This document provides an overview of connected apps in Salesforce. It defines connected apps and their usage, protocols like OAuth and SAML, and terminology. It also demonstrates how to create a connected app, integrate a service provider using SAML or OpenID Connect, and manage access to third-party apps. The document contains examples of connected app use cases and managing OAuth access policies. It concludes by encouraging the reader to continue exploring and learning.
When building an enterprise solution or creating an app, data often comes from multiple systems, and business processes frequently cross application boundaries.
Salesforce offers a rich library of programmatic and point-and-click integration tools to customize business processes that span multiple application systems. In this webinar, we will survey the many integration options and technologies available in Salesforce, including newer API and integration features.
This webinar is the first in a series that will explore several ways to integrate systems and services with Salesforce.
Lightning Web Components are a JavaScript programming model for building web applications and interfaces that is built on the best of web standards.
Any front-end web developer can get started with LWC and leverage custom elements, and JavaScript APIs to create modern apps and experiences that are fully aware of Salesforce data and processes.
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
LWC Episode 3- Component Communication and Aura InteroperabilitySalesforce Developers
Lightning Web Components gives JavaScript developers a web standards-based path to building apps on the Salesforce Lightning Platform.
In the third episode of our five part series on Lightning Web Components, we cover design considerations and compositions of Lightning Web Components.
Salesforce Streaming event - PushTopic and Generic EventsDhanik Sahni
Salesforce Streaming API is used when integration required with publisher and subscriber model. This slide will explain about
1. Streaming Event
2. PushTopic
3. Generic Event
4. Comparison of Streaming Events
The document provides an overview of Salesforce's platform and how it enables companies to become customer-centric. It highlights key capabilities including connecting customers in new ways, running a business from mobile, building personalized journeys, and gaining insights from customer data. Case studies show how companies have driven improvements in metrics like revenue, customer satisfaction, and productivity by connecting employees, partners, and customers on the Salesforce platform.
When building an enterprise solution or creating an app, data often comes from multiple systems, and business processes frequently cross application boundaries.
Salesforce offers a rich library of programmatic and point-and-click integration tools to customize business processes that span multiple application systems. In this webinar, we will survey the many integration options and technologies available in Salesforce, including newer API and integration features.
This webinar is the first in a series that will explore several ways to integrate systems and services with Salesforce.
Lightning Web Components are a JavaScript programming model for building web applications and interfaces that is built on the best of web standards.
Any front-end web developer can get started with LWC and leverage custom elements, and JavaScript APIs to create modern apps and experiences that are fully aware of Salesforce data and processes.
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
LWC Episode 3- Component Communication and Aura InteroperabilitySalesforce Developers
Lightning Web Components gives JavaScript developers a web standards-based path to building apps on the Salesforce Lightning Platform.
In the third episode of our five part series on Lightning Web Components, we cover design considerations and compositions of Lightning Web Components.
Salesforce Streaming event - PushTopic and Generic EventsDhanik Sahni
Salesforce Streaming API is used when integration required with publisher and subscriber model. This slide will explain about
1. Streaming Event
2. PushTopic
3. Generic Event
4. Comparison of Streaming Events
The document provides an overview of Salesforce's platform and how it enables companies to become customer-centric. It highlights key capabilities including connecting customers in new ways, running a business from mobile, building personalized journeys, and gaining insights from customer data. Case studies show how companies have driven improvements in metrics like revenue, customer satisfaction, and productivity by connecting employees, partners, and customers on the Salesforce platform.
This document provides an overview of Lightning Web Components Episode 2 which focuses on working with Salesforce data. It discusses how the Lightning Data Service and UI API are used to retrieve and display Salesforce record data. It also demonstrates how to use wire services to connect Lightning Web Components to Apex methods to retrieve and manipulate data. The document concludes with instructions for configuring Lightning Web Components to be used in the Lightning App Builder.
This document discusses techniques for hardening a Salesforce org against cybersecurity threats. It covers Salesforce security at the infrastructure and application levels. It also recommends best practices like using two-factor authentication, auditing permissions, and providing security training for users. The document promotes the Salesforce Toolkit and a free online cybersecurity course for further resources.
