage content
This document provides an overview of Force.com database security. It discusses how security is implemented through profiles and permissions rather than coding. Key aspects covered include profiles and their permissions, field level security, record ownership, sharing models, and how to implement the security model.
SharePoint Design & Configuration Best Practices & Guidelines - Innovate Vanc...Innovate Vancouver
Contact Innovate Vancouver to help on your next project!
Knowledge Management in Sharepoint - Article:
https://innovatevancouver.org/2022/10/10/knowledge-management-in-sharepoint/
Travis Barker, MPA GCPM
Consulting@innovatevancouver.org
https://innovatevancouver.org
2022-12-02 Trailblazer Winter Coming to the Town.pptxJihun Jung
This document provides an agenda for a Trailblazer Community Group meeting. It introduces the group and its leaders. It then summarizes some of the key features from the Winter '23 Salesforce release, including enhancements to dynamic forms, dynamic related list filters, permission sets, reports and dashboards, flows and automation, Lightning Web Components, and Service Cloud Voice. It concludes with inviting attendees to provide feedback and socialize.
2022-11-08 All About career path in Salesforce Eco System_KR.pdfJihun Jung
This document provides an agenda for a Trailblazer Community Group meeting. The agenda includes an introduction, a discussion of various career paths within the Salesforce ecosystem, and a wrap up. Some of the career paths that will be discussed are architect in Korea moving overseas, business user to Salesforce, frontend developer to Salesforce developer, SAP consultant to Salesforce consultant, and IT developer to Salesforce architect. The meeting will conclude with a session feedback and participants will have an opportunity to take a photo.
2021 10-06 about user experience (ux) designerJihun Jung
Jihun Jung will welcome attendees and introduce himself. He will provide an overview of the role of a User Experience Designer and share his experience taking the Salesforce Certified User Experience Designer exam. Jung will conclude the session by soliciting feedback and taking a group photo.
Jihun Jung's agenda includes welcoming attendees to the meeting, catching up with the community about Dreamforce 21, reviewing Trailblazer resources, getting feedback on the session, and encouraging attendees to share what they learned. The past meetings have covered topics like the impact of COVID-19, Salesforce certifications, Lightning Flow, sharing architecture, and record ownership. Dreamforce 21 resources and next steps will also be discussed.
Jihun Jung gave a presentation about his career experiences working at different companies including a consulting firm and local partner before joining Salesforce. The agenda included an introduction, discussing his job change and experiences at prior roles, and wrapping up by taking feedback and ending with a photo. In past meetings, he covered various Salesforce topics from certifications to architecture.
Bangkok Admin Group TrailheaDX 2020 Global Gathering v2Jihun Jung
The document provides an overview of a global gathering event with the following key details:
- It highlights Sunny Son as a technical architect from Salesforce.
- It includes a forward-looking statement regarding financial projections and risks that may affect results.
- It notes that additional information on risk factors is included in SEC filings on the company's website.
The document discusses implicit sharing in Salesforce, which provides access to related records without explicit configuration. It defines several types of implicit sharing: parent-child sharing between accounts and related objects, high volume user sharing, portal user sharing of accounts and contacts, and portal user access to cases they are associated with. The document includes definitions, explanations, and demonstrations of each implicit sharing type. It concludes with reminding attendees to provide feedback and capturing the session.
Jihun Jung will give a presentation on dynamic pages in Salesforce. They will welcome attendees and introduce themselves. Then they will provide an overview of dynamic pages, demonstrate how to configure them, and discuss applicable usage scenarios. They will also cover limitations and considerations. Finally, they will open the floor for feedback and questions.
The document outlines the agenda for the Virtual Dreamin' 2020 event. It will include introductions, an overview of what Dreamin' events are and past sessions. There will be three session tracks on administration, development and architecture over 24 hours so participants can attend sessions in their time zone. The session summaries will cover topics like developer best practices, Salesforce credentials, and data protection. The wrap up will include feedback and participants will be able to connect further on social media. The next Salesforce event mentioned is TrailheaDX.
The document outlines an agenda for a meeting on using Lightning Flow. The agenda includes an introduction, a lightning tour of different types of flows including screen, autolaunched and scheduled job flows. The discussion on why flows were used includes that they can access more objects than process builder, handle complex logic better, create and link records in one transaction, and delete records. The wrap up discusses next week's topic of flows and asks for feedback.
Hello trailblazers.
Let's create a Salesforce Certification Guide together this week.
Certification story contest!
Please share your success story, study method, motivation, and recommendation.
Free exam vouchers are given to the winners.
