SlideShare a Scribd company logo
Introduction to the Salesforce
Security Model
Sridhar Palakurthy, Salesforce.com, Senior Technical Solution Architect
Vydianath Iyer, Salesforce.com, Senior Technical Solution Architect
Safe harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties
materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results
expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be
deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other
financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any
statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new
functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our
operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any
litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our
relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our
service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to
larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is
included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent
fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor
Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently
available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions
based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these
forward-looking statements.
Sridhar Palakurthy
Senior Technical Solution Architect
Salesforce.com
Vydianath Iyer
Senior Technical Solution Architect
Salesforce.com
Agenda
Systems Level Security
▪ Authentication
• Single Sign-ON

▪ Authorization
• OAuth

Application Level Security
▪ Profile
▪ Permission Set
▪ Role
▪ Sharing
• Owner

▪ Social Sign-On

Q&A

• Role Hierarchy
• Org Wide Defaults
• Sharing Rules
Single Sign-On: Federated Authentication
SAML is The standard for Federated Single Sign-On
Identity Store is the master of ‘User’ identity.
Identity Provider (IdP) is the Identity Assertion Provider
Service Provider (SP) is the provider of enterprise services
Typical setup consists of One IdP and several SPs. Summer 13 supports multiple IdPs

Identity
Provider
1. Generate SAML and
send to salesforce.com

2. Validate SAML and
generate session
SSO Basics: IdP Initiated SAML
2
Identity
Provider

1

3
4

•

User authenticates at Customer IDP

•

User is directed to Salesforce (SP) using a link or button

•

When a link or button is pressed, IDP posts SAML to Salesforce

•

Salesforce validates SAML and a user session is generated
SSO Basics: SP Initiated SAML

Identity Provider

MyDomain: A sub-domain used
to access a specific Salesforce
Organization.
Example: https://sp-developer.my.
salesforce.com

• Request Resource.
• Redirect to IDP
• User accesses IDP and
sends SAML Request
• IDP Authenticates. Send
SAML Response
• Salesforce validates
SAML and generates
session
1
3
4

2
5
Demo - How to setup Federated Authentication

Axiom (Identity
Provider)
•
•
•
•

Configure Service Provider
Configure Identity Provider
Test Login
Examine SAML Token/Assertion

Service Provider
What is Delegated Authentication?

ProvidesSalesforce.
com WSDL
•
•
•

Download WSDL from Salesforce.com
Implement and Host WSDL
Test Login

Client Hosts
Salesforce.com
WSDL
One Time Passwords / 2 Factor Authentication

Identity Provider
+ 2 Factor
2
3

1
4
What is OAuth?
An open protocol to authorize secure API access for
desktop/mobile client applications
Integrates with previous authentication mechanisms
•

OAuth
Authorization
4
2
1Server 3

OAuth
Client

OAuth client makes a authorization request

•

The Authorization Server authenticates the user

•

The user authorizes the application

•

The application is issued an OAuth token.
When Do I Use What?
Userid/Password
▪ When you just want the basics

SAML
▪ Single Sign-On for the web applications with commercial support
▪ SAML provides re-use across other Cloud services

Delegated Auth
▪ Mobile CRM and older API clients with your own credentials

OAuth
▪ Building an API client or mobile application
Social Sign-On
▪ Automatically create and update users and contacts
▪ Single Sign-On makes it easy and keeps them coming back
▪ Deliver applications and services to deepen your relationship
So what’s under the covers?
The Auth Providers Framework
▪ Pre-integrated Single Sign-On from branded Identity Services
▪ Automatically create and update Contacts and Users
▪ Full control post authentication data processing
▪ Works for both internal and external users

Out of the box support
▪ Facebook: B2C
▪ Salesforce: B2B

http://www.janrain.com/salesforce
Application Security
Application Security
▪ Organization Wide Defaults – Record Visibility
▪ Role Herirarchy – Record Visibility by hierarchy
▪ Profiles & Permission Sets – What objects can I access ?
▪ Team Sharing
• Account Teams
• Sales Teams

▪ Sharing Rules
• Manual Sharing
• Criteria Based Sharing
• Apex Managed Sharing
Data access components
Record Level Security
OP

EN

UP

VI

SI

BI

LIT

Y

Data(Record) Visibility
Locking Down Data (Record) Access
What are your Organization Wide Defaults ?
• Baseline level access that all users have for each other’s data
• Feature to restrict access (visibility) to records of data