Replicate Salesforce Data in Real Time with Change Data CaptureSalesforce Developers
Migrate your batch processing, scheduled ETL, and nightly workloads to event-driven, real-time integrations using Change Data Capture. CDC means data change events are published to an event stream, allowing businesses to have up-to-date information across systems and applications. Join us to learn how to configure Change Data Capture and subscribe to the stream of change events, streamlining your architectures and processes.
Webinar: Take Control of Your Org with Salesforce OptimizerSalesforce Admins
The Salesforce Optimizer provides concise reports on over 25 metrics related to maintenance, productivity, and adoption in a Salesforce org. It analyzes sharing rules, workflow rules, user management, profiles and permission sets, fields, custom code, custom layouts, validation rules, and more. The reports identify prioritized insights and provide actionable recommendations and best practices to efficiently maintain customizations, reduce business and technical debt, increase admin and user productivity, and drive Salesforce usage. Additional resources are available in the Success Community and documentation to help admins utilize the reports for proactive maintenance, improving user experience, cleanup, and planning a transition to Lightning Experience.
The document provides an overview of Salesforce development. It discusses that Salesforce is a cloud-based CRM platform with over 82,000 customers. It offers features for marketing, sales, services, and more. Salesforce can be customized through tools like Sales Cloud, Service Cloud, and Custom Cloud. Development in Salesforce involves creating objects and relationships, automating processes with workflows and approvals, building reports and dashboards, adding programming logic with Apex, and creating custom interfaces with Visualforce.
Salesforce Service Cloud is a customer relationship management platform for customer service and support. It allows companies to manage customer requests across channels like email, phone, social media, and live chat. Key features include case management, entitlements, knowledge base, service console, and multi-channel support. However, there are limitations such as email and web-to-case limits, file transfer restrictions in live chat, and feature gaps in lower editions.
An introduction to OAuth 2.0 from a Salesforce perspective to establish the foundations of OAuth 2.0. Discusses the key concepts of Authentication and Authorization and distinguishes the two. Also discusses Open ID connect.
The Force.com Platform offers a powerful, scalable, and secure Web Service API to support integration use cases common to large enterprises. In this session, we will revise some of these patterns then focus on a specific pattern used to solve asynchronous integrations. We will delve in to the specific techniques related to this pattern and put them to use by forming real world end-to-end integration use case illustrating maintainability, scalability, extensibility, and security.
Salesforce integration best practices columbus meetupMuleSoft Meetup
onnectivity Overview
Connectivity to Salesforce Clouds
Connectors and Salesforce APIs
Connector interacting with Salesforce core
Composite Connector
Triggers
Establishing a connected app for MuleSoft Connectors
Salesforce Integration Best Practices
When to move data into SFDC
Appropriate use of APEX
Salesforce integration technologies and considerations
Data Virtualization/Live Read
Data Manipulation and Migration
Real-time changes, events and Streaming
Resources
Salesforce Accelerators for Service Cloud and Commerce Cloud
Did you inherit a cluttered org with no documentation? Are you trying to figure out why you have 500 fields on an object? Join this session and collaboratively learn from other customers about the most common traits of a messy implementation, and how you can untangle yours.
The document discusses sharing and settings in Salesforce, including organization-wide defaults (OWD), sharing rules, and territory management. OWD determine the baseline access and permissions users have to records they do not own. There are different OWD levels of access. Sharing rules extend sharing access to users in groups, roles, or territories, providing exceptions to the OWD. There are owner-based and criteria-based sharing rules. Territory management allows grouping customer accounts based on defined criteria using territory types, models, and hierarchies.
This document discusses using external objects in Salesforce to integrate and expose data from external sources like OData feeds or proprietary systems. It provides an overview of external objects and how they allow querying and interacting with external data similarly to standard and custom objects. Additionally, it demonstrates connecting to SAP order data via an OData feed, and discusses the OData specification and ecosystem. The document also covers the Apex connector framework for building custom connectors when exposing data via OData is not possible.