The document contains Jihun Jung's certification list and exam history on the Salesforce platform. It shows that Jung has obtained 21 certifications across 9 categories, including Administrator, Developer, Consultant, and Architect certifications. The certification list also indicates which exams Jung has taken and their results, with most passes but some failures for exams like Salesforce Certified Service Cloud Consultant and Salesforce Certified Einstein Analytics and Discovery Consultant. It then outlines Jung's tips for how to prepare and pass Salesforce certification exams.
This document outlines the agenda for a Salesforce networking and party event for an Administrators Group in Seoul, South Korea. The agenda includes introductions, a presentation on Apex Triggers, networking time, a Salesforce quiz for prizes, and food and drinks. It also discusses recruiting new leaders for the group and plans for a future event in February.
20191211 Admin group Seoul Dreamforce Global GatheringJihun Jung
The document outlines the agenda for a meeting of the Seoul, South Korea Administrators Group. It includes introductions of current and new group leaders, a discussion of requirements for becoming a new leader, and summaries of past events. Upcoming plans include a Trailblazer Party in January and a discussion from two group members about their experiences at Dreamforce 2019. The agenda concludes with networking over food and drinks.
[Salesforce Community Group] Seoul, KR Admin Group September MeetingJihun Jung
[Salesforce Community Group] Seoul, KR Admin Group September Meeting
Intro Welcome | Administrators Group Intro & Developer Group Intro
Meet the Trailblazers : Yohan Kang Trailblazer Stories: My Salesforce History
Meet the Trailblazers : Hanjoo Yang Trailblazer Stories: My first Story with Salesforce
Meet the Trailblazers : Wonsuk Jung Trailblazer Stories: My first Salesforce Project
Meet the Trailblazers : Jaewon Lee Trailblazer Stories: A Day in the Life of a Salesforce Admin in SMB
Meet the Trailblazers : Jihun Jung Trailblazer Stories: Why Salesforce Is Good For My(Your) Career
Wrap-Up Swag draw, Stay in Touch, Networking location, Take Photo
Networking Eat, Drink, Talk
[Salesforce] Seoul Admin group kick-off MeetingJihun Jung
This document summarizes the agenda and notes from a kick-off meeting of the Seoul, South Korea Administrators Group. The agenda included introductions, a guest speaker on the Salesforce MVP program and Einstein Analytics, and a discussion on future meeting topics and using Quip to share Salesforce knowledge. Members provided input on topics of interest like data modeling, permission levels, and experiences with projects, conversions, and troubleshooting. The group aims to grow membership and provide value by sharing insights and best practices.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
8. The Salesforce sharing model is an essential element in your organization's ability to
provide secure application data access. Therefore, it's crucial to architect your sharing model
correctly to meet your current and future data access requirements.
Not Covered
The topics not covered in Data Accessibility Architecture:
• Folder access
• Content access
• Chatter access
• Knowledge Base access
• Ideas, Questions/Answers access
• Salesforce2Salesforce
• Mobile data accessibility
Introduction
9. License
• Full Sharing Model Usage Users/Licenses
• High Volume Customer Portal License
• Chatter Free License
Types of Data Access
Components
• Profiles and Permission Sets
• Record Ownership and Queues
• Organization-Wide Defaults
• Role Hierarchy
• Public Groups
• Ownership-based Sharing Rules
• Criteria-based Sharing Rules
• Manual Sharing
• Teams
• Territory Hierarchy
• Account Territory Sharing Rules
• Programmatic Sharing
• Implicit Sharing
10. Full Sharing Model Usage Users/Licenses
Most Standard Salesforce license types take full advantage of the sharing model components. The license
might not make a module accessible, or even some objects accessible. For example, the Free edition can't
access any CRM objects. However, the sharing entities, and functionality, still exists and is ready when and if the
module ever does become active.
High Volume Customer Portal License
High Volume Customer Portal (HVPU) license users (including Community and Service Cloud license users) do
not utilize the sharing model. HVPU licenses have their own sharing model that works by foreign key match
between the portal user (holding the license) and the data on Account and Contact lookups. HVPU license is
only used for the Customer Portal and not the Partner Portal.
Chatter Free License
The Chatter Free license doesn't follow the standard sharing model. Chatter Free is a collaboration-only
license with the following features: Chatter, Profile, People, Groups, Files, Chatter Desktop, and limited
Salesforce app access. The license doesn't have access to CRM records (standard or custom objects) and
Content functionality, and therefore, there is no sharing.
