SlideShare a Scribd company logo
Sharing & Security 
Salesforce.com
Why Cloud…?? 
• Bringing down computing costs in organization. 
• Freedom to access data anywhere from any of the devices. 
(Mobile, Tablets, Computers, etc.) 
• Centralized and agile. 
• More Secure than a scattered network. 
• No headache of maintaining servers.
Sharing & Security Importance 
• First of all it is important that who's actually going to be using 
the app. 
• How much access they should have to the data. 
• Otherwise app will expose sensitive information. 
• So the security controls should be configured, and the access 
should be defined.
Controlling Access To Objects 
Controlling the application access can be done by two ways 
which are actually the collection of Settings and Permissions 
• Profile : A mandatory field of user which provides settings and 
permission which are used for data access purpose. 
• Permission Sets : A non-mandatory field that provide extra 
access to objects, fields etc.
Profiles 
What controls a Profile holds: 
• Object Permission 
• Field permissions (Field-level security) 
• User permissions 
• Tab settings 
• App settings 
• Apex class access 
• VisualForce page access 
• Page layouts 
• Record types 
• Login hours 
• Login IP ranges
Standard Profiles 
• Read Only 
• Standard User 
• Marketing User 
• Contract Manager 
• Solution Manager 
• System Administrator 
Creating a new profile will ask you to refer existing profile or 
make a clone of it.
Permission Sets 
What controls a Permission set holds: 
• Object permissions 
• Field permissions(Field Level Security) 
• User permissions 
• Tab settings 
• App settings 
• Apex class access 
• VisualForce page access
License Concept behind the 
User, Profiles & Permission sets 
• While creating a user , profile or a permission set the license 
must be specified. 
• These licenses are having some accessibilities which are 
provided along with them. 
• The license of a user should match with the permission set we 
are applying to it. 
• The licenses of a user, its profile and the permission set that is 
being assigned to it, are the same.
Comparing Profiles & 
Permission Sets 
• User can have only one Profile but can have many permission 
sets. 
• Profiles are having more permissions options than permission 
sets. Record type, Page layout, Login hours, Login IP ranges is 
missing from the permission set. 
• Permissions are mostly used for temporary purpose. 
• Profile are mandatory and used for minimum access. 
• Permission are not mandatory and always used to grant more 
access.
Data Access Concepts 
• Object-Level Security : Preventing a user from seeing, 
creating, editing, or deleting any instance of a particular type 
of object. 
• A profile or a permission set can provide object-level security. 
• Defined using Tab settings and object permissions. 
• Field-Level Security : Preventing a user from seeing, editing, 
or deleting the value for a particular field on an object. 
• A profile or a permission set can provide Field-level security. 
• Provide Read and Edit options for fields. 
• Record-Level Security : Preventing a user for individual object 
records that he is allowed to see.
Record-Level Security can be achieved by: 
• Organization-wide Defaults : Allow us to specify the baseline 
level of access that a user has in our organization. The access 
can be, 
• Private 
• Public Read-only 
• Public Read/Write 
Org-wide defaults do not sets the access levels for a child record of 
Master-detail Relationship. 
• Manual Sharing : Allows record owners to give read and edit 
permissions to users who might not have access to the record 
any other way.
• Role Hierarchies : Allow us to make sure that a user above in 
role hierarchy will always have access to the same records as 
his or her subordinates. 
• Grant access using role hierarchies can be decided from Org-wide 
Defaults for custom objects. 
• Sharing Rule : Allow us to make automatic exceptions to 
organization-wide defaults for particular groups of users. 
• Allows to be based on owner of record & Based on criteria. 
• Share with Public Groups.
Points to Remember about the Record-Level Securities : 
• A Record-Level Security is used to grant more access not to 
restrict access. So we can say Org-default as most restrictive 
among all the record level securities. 
• A record creator can not be changed but the owner of the 
record can be changed. 
• A record can also be shared using the Apex Managed Sharing.
Displaying Field Values and 
Page Layouts According to 
Profiles 
• We can use the different page layouts for different profiles. 
• For that, what we need is the record type. 
• The record type created will be assigned with a new page 
layout created. 
• Afterwards page layouts access can be assigned through the 
Profiles. 
• For field access the page layouts can further be modified.
Exploring ViewAll/ ModifyAll 
• The ViewAll and ModifyAll from the Profile ignores all the 
sharing model , role hierarchies, sharing rules. 
• These provides access to all the records created by any type of 
user. 
• ModifyAll gives ability to mass transfer , mass update, mass 
delete records. 
• ModifyAll gives access to approvals also to Accept or Reject.
Field Accessibility 
• The Sharing Controls of Salesforce provides a Field 
Accessibility which allows to view & modify the fields access 
from different aspects for a particular object. 
• View By Fields 
• View By Profiles 
• View By Record types
Delegating Data 
Administration 
• There are two ways to quickly delegate restricted data 
administration access: 
• Object-Level Permissions 
• Provides the all Object level access to other user which can then act 
as a delegated administrator. 
• Delegated Administration Group. 
• Creating a new non-admin i.e. delegated administration group with 
limited admin privileges which are rather than object settings. Like 
creating new user, modify user , reset passwords, access to selected 
objected provided by primary admin.
Accessing Records in Apex 
• While accessing the records or information of an custom 
object using SOQL queries will give you all the records access 
even if the user accessing it is not having the access to those 
records. 
• So at these conditions use the following type of syntax to 
classes to restrict the access as per the sharing rules 
Public with sharing class MyClassname{ 
}
Thank You