Salesforce Tutorial for Beginners: Basic Salesforce IntroductionHabilelabs
Salesforce is the worlds best Customer Relationship Management (CRM) platform which is flexible and powerful database supplier in the market.This blog is introducing about Salesforce and it’s CRM, Multitenant Architecture etc.
The document introduces the Salesforce platform and provides an overview of its capabilities. It discusses how the platform can be used to build employee apps, partner apps, and customer apps. It also summarizes several tools on the platform, including Visualforce, Apex, Lightning components, Heroku, and ExactTarget. The presentation aims to demonstrate how the Salesforce platform can support innovation through clicks and code functionality.
This document provides an overview of Lightning Web Components (LWC) including why LWC was introduced, the pillars of web components, LWC anatomy, lifecycle methods, calling Apex methods from LWC, using Lightning Data Services in LWC, handling events in LWC, coexistence of LWC and Aura components, and some miscellaneous topics like refreshing Apex data and sharing JS between LWC and Aura. The agenda covers these topics at a high level with examples provided for key concepts like creating a web component, calling Apex, handling events, and using Lightning Data Services to create a record in JavaScript.
Introduction to Lightning Web Component SmritiSharan1
Introduction to lightning web component
What is lightning web component?
Difference between aura component and LWC
Why do you go for LWC instead of existing aura components?
Coexistence and interoperability of aura and LWC
This document discusses Lightning Web Components security and testing. It begins with forward-looking statements and risks related to new functionality, products, and services. It then provides information on debugging code, including using browser tools and debugging in different modes. Finally, it discusses unit testing Lightning Web Components with Jest, including prerequisites, configuration, and an example test file.
Planning Your Migration to the Lightning ExperienceShell Black
Learn how to migrate to the Salesforce Lighting UI in four steps. Shell Black in this presentation discusses how to make the business case to justify the costs to moving to the Lightning Experience (LEX) from Classic. In the four steps Shell covers how to assess the current state of your org, plan out the migration, manage your build sprints and UAT (User Acceptance Testing), and train your end users. He also covers the factors that drive the time needed to complete the project. As you will find, the biggest hurdle to migrating to Lightning is not a missing feature, but Admin knowledge. Click the link on Slide 2 to watch a video of this presentation!
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...Edureka!
This Salesforce Training tutorial is all you need to learn about Salesforce. It is ideal for both beginners and professionals who want to understand the various Salesforce cloud services. Below are topics covered in this tutorial:
1. Why is Salesforce popular & in-demand?
2. Advantages: On-premise vs. Cloud
3. Where does Salesforce fit in the cloud model?
4. Various Salesforce Cloud Services
5. Salesforce architecture
6. Demo: Sales Cloud & Service Cloud
The document provides an introduction to Lightning Web Components (LWC) presented by Mohith Shrivastava. The presentation covers the core elements of web components including templates, custom elements, shadow DOM and ES modules. It compares LWC to standard web components and Aura components. The presentation demonstrates building a simple LWC and explores LWC properties and Lightning Data Services. It provides references for learning more about LWC.
Presentation on using Social Login based on OAuth 2.0 with Oracle APEX, this includes a demonstration on how to configure Facebook, Google and LinkedIn to be used for authentication with APEX.
This presentation was given as a webinar as part of the Oracle APEX Office Hours series:
https://asktom.oracle.com/pls/apex/f?p=100:551:::NO:551:P551_CLASS_ID:744:
This whitepaper, highlights the pros and cons of using two different aspects of SharePoint Add-ins which would enable enterprises to contextualize the use of SharePoint Add-ins...
This document provides an overview of Lightning Web Components Episode 2 which focuses on working with Salesforce data. It discusses how the Lightning Data Service and UI API are used to retrieve and display Salesforce record data. It also demonstrates how to use wire services to connect Lightning Web Components to Apex methods to retrieve and manipulate data. The document concludes with instructions for configuring Lightning Web Components to be used in the Lightning App Builder.
This document discusses techniques for hardening a Salesforce org against cybersecurity threats. It covers Salesforce security at the infrastructure and application levels. It also recommends best practices like using two-factor authentication, auditing permissions, and providing security training for users. The document promotes the Salesforce Toolkit and a free online cybersecurity course for further resources.