License
11. Profiles and Permission Sets
Profiles and permission sets provide object-level security by determining what types of data users see and
whether they can edit, create, or delete records. For each object, the “View All” and “Modify All” permissions
ignore sharing rules and settings, allowing administrators to quickly grant access to records associated with a
given object across the organization. These permissions are often preferable alternatives to the “View All Data”
and “Modify All Data” administrative permissions.
Profiles and permission sets also control field-level security, which determines the fields within every object
that users can access. For example, an object may have 20 fields, but field-level security can be set up to
prevent the users from seeing five of the 20 fields.
Components
12. Record Ownership and Queues
Every record must be owned by a single user or a queue. The owner has access to the record, based on the
Object Settings for the owner’s profile. For example, if the owner’s profile has Create and Read permission on an
object, but not Edit or Delete permission, the owner can create a record for the object and see the new record.
However, the owner won't be able to edit or delete the record. Users higher in a hierarchy (role or territory) inherit
the same data access as their subordinates for standard objects. Managers gain as much access as their
subordinates. If the subordinate has read-only access, so will the manager. This access applies to records owned
by users, as well as records shared with them.
Queues help you prioritize, distribute, and assign records to teams who share workloads. Queue members and
users higher in a role hierarchy can access queues from list views and take ownership of records in a queue.
If a single user owns more than 10,000 records, as a best practice: Ownership skew
The user record of the owner should not hold a role in the role hierarchy.
If the owner's user record must hold a role, the role should be at the top of the hierarchy in its own branch of
the role hierarchy.
Components
13. Organization-Wide Defaults
Organization-wide sharing settings specify the default level of access users have to each others’ records. You use
organization-wide sharing settings to lock down your data to the most restrictive level, and then use the other
record-level security and sharing tools to selectively give access to other users. For example, let’s say users have
object-level permissions to read and edit opportunities, and the organization-wide sharing setting is Read-
Only. By default, those users can read all opportunity records, but can’t edit any unless they own the record
or are granted additional permissions.. Organization-wide defaults are the only way to restrict user access to a
record.
Organization-wide default settings can be changed from one setting to another (private to controlled by parent,
then back to private); however, these changes require sharing recalculation and depending on volume could
result in very long processing times.
For custom objects only, use the Grant Access Using Hierarchies setting, which if unchecked (default is checked),
prevents managers from inheriting access. This setting is found in the organization-wide default settings.
Components
14. Role Hierarchy (1/2)
A role hierarchy represents a level of data access that a user or group of users needs. The role
hierarchy ensures that managers always have access to the same data as their employees,
regardless of the organization-wide default settings. Role hierarchies don't have to match your
organization chart exactly. Instead, each role in the hierarchy should represent a level of data
access that a user or group of users needs.
An organization is allowed 500 roles; however, this number can be increased by Salesforce. As a
best practice, keep the number of non-portal roles to 25,000 and the number of portal roles to
100,000.
As a best practice, keep the role hierarchy to no more than 10 levels of branches in the hierarchy.
When a user's role changes, any relevant sharing rules are evaluated to correct access as
necessary. Peers within the same role don't guarantee them access to each other's data.
Components
15. Role Hierarchy (2/2)
Modeling the role hierarchy begins with understanding how the organization is structured. This is
usually built from understanding a manager’s scope, starting from the top. The CEO oversees
the entire company. The CEO usually has direct reports that can then be segmented by Business
Unit (Sales or Support) or geographical region (EMEA, APAC). That person then has direct reports
that could be further segmented, and so on. Although this sounds very much like an HR
organizational chart, and we have said they might be very much alike, keep in mind, when
modeling data access, focus on data accessibility with a consideration to HR reporting.
Overlays are always the tricky part of the hierarchy. If they're in their own branch, they'll require
either sharing rules, teams, or territory management to gain needed access. If they are folded
into the hierarchy, there might be reporting implications.
It's important to spend the time setting up the role hierarchy because it's the foundation for
the entire sharing model.
Components
16. Components
Role Hierarchy Use Cases
Management access – the ability for managers to be able to see and do whatever their
subordinates can see and do.
Management reporting – the ability for reporting to roll up in a hierarchical fashion so that anyone
higher in the hierarchy sees more data than those below them.
Segregation between organizational branches – different business units don’t need to see each
other’s data; having a hierarchy in which you can define separate branches allows you to segregate
visibility within business units, while still rolling visibility up to the executive levels above those units.
Segregation within a role – in many organizations/applications, people who all play the same role
should not necessarily see each other’s data. Having hierarchical roles allows you to define a “leaf”
node in which all data is essentially private, and still roll that data up to a parent role that can see all.