Private implies
only record
owner and roles
higher can see
the record
Opening Up Record Access - Role Hierarchy
Dr. Evil

Scott Evil

Mini Me

Fat B

JURGEN
RITA

NO. 2

FRAU

ONE ROLE PER USER
Manager has automatic access* to records owned by their subordinates
Opening up access - Team Sharing
Account Team – Team of users working together on an account

Sales Team - Team of users working together on an opportunity

Setting up an
Account Team
Opening up Record Access - Sharing Rules
Extends access beyond
baseline level
Share records owned by a
role/group with another
roles or groups
Applied in real time when a
record is created or
ownership is transferred
Opening up record access - Manual Sharing
•A user with owner-like access to a
record (the owner, his managers, and
administrators have owner-like access)
can share it with another user, group,
role or role and all subordinate roles
•In the case of manual account sharing,
access to child opportunities and cases
can be granted, too
Opening up Record Access
Criteria Based Sharing Rules
• Criteria Based Sharing rules open up access to sets of users, groups,
roles based on the field values in the data record

ID
1

Name
Industry
Cyber Inc. Federal

2

Universal

3

BizPhone

Airline
Wireless

FEDER
AL
GROU
P
Profiles
What are Profiles ?
Defines a user's permission to perform different functions within salesforce.com.
•
•
•
•
•
•
•

What objects (accounts, leads, contacts etc.) can I access ?
What page layouts can I see ?
What fields can I access ?
Which tabs can I view ?
Which record types can I see ?
Which Apex Classes are accessible for me ?
Which Visualforce Pages can I access ?
Permission Sets
What’s a permission set?

A collection of CRUD permissions and settings
Extends user’s access without creating a new profile
User access controlled by Profile + Permission Sets
Some settings are in profiles but not in permission sets (yet)
PROFILES

Profile Only:
▪Page Layout Assignments

PERMISSION SETS

▪Login IP ranges
▪Login hours
▪Desktop client access

Page Layouts
IP Ranges
Login Hours
Desktop
Client Access

App Permissions
Record Types
Tab Settings
Assigned Apps
Object Permissions
Field Level Security
Apex Classes
VisualForce Pages
Demo
Summary
Authentication and Authorization
Federated Authentication
•Uses SAML
•IdP authenticates user and generates an XML “Assertion”
•Identity Provider initiated
•Service Provider initiated

Delegated Authentication
•Custom web service which authenticates and returns a true/false

OAuth
•Token based authorization for an authorized user
•“Valet” key to applications
•Typical use case - Mobile applications or desktop client applications

Social Sign-On Authentication Providers
Roles and Profiles
Role controls Data (Record) Visibility
What records can John Sales see ?

Profile

Profile controls Object/Field permissions
What CRUD permissions does John have on objects and fields ?

Can I access the
Account Object (Table)
?

Account Id

City

State

001U000000B..
John Sales

Name
ABC Corp

Spokane

WA

001U000000V..

Acme

Atlanta

GA

001U000000X..

X Net

San Francisco

CA

001U000000Y..

Universal Air

Dallas

TX

Profile

Role

Can I access the City Field
in the Account Object

Can I see the
ACME record
?
Quiz
Q:

A company wants to restrict access to opportunities by owner but open up access to his/her
management hierarchy
A.Set the organization wide default for opportunities to private
Q: John is a chatter only user and needs read access to a custom object , a visual force page
and an apex class
A.Create a permission set to provide access to the visual force page and apex class and
assign John to the permission set
Q. Can federated authentication in Salesforce co-exist with delegated authentication?
A. Yes
Q. Does user need to authenticate during OAuth handshake between a client application and
Salesforce?