Replicate Salesforce Data in Real Time with Change Data CaptureSalesforce Developers
Migrate your batch processing, scheduled ETL, and nightly workloads to event-driven, real-time integrations using Change Data Capture. CDC means data change events are published to an event stream, allowing businesses to have up-to-date information across systems and applications. Join us to learn how to configure Change Data Capture and subscribe to the stream of change events, streamlining your architectures and processes.
Webinar: Take Control of Your Org with Salesforce OptimizerSalesforce Admins
The Salesforce Optimizer provides concise reports on over 25 metrics related to maintenance, productivity, and adoption in a Salesforce org. It analyzes sharing rules, workflow rules, user management, profiles and permission sets, fields, custom code, custom layouts, validation rules, and more. The reports identify prioritized insights and provide actionable recommendations and best practices to efficiently maintain customizations, reduce business and technical debt, increase admin and user productivity, and drive Salesforce usage. Additional resources are available in the Success Community and documentation to help admins utilize the reports for proactive maintenance, improving user experience, cleanup, and planning a transition to Lightning Experience.
The document provides an overview of Salesforce development. It discusses that Salesforce is a cloud-based CRM platform with over 82,000 customers. It offers features for marketing, sales, services, and more. Salesforce can be customized through tools like Sales Cloud, Service Cloud, and Custom Cloud. Development in Salesforce involves creating objects and relationships, automating processes with workflows and approvals, building reports and dashboards, adding programming logic with Apex, and creating custom interfaces with Visualforce.
Salesforce Service Cloud is a customer relationship management platform for customer service and support. It allows companies to manage customer requests across channels like email, phone, social media, and live chat. Key features include case management, entitlements, knowledge base, service console, and multi-channel support. However, there are limitations such as email and web-to-case limits, file transfer restrictions in live chat, and feature gaps in lower editions.
An introduction to OAuth 2.0 from a Salesforce perspective to establish the foundations of OAuth 2.0. Discusses the key concepts of Authentication and Authorization and distinguishes the two. Also discusses Open ID connect.
The Force.com Platform offers a powerful, scalable, and secure Web Service API to support integration use cases common to large enterprises. In this session, we will revise some of these patterns then focus on a specific pattern used to solve asynchronous integrations. We will delve in to the specific techniques related to this pattern and put them to use by forming real world end-to-end integration use case illustrating maintainability, scalability, extensibility, and security.
Salesforce integration best practices columbus meetupMuleSoft Meetup
onnectivity Overview
Connectivity to Salesforce Clouds
Connectors and Salesforce APIs
Connector interacting with Salesforce core
Composite Connector
Triggers
Establishing a connected app for MuleSoft Connectors
Salesforce Integration Best Practices
When to move data into SFDC
Appropriate use of APEX
Salesforce integration technologies and considerations
Data Virtualization/Live Read
Data Manipulation and Migration
Real-time changes, events and Streaming
Resources
Salesforce Accelerators for Service Cloud and Commerce Cloud
Did you inherit a cluttered org with no documentation? Are you trying to figure out why you have 500 fields on an object? Join this session and collaboratively learn from other customers about the most common traits of a messy implementation, and how you can untangle yours.
The document discusses sharing and settings in Salesforce, including organization-wide defaults (OWD), sharing rules, and territory management. OWD determine the baseline access and permissions users have to records they do not own. There are different OWD levels of access. Sharing rules extend sharing access to users in groups, roles, or territories, providing exceptions to the OWD. There are owner-based and criteria-based sharing rules. Territory management allows grouping customer accounts based on defined criteria using territory types, models, and hierarchies.
This document discusses using external objects in Salesforce to integrate and expose data from external sources like OData feeds or proprietary systems. It provides an overview of external objects and how they allow querying and interacting with external data similarly to standard and custom objects. Additionally, it demonstrates connecting to SAP order data via an OData feed, and discusses the OData specification and ecosystem. The document also covers the Apex connector framework for building custom connectors when exposing data via OData is not possible.