17. Public Groups
A public group (not Chatter group) is a collection of individual users, roles, territories, and so on, that all have a
function in common. Public groups can consist of:
• Users, Customer Portal Users, Partner Users
• Roles, Internal Subordinates, Internal and Portal Subordinates, Portal Roles, Portal Roles and Subordinates
• Territories, Territories and Subordinates
• Other public groups (nesting)
Groups can be nested (Group A nested into Group B), however don't nest more than five levels. Nesting has an impact
on group maintenance and performance due to group membership calculation. As a best practice, keep the total
number of public groups for an organization to 100,000.
Components
18. Components
Public Groups Use Cases
When you need to provide access to an arbitrary group of people, you create a public group to collect them, and
then use other sharing tools to give the group the necessary access. Group membership alone doesn't provide
data access.
Groups can also be nested inside each other, therefore, allowing a nested group to gain the same access as the
group in which it is contained. This allows the creation of smaller, ad-hoc hierarchies that don’t necessarily interact
with the role or territory hierarchies. If Group A is a member of Group B, then the members of Group A will have
access to data shared to Group B at the same access level as the members of Group B.
Groups also have the ability to protect data shared in the group from being made accessible to people in the role
hierarchy above the group members. This (and dealing with the access of record owners and their management
hierarchy) allows the creation of groups in which very highly confidential information can be shared—the data will
be accessible ONLY to group members, and nobody else in the organization. This is accomplished by using the Grant
Access Using Hierarchies setting.
19. Ownership-based Sharing Rules
Ownership-based sharing rules allow for exceptions to organization-wide default settings and the role hierarchy that
give additional users access to records they don’t own. Ownership-based sharing rules are based on the record owner
only. Contact ownership-based sharing rules don't apply to private contacts(not related Account).
As a best practice, keep the number of ownership-based sharing rules per object to 1,000.
Components
Ownership-based Sharing Rule Use Cases
Role-based matrix management or overlay situations: a person in Service needs to be able to see some Sales data, but
they live in different branches of the hierarchy, so you can create a rule that shares data between roles on different
branches.
To provide data access to peers who hold the same role/territory.
To provide data access to other groupings of users (public groups, portal. roles, territories). The members of the
groupings who own the records can be shared with the members of other groupings.
20. Criteria-based Sharing Rules
Criteria-based sharing rules provide access to records based on the record’s field values (criteria). If
the criteria are met (one or many field values), then a share record is created for the rule. Record
ownership is not a consideration.
As a best practice, keep the number of criteria-sharing rules per object to 50; however, this can be
increased by Salesforce.
Components
21. Manual Sharing
Sometimes it’s impossible to define a consistent group of users who need access to a particular set of records. In those
situations, record owners can use manual sharing to give read and edit permissions to users who would not have access
to the record any other way. Although manual sharing isn’t automated like organization-wide sharing settings, role
hierarchies, or sharing rules, it gives record owners the flexibility to share particular records with users that need to see
them.
Manual sharing is removed when the record owner changes or when the sharing access granted doesn't grant
additional access beyond the object's organization-wide sharing default access level. This also applies to manual shares
created programmatically.
Only manual share records can be created on standard objects. Manual share records are defined as share records with the
row cause set to manual share.
All share records (standard and custom objects) with a row cause set to manual share can be edited and deleted by
the Share button on the object's page layout, even if the share record was created programmatically.
Components
22. Teams
A team is a group of users that work together on an account, sales opportunity, or case. Record owners can build a
team for each record that they own. The record owner adds team members and specifies the access level each team
member has to the record. Some team members can have read-only access, while others have read/write.
Only owners, people higher in the hierarchy, and administrators can add team members and provide more access to
the member. A team member with read/write access can add another member who already has access to the record
with which the team is associated. The team member can't provide them additional access.
Creating a team member in the app creates two records: a team record and an associated share record. If you create
team members programmatically, you have to manage both the team record and associated share record. There is
only one team per record (Account, Opportunity or Case). If multiple teams are needed, depending on your specific
needs consider territory management or programmatic sharing
The team object is not a first-class object. You can't create custom fields, validations rules, or triggers for teams
Components
23. Territory Hierarchy
The territory hierarchy is a single dimensional, additional hierarchy which can be structured by
business units or any kind of segmentation in a hierarchical structure. When territory management is
enabled you must manage both the role hierarchy and territory hierarchy.