A.Yes
Links & References
▪ Salesforce.com Security Guide
• http://www.salesforce.com/us/developer/docs/securityImplGuide/index.htm

▪ Axiom SSO Play Area
• https://axiomsso.herokuapp.com/Home.action

▪ JanRain Social Sign-On Providers
• http://www.janrain.com/salesforce
Sridhar Palakurthy

Vydianath Iyer

Senior Technical Solution Architect,
Salesforce.com

Senior Technical Solution Architect,
Salesforce.com
Introduction to the Salesforce Security Model

More Related Content

What's hot

What's hot (20)

Sharing and security in Salesforce
Sharing and security in SalesforceSharing and security in Salesforce
Sharing and security in Salesforce
 
Lightning web components
Lightning web components Lightning web components
Lightning web components
 
Salesforce Development Best Practices
Salesforce Development Best PracticesSalesforce Development Best Practices
Salesforce Development Best Practices
 
Salesforce Intro
Salesforce IntroSalesforce Intro
Salesforce Intro
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
 
Salesforce CPQ by yuvaraj
Salesforce CPQ by yuvarajSalesforce CPQ by yuvaraj
Salesforce CPQ by yuvaraj
 
Integrating with salesforce
Integrating with salesforceIntegrating with salesforce
Integrating with salesforce
 
Salesforce complete overview
Salesforce complete overviewSalesforce complete overview
Salesforce complete overview
 
Salesforce Interview Questions And Answers | Salesforce Tutorial | Salesforce...
Salesforce Interview Questions And Answers | Salesforce Tutorial | Salesforce...Salesforce Interview Questions And Answers | Salesforce Tutorial | Salesforce...
Salesforce Interview Questions And Answers | Salesforce Tutorial | Salesforce...
 
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...
What Is Salesforce? | Salesforce Training - What Does Salesforce Do? | Salesf...
 
Best Practices with Apex in 2022.pdf
Best Practices with Apex in 2022.pdfBest Practices with Apex in 2022.pdf
Best Practices with Apex in 2022.pdf
 
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
 
Introduction to lightning Web Component
Introduction to lightning Web ComponentIntroduction to lightning Web Component
Introduction to lightning Web Component
 
Salesforce Lightning workshop
Salesforce Lightning workshopSalesforce Lightning workshop
Salesforce Lightning workshop
 
Introduction to Salesforce Platform - Basic
Introduction to Salesforce Platform - BasicIntroduction to Salesforce Platform - Basic
Introduction to Salesforce Platform - Basic
 
Salesforce Community Cloud
Salesforce Community CloudSalesforce Community Cloud
Salesforce Community Cloud
 
An introduction to Salesforce
An introduction to SalesforceAn introduction to Salesforce
An introduction to Salesforce
 
Deep dive into Salesforce Connected App
Deep dive into Salesforce Connected AppDeep dive into Salesforce Connected App
Deep dive into Salesforce Connected App
 
Decluttering your Salesfroce org
Decluttering your Salesfroce orgDecluttering your Salesfroce org
Decluttering your Salesfroce org
 
Lwc presentation
Lwc presentationLwc presentation
Lwc presentation
 

Similar to Introduction to the Salesforce Security Model

Similar to Introduction to the Salesforce Security Model (20)

Salesforce Identity Management
Salesforce Identity ManagementSalesforce Identity Management
Salesforce Identity Management
 
Salesforce shield & summer 20 release
Salesforce shield & summer 20 releaseSalesforce shield & summer 20 release
Salesforce shield & summer 20 release
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
Blurring the Boundaries Between Salesforce Orgs
Blurring the Boundaries Between Salesforce OrgsBlurring the Boundaries Between Salesforce Orgs
Blurring the Boundaries Between Salesforce Orgs
 
Webinar: Cut that Clutter! Maintain a Clean Org and Improve Productivity
Webinar: Cut that Clutter! Maintain a Clean Org and Improve ProductivityWebinar: Cut that Clutter! Maintain a Clean Org and Improve Productivity
Webinar: Cut that Clutter! Maintain a Clean Org and Improve Productivity
 
How to Become a Security-Minded Admin
How to Become a Security-Minded AdminHow to Become a Security-Minded Admin
How to Become a Security-Minded Admin
 
Df16 - Troubleshooting user access problems
Df16 - Troubleshooting user access problemsDf16 - Troubleshooting user access problems
Df16 - Troubleshooting user access problems
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
 
Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission Sets
 
Admin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & PermissionsAdmin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & Permissions
 
Enterprise and Social Integration Using Force.com
Enterprise and Social Integration Using Force.comEnterprise and Social Integration Using Force.com
Enterprise and Social Integration Using Force.com
 
Introduction to lightning out df16
Introduction to lightning out   df16Introduction to lightning out   df16
Introduction to lightning out df16
 
Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3
 
Introduction to Force.com
Introduction to Force.comIntroduction to Force.com
Introduction to Force.com
 
sf tools from community
sf tools from communitysf tools from community
sf tools from community
 