Salesforce Tutorial for Beginners: Basic Salesforce IntroductionHabilelabs
Salesforce is the worlds best Customer Relationship Management (CRM) platform which is flexible and powerful database supplier in the market.This blog is introducing about Salesforce and it’s CRM, Multitenant Architecture etc.
The document introduces the Salesforce platform and provides an overview of its capabilities. It discusses how the platform can be used to build employee apps, partner apps, and customer apps. It also summarizes several tools on the platform, including Visualforce, Apex, Lightning components, Heroku, and ExactTarget. The presentation aims to demonstrate how the Salesforce platform can support innovation through clicks and code functionality.
This document provides an overview of Lightning Web Components (LWC) including why LWC was introduced, the pillars of web components, LWC anatomy, lifecycle methods, calling Apex methods from LWC, using Lightning Data Services in LWC, handling events in LWC, coexistence of LWC and Aura components, and some miscellaneous topics like refreshing Apex data and sharing JS between LWC and Aura. The agenda covers these topics at a high level with examples provided for key concepts like creating a web component, calling Apex, handling events, and using Lightning Data Services to create a record in JavaScript.
Introduction to Lightning Web Component SmritiSharan1
Introduction to lightning web component
What is lightning web component?
Difference between aura component and LWC
Why do you go for LWC instead of existing aura components?
Coexistence and interoperability of aura and LWC
This document discusses Lightning Web Components security and testing. It begins with forward-looking statements and risks related to new functionality, products, and services. It then provides information on debugging code, including using browser tools and debugging in different modes. Finally, it discusses unit testing Lightning Web Components with Jest, including prerequisites, configuration, and an example test file.
Planning Your Migration to the Lightning ExperienceShell Black
Learn how to migrate to the Salesforce Lighting UI in four steps. Shell Black in this presentation discusses how to make the business case to justify the costs to moving to the Lightning Experience (LEX) from Classic. In the four steps Shell covers how to assess the current state of your org, plan out the migration, manage your build sprints and UAT (User Acceptance Testing), and train your end users. He also covers the factors that drive the time needed to complete the project. As you will find, the biggest hurdle to migrating to Lightning is not a missing feature, but Admin knowledge. Click the link on Slide 2 to watch a video of this presentation!
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...Edureka!
This Salesforce Training tutorial is all you need to learn about Salesforce. It is ideal for both beginners and professionals who want to understand the various Salesforce cloud services. Below are topics covered in this tutorial:
1. Why is Salesforce popular & in-demand?
2. Advantages: On-premise vs. Cloud
3. Where does Salesforce fit in the cloud model?
4. Various Salesforce Cloud Services
5. Salesforce architecture
6. Demo: Sales Cloud & Service Cloud
The document provides an introduction to Lightning Web Components (LWC) presented by Mohith Shrivastava. The presentation covers the core elements of web components including templates, custom elements, shadow DOM and ES modules. It compares LWC to standard web components and Aura components. The presentation demonstrates building a simple LWC and explores LWC properties and Lightning Data Services. It provides references for learning more about LWC.
Presentation on using Social Login based on OAuth 2.0 with Oracle APEX, this includes a demonstration on how to configure Facebook, Google and LinkedIn to be used for authentication with APEX.
This presentation was given as a webinar as part of the Oracle APEX Office Hours series:
https://asktom.oracle.com/pls/apex/f?p=100:551:::NO:551:P551_CLASS_ID:744:
This whitepaper, highlights the pros and cons of using two different aspects of SharePoint Add-ins which would enable enterprises to contextualize the use of SharePoint Add-ins...
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)gemziebeth
Join us as we look into OAuth 2.0 to help us study for the Identity and Access Management Designer certification exam. Episode 1 covers the principles of OAuth 2.0
Secure Development on the Salesforce Platform - Part 3Mark Adcock
This webinar covers key topics and best practices on how to securely connect your applications with Salesforce. We will demonstrate Salesforce recommended solutions to securely handle secrets within your application and help you prevent data leaks
You will also learn how to set up a Salesforce Connected App to handle authentication and access control when integrating with Salesforce.