Territories exist only on Account, Opportunity and master/detail children of Accounts and
Opportunities. As a best practice, keep the territory hierarchy to no more than 10 levels of branches in
the hierarchy. If the assignment rules for a territory are changed, sharing rules using that territory as
the source will be recalculated. Likewise, if the membership of a territory changes, any ownership-
based sharing rules that use the territory as the source will be recalculated.
Components
24. Territory Management Use Cases
Multiple groups of people (multiple teams) require either read-only or read/write access to accounts.
An additional hierarchical structure (different from the role hierarchy) is needed.
A single user needs to hold multiple levels in the hierarchy.
Global users (GAM – global account manager) need to see everything from the global account
downward.
Components
25. Account Territory Sharing Rules
Account territory sharing rules become available only when the original territory management
feature has been enabled for an organization. These sharing rules provide access to Account records
that have been stamped with the Territory defined in the rule.
Account Territory Sharing Rule Use Case
To provide data access to accounts within a territory (not based on ownership) to a grouping of users.
Applies only to accounts and when territory management is enabled.
Components
26. Programmatic Sharing
Programmatic sharing (formally Apex-managed sharing) allows you to use code (Apex or other) to build
sophisticated and dynamic sharing settings when a data access requirement cannot be met by any
other means.
If you create a share record programmatically, and the out-of-box row cause (manual share) is used,
then you can maintain this share record with the Share button in the app. The share record is subject
to all rules with the manual share row cause such as deletion upon owner transfer.
Review https://developer.salesforce.com/page/Using_Apex_Managed_Sharing_to_Create_Custom_Recor
d_Sharing_Logic before you consider using programmatic sharing.
Components
27. Programmatic Sharing Use Cases
No other method of sharing (declarative) meets the data access needs.
There is an existing, external system of truth for user access assignments which will continue to drive
access and be integrated with Salesforce.
Poor performance by using native sharing components. (Usually applies to very large data volumes)
Team functionality on custom objects.
Components
28. Implicit Sharing
Implicit sharing is automatic. You can neither turn it off, nor turn it on—it is native to the application. In other words,
this isn't a configurable setting; however, it's very important for any architect to understand.
Parent, Child, Portal , High Volume, High Volume Parent
For more information, see the recording of the previous meeting.
https://www.youtube.com/watch?v=GDdwB6Icu4Q
Components
29. Role Hierarchy
• Make simple, it should be possible to flatten
• Use territory hierarchy as your “sales” hierarchy if there need other hierarchy
• Don’t making the role hierarchy and territory hierarchy identical
Teams
• Territory hierarchy is better to do it there than to use teams
• Only implement teams if no other existing sharing component will satisfy the requirement
Realignment and Reassignment
• Considered are the volume of changes and the number of cascading changes that each change will cause
• Hierarchy structural changing can be resource expensive
Considerations
30. Large Data Volumes
• The modeling for the initial rollout or a realignment change are testing out your changes in a sandbox is highly
recommended before production.
• Have implemented teams or Territory Management, you especially need to pay attention to performance
Defer Sharing Calculations
• Enabled by Salesforce Support to defer automatic sharing calculations.
Data Skews/Ownership Skews
• As a best practice, keep the ratio as close to 1:10,000 as possible (lower is preferred)
• The user record of the owner should not hold a role in the role hierarchy. Or be at the top of the hierarchy
• We will be holding a session in the near future
The Account Hierarchies Impact on Data Access
• the account hierarchy does not drive access between two Account records with a parent/child relationship
Considerations
31. A Guide To Sharing Architecture
• https://resources.docs.salesforce.com/226/latest/en-
us/sfdc/pdf/sharing_architecture.pdf
User Licenses
• https://help.salesforce.com/articleView?id=users_understanding_license_types.htm
Sharing a Record Using Apex
• https://developer.salesforce.com/docs/atlas.en-
us.apexcode.meta/apexcode/apex_bulk_sharing_creating_with_apex.htm
Source
33. TrailheaDX 2020 Global Gathering
We’re excited to bring our Trailblazers together to talk about the
TrailheaDX 2020 highlights.
Event details to be announced soon - please RSVP to receive updates!
34. Thanks for Like, Share, Follow, Connect ☺
Please comment anywhere in the Korea user group Chatter, Facebook, or LinkedIn.
35. Trailblazer Community Conference
Certification Voucher Winner
Presented to:
[Your Name]
Date:
[April, 25, 2020]
Certification Redemption Code:
[B1mi|iBn1d@]
Expires on:
[August, 30, 2021]
Free vouchers will be provided by lottery at
events with over 10 attendees.