Using Custom Permissions to Simplify Security
Using Custom Permissions to Simplify SecurityUsing Custom Permissions to Simplify Security
Using Custom Permissions to Simplify Security
 
Advanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social AuthenticationAdvanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social Authentication
 
Elevate Madrid Essentials - Advance Track
Elevate Madrid Essentials - Advance TrackElevate Madrid Essentials - Advance Track
Elevate Madrid Essentials - Advance Track
 
Salesforce API Series: Integrating Applications with Force.com Webinar
Salesforce API Series: Integrating Applications with Force.com WebinarSalesforce API Series: Integrating Applications with Force.com Webinar
Salesforce API Series: Integrating Applications with Force.com Webinar
 

More from Salesforce Developers

More from Salesforce Developers (20)

Sample Gallery: Reference Code and Best Practices for Salesforce Developers
Sample Gallery: Reference Code and Best Practices for Salesforce DevelopersSample Gallery: Reference Code and Best Practices for Salesforce Developers
Sample Gallery: Reference Code and Best Practices for Salesforce Developers
 
Maximizing Salesforce Lightning Experience and Lightning Component Performance
Maximizing Salesforce Lightning Experience and Lightning Component PerformanceMaximizing Salesforce Lightning Experience and Lightning Component Performance
Maximizing Salesforce Lightning Experience and Lightning Component Performance
 
Local development with Open Source Base Components
Local development with Open Source Base ComponentsLocal development with Open Source Base Components
Local development with Open Source Base Components
 
TrailheaDX India : Developer Highlights
TrailheaDX India : Developer HighlightsTrailheaDX India : Developer Highlights
TrailheaDX India : Developer Highlights
 
Why developers shouldn’t miss TrailheaDX India
Why developers shouldn’t miss TrailheaDX IndiaWhy developers shouldn’t miss TrailheaDX India
Why developers shouldn’t miss TrailheaDX India
 
CodeLive: Build Lightning Web Components faster with Local Development
CodeLive: Build Lightning Web Components faster with Local DevelopmentCodeLive: Build Lightning Web Components faster with Local Development
CodeLive: Build Lightning Web Components faster with Local Development
 
CodeLive: Converting Aura Components to Lightning Web Components
CodeLive: Converting Aura Components to Lightning Web ComponentsCodeLive: Converting Aura Components to Lightning Web Components
CodeLive: Converting Aura Components to Lightning Web Components
 
Enterprise-grade UI with open source Lightning Web Components
Enterprise-grade UI with open source Lightning Web ComponentsEnterprise-grade UI with open source Lightning Web Components
Enterprise-grade UI with open source Lightning Web Components
 
TrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer HighlightsTrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer Highlights
 
Live coding with LWC
Live coding with LWCLive coding with LWC
Live coding with LWC
 
Lightning web components - Episode 4 : Security and Testing
Lightning web components  - Episode 4 : Security and TestingLightning web components  - Episode 4 : Security and Testing
Lightning web components - Episode 4 : Security and Testing
 
LWC Episode 3- Component Communication and Aura Interoperability
LWC Episode 3- Component Communication and Aura InteroperabilityLWC Episode 3- Component Communication and Aura Interoperability
LWC Episode 3- Component Communication and Aura Interoperability
 
Lightning web components episode 2- work with salesforce data
Lightning web components   episode 2- work with salesforce dataLightning web components   episode 2- work with salesforce data
Lightning web components episode 2- work with salesforce data
 
Lightning web components - Episode 1 - An Introduction
Lightning web components - Episode 1 - An IntroductionLightning web components - Episode 1 - An Introduction
Lightning web components - Episode 1 - An Introduction
 
Migrating CPQ to Advanced Calculator and JSQCP
Migrating CPQ to Advanced Calculator and JSQCPMigrating CPQ to Advanced Calculator and JSQCP
Migrating CPQ to Advanced Calculator and JSQCP
 
Scale with Large Data Volumes and Big Objects in Salesforce
Scale with Large Data Volumes and Big Objects in SalesforceScale with Large Data Volumes and Big Objects in Salesforce
Scale with Large Data Volumes and Big Objects in Salesforce
 