EduID Mobile App - Use-Cases, Concepts and ImplementationChristian Glahn
This presentation describes the token-agent implementation for openID Connect for authenticating native mobile apps provided by third parties. It presents a standards-based working solution for integrating loosely coupled native apps into a trust federation using. This allows for deeper integrated authentication services on Android and iOS without violating app-store policies.
This presentation has been part of the EduID Mobile App workshop at SWITCH on 25 Apr. 2017.
Thanks to Christoph Graf (SWITCH), Riccardo Mazza (USI), Michael Hausherr (FHNW), Goran Josic (USI), and Yann Cuttaz (USI).
Shailen Sukul is a senior SharePoint architect who works with latest web technologies and SharePoint. He specializes in SharePoint installation, configuration, development and training. In his personal projects he prefers AWS and ASP.Net MVC. He maintains several open source SharePoint projects on CodePlex. You can follow him on Twitter or check out his blog for more information.
This document provides an overview of APIs, API management, integration, and API security. It discusses why organizations adopt APIs to accelerate mobile app development, foster reuse, and allow external developers to innovate. The document outlines components of API management like the API gateway and developer portal. It also discusses how SOA, ESB, and APIs can converge in the API facade pattern to provide simple interfaces to complex systems. The presentation demonstrates this pattern using WSO2 API Manager and ESB and discusses API security techniques like OAuth for identity delegation.
SharePoint 2013 Apps and the App ModelJames Tramel
SharePoint 2013 Apps - deep dive. We'll look at they work, what they look like, what they do and how to us apps. Its all about the apps. Apps are good, very good.
One of the major changes in SharePoint 2013 is the introduction of apps. Apps for both SharePoint and Office provide a new model for developing, packaging and deploying custom solution for SharePoint.
This brief presentation will introduce the main aspects of the apps model introduced form Microsoft to addres custom features to SharePoint both on-premises and online.
This document provides information about a MuleSoft meetup event on connected apps. The meetup will include a presentation on connected apps using the Anypoint Platform, types of connected apps, authentication methods, benefits, and a demo of deploying a Mule application and publishing a project to the exchange. Attendees are instructed on how to participate in a trivia quiz to win a prize. The speaker is introduced and housekeeping items are covered including submitting questions and post-event feedback.
Salesforce Identity Management. Basics of authentication and authorization. SAML, OAuth 2.0, DIfferent flows in Oauth 2.o, Demo in Saklesforce for Identity and Service Provider. Fremont Trailblazer Group March 2020 Presentation.
The document discusses various patterns for securing APIs in different enterprise scenarios. It outlines 12 different problem statements involving securing APIs that can only be accessed by employees via web/mobile applications, ensuring authentication and authorization, and integrating with identity providers while supporting single sign-on. The patterns cover securing APIs within and across departments, supporting third-party partners, non-repudiation of API calls, and securing APIs without changing the APIs or clients.
The document discusses authentication with OAuth and Connected Apps. It provides an overview of using OAuth for API authentication and securing mobile apps. It then demonstrates how to build a simple web app using OAuth by registering an app, crafting an authorization URL, and exchanging codes for tokens. The document also covers considerations for mobile apps, building integration apps, and enabling enterprise authorization controls for OAuth apps.
OAuth 2.0 is an open standard for authorization that allows third-party applications to securely access private user data from APIs, without requiring the user to share their username and password. It specifies a process for users to authorize applications to access their data on other servers, issuing access tokens that applications can use to make API requests on the user's behalf. OAuth addresses issues with passwords by allowing temporary, limited access without exposing user credentials.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
2. SalesforceCodex.com 2
About Me
Dhanik Lal Sahni
Technical Architect
Conduent Business Solution
Certified Application Architect
Twitter : @dhaniksahni
Blog : salesforcecodex.com
3. SalesforceCodex.com 3
Session 13-Agenda
• In a given scenario, recommend when to use API-based
integrations, such as SOAP, REST, Bulk, Streaming, Canvas,
Workflow outbound, APEX (Callouts, @ future, etc.), and
Lightning Connect to achieve business requirements.
• Compare and contrast the advantages and drawbacks (design
trade-offs) of using API-based integrations such as SOAP, REST,
Bulk, Streaming, Canvas, Workflow outbound, APEX (Callouts,
@future, etc.), and Lightning Connect.
28%
17%
15%
10%
15%
10%
5%
Integration Architecture
Designer Exam
1 2 3 4 5 6 7
Salesforce Integration Capabilities:: 28%
5. SalesforceCodex.com 5
WHAT IS CONNECTED APP?
A connected app is a framework that enables an external application to integrate with Salesforce using APIs,
Connected app uses standard protocols, such as SAML, OAuth, and OpenID Connect to authorize, authenticate, and
provide single sign-on (SSO) for external apps.
6. SalesforceCodex.com 6
CONNECTED APP PROTOCOLS
OAuth 2.0 is the industry-standard protocol for authorization.
OAuth 2.0 focuses on client side to provide specific authorization flows for web applications,
desktop applications, mobile phones, and living room devices.
Basically it allows a user’s information to be used by third party system without exposing
passwords.
Add an identity layer on top of OAuth2.0
Allows Clients to verify the End-User Identity and obtain his basic information.
Basically it is used for user authentication
Security Assertion Markup Language (SAML) 2.0 is a means to exchange authorization and
authentication information between services.
SAML is frequently used to implement internal corporate single sign-on (SSO) solutions where
the user logs into a service that acts as the single source of identity
7. SalesforceCodex.com 7
Connected App and OAuth Terminology
Access Token
Authorization
Code
Instead of using the user’s Salesforce credentials, a consumer (connected app) can use an access
token to gain access
Only used in OAuth 2.0 with the web server flow, the authorization code is a token that represents the
access granted by the end user. The authorization code is used to obtain an access token and a refresh
token. It expires after 15 minutes.
Authorization
Server
The authorization server is the server that authorizes a resource owner, and upon successful
authorization, issues access tokens to the requesting consumer.
Callback URL A callback URL is the URL that is invoked after OAuth authorization for the consumer (connected app)
Consumer A consumer is the website or app that uses OAuth to authorize both the Salesforce user and itself on
the user’s behalf.
Consumer Key A consumer uses a key to identify itself to Salesforce.
8. SalesforceCodex.com 8
Connected App and OAuth Terminology
Consumer Secret
Refresh Token
A consumer uses a secret to establish ownership of the consumer key
Only used in OAuth 2.0, a consumer can use a refresh token to obtain a new access token, without
having the end user approve the access again.
Resource Owner The resource owner is the entity (usually the end user) that grants access to a protected resource.
Resource Server
The resource server is the server that hosts the protected resource. Your Salesforce org is the resource
server that protects your data.
9. SalesforceCodex.com 9
CONNECTED APP USE CASES
Access Data with API Integration
• Use a connected app to request access to Salesforce data on behalf of an
external application
• Must be integrated with the Salesforce API using the OAuth 2.0 protocol
Integrate Service Providers with
Your Salesforce Org
• Use a connected app to integrate your service provider with your Salesforce org
• Use a connected app with SAML 2.0 or OpenID Connect to integrate a service
provider with your Salesforce org
Manage Access to Third-Party
Apps
• Admins can set security policies to control what data a third-party app can
access from your org.
• Admins can also define who can use the third-party app
11. SalesforceCodex.com 11
Connected App Server Scopes
Scope DESCRIPTION
Access Pardot
services (pardot_api)
Allows access to Pardot API services on behalf of the user.
Access and manage your
data (api)
Allows access to the current, logged-in user’s account using APIs, such as REST API and
Bulk API. This scope also includes chatter_api.
Access and manage your
Chatter feed (chatter_api)
Allows access to Connect REST API resources on behalf of the user.
Access custom
permissions (custom_permi
ssions)
Allows access to the custom permissions in an org associated with the connected app.
Full access (full)
Allows access to all data accessible by the logged-in user, and encompasses all other
scopes.
12. SalesforceCodex.com 12
Connected App Server Scopes
Access your basic information (id,
profile, email, address, phone)
Allows access to the identity URL service. You can request profile, email, address,
or phone individually to get the same result as using id; they are all synonymous.