Replicate Salesforce Data in Real Time with Change Data Capture
Replicate Salesforce Data in Real Time with Change Data CaptureReplicate Salesforce Data in Real Time with Change Data Capture
Replicate Salesforce Data in Real Time with Change Data Capture
 
Modern Development with Salesforce DX
Modern Development with Salesforce DXModern Development with Salesforce DX
Modern Development with Salesforce DX
 
Get Into Lightning Flow Development
Get Into Lightning Flow DevelopmentGet Into Lightning Flow Development
Get Into Lightning Flow Development
 
Integrate CMS Content Into Lightning Communities with CMS Connect
Integrate CMS Content Into Lightning Communities with CMS ConnectIntegrate CMS Content Into Lightning Communities with CMS Connect
Integrate CMS Content Into Lightning Communities with CMS Connect
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Introduction to the Salesforce Security Model

  • 1. Introduction to the Salesforce Security Model Sridhar Palakurthy, Salesforce.com, Senior Technical Solution Architect Vydianath Iyer, Salesforce.com, Senior Technical Solution Architect
  • 2. Safe harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 3. Sridhar Palakurthy Senior Technical Solution Architect Salesforce.com
  • 4. Vydianath Iyer Senior Technical Solution Architect Salesforce.com
  • 5. Agenda Systems Level Security ▪ Authentication • Single Sign-ON ▪ Authorization • OAuth Application Level Security ▪ Profile ▪ Permission Set ▪ Role ▪ Sharing • Owner ▪ Social Sign-On Q&A • Role Hierarchy • Org Wide Defaults • Sharing Rules
  • 6. Single Sign-On: Federated Authentication SAML is The standard for Federated Single Sign-On Identity Store is the master of ‘User’ identity. Identity Provider (IdP) is the Identity Assertion Provider Service Provider (SP) is the provider of enterprise services Typical setup consists of One IdP and several SPs. Summer 13 supports multiple IdPs Identity Provider 1. Generate SAML and send to salesforce.com 2. Validate SAML and generate session
  • 7. SSO Basics: IdP Initiated SAML 2 Identity Provider 1 3 4 • User authenticates at Customer IDP • User is directed to Salesforce (SP) using a link or button • When a link or button is pressed, IDP posts SAML to Salesforce • Salesforce validates SAML and a user session is generated
  • 8. SSO Basics: SP Initiated SAML Identity Provider MyDomain: A sub-domain used to access a specific Salesforce Organization. Example: https://sp-developer.my. salesforce.com • Request Resource. • Redirect to IDP • User accesses IDP and sends SAML Request • IDP Authenticates. Send SAML Response • Salesforce validates SAML and generates session 1 3 4 2 5
  • 9. Demo - How to setup Federated Authentication Axiom (Identity Provider) • • • • Configure Service Provider Configure Identity Provider Test Login Examine SAML Token/Assertion Service Provider
  • 10. What is Delegated Authentication? ProvidesSalesforce. com WSDL • • • Download WSDL from Salesforce.com Implement and Host WSDL Test Login Client Hosts Salesforce.com WSDL
  • 11. One Time Passwords / 2 Factor Authentication Identity Provider + 2 Factor 2 3 1 4
  • 12. What is OAuth? An open protocol to authorize secure API access for desktop/mobile client applications Integrates with previous authentication mechanisms • OAuth Authorization 4 2 1Server 3 OAuth Client OAuth client makes a authorization request • The Authorization Server authenticates the user • The user authorizes the application • The application is issued an OAuth token.
  • 13. When Do I Use What? Userid/Password ▪ When you just want the basics SAML ▪ Single Sign-On for the web applications with commercial support ▪ SAML provides re-use across other Cloud services Delegated Auth ▪ Mobile CRM and older API clients with your own credentials OAuth ▪ Building an API client or mobile application
  • 14. Social Sign-On ▪ Automatically create and update users and contacts ▪ Single Sign-On makes it easy and keeps them coming back ▪ Deliver applications and services to deepen your relationship
  • 15. So what’s under the covers? The Auth Providers Framework ▪ Pre-integrated Single Sign-On from branded Identity Services ▪ Automatically create and update Contacts and Users ▪ Full control post authentication data processing ▪ Works for both internal and external users Out of the box support ▪ Facebook: B2C ▪ Salesforce: B2B http://www.janrain.com/salesforce
  • 17. Application Security ▪ Organization Wide Defaults – Record Visibility ▪ Role Herirarchy – Record Visibility by hierarchy ▪ Profiles & Permission Sets – What objects can I access ? ▪ Team Sharing • Account Teams • Sales Teams ▪ Sharing Rules • Manual Sharing • Criteria Based Sharing • Apex Managed Sharing