Allow access to your unique
identifier (openid)
Allows access to the current, logged in user’s unique identifier for OpenID
Connect apps.
In the OAuth 2.0 user-agent flow and the OAuth 2.0 web server flow, use
the openid scope.
Perform requests on your behalf at
any time (refresh_token,
offline_access)
Allows a refresh token to be returned when the requesting client is eligible to
receive one.
Provide access to your data via the
Web (web)
Allows use of the access_token on the web. This scope also includes visualforce,
allowing access to customer-created Visualforce pages.
13. SalesforceCodex.com 13
CREATE A CONNECTED APP
device with limited input or display capabilities,
URL which is redirected to after successful authorization.
15. SalesforceCodex.com 15
Integrate Service Providers with Your Salesforce Org
• Single sign-on (SSO) lets users access other applications without logging in separately to each one—and without having to
create (and remember) different user credentials for each app.
• Two server roles important in SSO - Identity Providers and Service Providers
Identity Provider
Service Provider
An identity provider is a system entity that creates, maintains, and
manages identity information.
A service provider is a vendor that provides IT solutions and/or services to
end users and organizations.
16. SalesforceCodex.com 16
Integrate Service Providers with Your Salesforce Org
Integrate a Service
Provider with SAML
To integrate a service provider with your Salesforce org, you can use a
connected app that implements SAML 2.0 for user authentication
17. SalesforceCodex.com 17
Integrate Service Providers with Your Salesforce Org
Integrate a Service
Provider with OpenID
Connect
• OpenID Connect is a rewrite of SAML using OAuth 2.0.
• In SAML, the user is redirected from the Service Provider (SP) to the
Identity Provider (IDP) for sign in.
• In OpenID Connect, the user is redirected from the Relying Party (RP)
to the OpenID Provider (OP) for sign in.
20. SalesforceCodex.com 20
Install a Connected App
• We can install a connected app by installing a managed package that includes
the connected app as a component.
• We can also install it from OAuth connected app from the Connected Apps
OAuth Usage page
21. SalesforceCodex.com 21
Uninstall a Third-Party Connected App
• We can uninstall a third-party connected app from your org.
• Uninstalling an app doesn’t delete the connected app. It delete OAuth policies.
• Uninstalling a connected app only when the original developer deletes the app
from their org
• We can also block app to make it inaccessible.
22. SalesforceCodex.com 22
Manage OAuth Access Policies for a Connected App
Permitted Users
• All users may self-authorize
• Allows all users in the org to authorize the app after successfully signing in.
• Users must approve the app the first time they access it
• Admin approved users are pre-authorized
• Allows only users with the associated profile or permission set to access the app without first authorizing it.
23. SalesforceCodex.com 23
Manage OAuth Access Policies for a Connected App
IP Relaxation
• Enforce IP restrictions:
• Enforces the IP restrictions configured for the org, such as the IP ranges assigned to a user profile.
• Enforce IP restrictions, but relax for refresh tokens:
• Enforces the IP restrictions configured for the org but relax for refresj token
• Relax IP restrictions for activated devices
• Allows a user running the app to bypass the org’s IP restrictions
• app has a list of allowed IP ranges and is using the web server authentication flow.
• Relax IP restrictions
• Allows a user to run this app without org IP restrictions.
Determines user’s access to the app is restricted by IP ranges.
24. SalesforceCodex.com 24
Manage OAuth Access Policies for a Connected App
Refresh Token Policy
• Refresh token is valid until revoked—
• Default. The refresh token is used indefinitely, unless revoked by the user or Salesforce admin.
• Immediately expire refresh token—
• The refresh token is invalid immediately. The user can use the current session (access token) already issued, but
can’t obtain a new session when the access token expires.
• Expire refresh token if not used for n:
• The refresh token is valid as long as it’s been used within the specified amount of time.
• Expire refresh token after n
• The refresh token is valid for a fixed amount of time.
Determine how long a refresh token is valid for.
If refresh tokens are provided, users can continue to access the OAuth-enabled
connected app without having to reauthorize when the access token expires .
Refresh tokens are required only when a user’s session has expired or isn’t available.