  • 21. Locking Down Data (Record) Access What are your Organization Wide Defaults ? • Baseline level access that all users have for each other’s data • Feature to restrict access (visibility) to records of data Private implies only record owner and roles higher can see the record
  • 22. Opening Up Record Access - Role Hierarchy Dr. Evil Scott Evil Mini Me Fat B JURGEN RITA NO. 2 FRAU ONE ROLE PER USER Manager has automatic access* to records owned by their subordinates
  • 23. Opening up access - Team Sharing Account Team – Team of users working together on an account Sales Team - Team of users working together on an opportunity Setting up an Account Team
  • 24. Opening up Record Access - Sharing Rules Extends access beyond baseline level Share records owned by a role/group with another roles or groups Applied in real time when a record is created or ownership is transferred
  • 25. Opening up record access - Manual Sharing •A user with owner-like access to a record (the owner, his managers, and administrators have owner-like access) can share it with another user, group, role or role and all subordinate roles •In the case of manual account sharing, access to child opportunities and cases can be granted, too
  • 26. Opening up Record Access Criteria Based Sharing Rules • Criteria Based Sharing rules open up access to sets of users, groups, roles based on the field values in the data record ID 1 Name Industry Cyber Inc. Federal 2 Universal 3 BizPhone Airline Wireless FEDER AL GROU P
  • 28. What are Profiles ? Defines a user's permission to perform different functions within salesforce.com. • • • • • • • What objects (accounts, leads, contacts etc.) can I access ? What page layouts can I see ? What fields can I access ? Which tabs can I view ? Which record types can I see ? Which Apex Classes are accessible for me ? Which Visualforce Pages can I access ?
  • 30. What’s a permission set? A collection of CRUD permissions and settings Extends user’s access without creating a new profile User access controlled by Profile + Permission Sets
  • 31. Some settings are in profiles but not in permission sets (yet) PROFILES Profile Only: ▪Page Layout Assignments PERMISSION SETS ▪Login IP ranges ▪Login hours ▪Desktop client access Page Layouts IP Ranges Login Hours Desktop Client Access App Permissions Record Types Tab Settings Assigned Apps Object Permissions Field Level Security Apex Classes VisualForce Pages
  • 32. Demo
  • 34. Authentication and Authorization Federated Authentication •Uses SAML •IdP authenticates user and generates an XML “Assertion” •Identity Provider initiated •Service Provider initiated Delegated Authentication •Custom web service which authenticates and returns a true/false OAuth •Token based authorization for an authorized user •“Valet” key to applications •Typical use case - Mobile applications or desktop client applications Social Sign-On Authentication Providers
  • 35. Roles and Profiles Role controls Data (Record) Visibility What records can John Sales see ? Profile Profile controls Object/Field permissions What CRUD permissions does John have on objects and fields ? Can I access the Account Object (Table) ? Account Id City State 001U000000B.. John Sales Name ABC Corp Spokane WA 001U000000V.. Acme Atlanta GA 001U000000X.. X Net San Francisco CA 001U000000Y.. Universal Air Dallas TX Profile Role Can I access the City Field in the Account Object Can I see the ACME record ?
  • 36. Quiz Q: A company wants to restrict access to opportunities by owner but open up access to his/her management hierarchy A.Set the organization wide default for opportunities to private Q: John is a chatter only user and needs read access to a custom object , a visual force page and an apex class A.Create a permission set to provide access to the visual force page and apex class and assign John to the permission set Q. Can federated authentication in Salesforce co-exist with delegated authentication? A. Yes Q. Does user need to authenticate during OAuth handshake between a client application and Salesforce? A.Yes
  • 37. Links & References ▪ Salesforce.com Security Guide • http://www.salesforce.com/us/developer/docs/securityImplGuide/index.htm ▪ Axiom SSO Play Area • https://axiomsso.herokuapp.com/Home.action ▪ JanRain Social Sign-On Providers • http://www.janrain.com/salesforce
  • 38. Sridhar Palakurthy Vydianath Iyer Senior Technical Solution Architect, Salesforce.com Senior Technical Solution Architect, Salesforce.com