More Related Content

What's hot

Two-Way Integration with Writable External Objects
Two-Way Integration with Writable External ObjectsTwo-Way Integration with Writable External Objects
Two-Way Integration with Writable External Objects
Salesforce Developers
 
Best Practices with Apex in 2022.pdf
Best Practices with Apex in 2022.pdfBest Practices with Apex in 2022.pdf
Best Practices with Apex in 2022.pdf
Mohith Shrivastava
 
Setting up Security in Your Salesforce Instance
Setting up Security in Your Salesforce InstanceSetting up Security in Your Salesforce Instance
Setting up Security in Your Salesforce Instance
Salesforce Developers
 
Workflow in Salesforce
Workflow in SalesforceWorkflow in Salesforce
Workflow in Salesforce
MST Solutions LLC
 
Getting started with Salesforce security
Getting started with Salesforce securityGetting started with Salesforce security
Getting started with Salesforce security
Salesforce Admins
 
Salesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every AdminSalesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every Admin
Cloud Analogy
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
Salesforce Admins
 
Salesforce Sharing Architecture
Salesforce Sharing ArchitectureSalesforce Sharing Architecture
Salesforce Sharing Architecture
gemziebeth
 
Getting Started with Process Builder
Getting Started with Process BuilderGetting Started with Process Builder
Getting Started with Process Builder
Salesforce Admins
 
Enterprise Integration - Solution Patterns From the Field
Enterprise Integration - Solution Patterns From the FieldEnterprise Integration - Solution Patterns From the Field
Enterprise Integration - Solution Patterns From the Field
Salesforce Developers
 
Introduction to Force.com Canvas Apps
Introduction to Force.com Canvas AppsIntroduction to Force.com Canvas Apps
Introduction to Force.com Canvas Apps
Salesforce Developers
 
Exploring the Salesforce REST API
Exploring the Salesforce REST APIExploring the Salesforce REST API
Exploring the Salesforce REST API
Salesforce Developers
 
Salesforce CPQ updated 1.pptx
Salesforce CPQ updated 1.pptxSalesforce CPQ updated 1.pptx
Salesforce CPQ updated 1.pptx
ssuser1eba67
 
SFDC Organization Setup
SFDC Organization SetupSFDC Organization Setup
SFDC Organization Setup
Simeon Tzanev
 
Salesforce REST API
Salesforce  REST API Salesforce  REST API
Salesforce REST API
Bohdan Dovhań
 
Salesforce talk
Salesforce talkSalesforce talk
Salesforce talk
Suvendu Roy
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
Salesforce Developers
 
Why Flow with Salesforce Flow
Why Flow with Salesforce FlowWhy Flow with Salesforce Flow
Why Flow with Salesforce Flow
Ajeet Singh
 
Salesforce CPQ
Salesforce CPQSalesforce CPQ
Salesforce CPQ
Jade Global
 
Lightning web components - Episode 4 : Security and Testing
Lightning web components  - Episode 4 : Security and TestingLightning web components  - Episode 4 : Security and Testing
Lightning web components - Episode 4 : Security and Testing
Salesforce Developers
 

What's hot (20)

Two-Way Integration with Writable External Objects
Two-Way Integration with Writable External ObjectsTwo-Way Integration with Writable External Objects
Two-Way Integration with Writable External Objects
 
Best Practices with Apex in 2022.pdf
Best Practices with Apex in 2022.pdfBest Practices with Apex in 2022.pdf
Best Practices with Apex in 2022.pdf
 
Setting up Security in Your Salesforce Instance
Setting up Security in Your Salesforce InstanceSetting up Security in Your Salesforce Instance
Setting up Security in Your Salesforce Instance
 
Workflow in Salesforce
Workflow in SalesforceWorkflow in Salesforce
Workflow in Salesforce
 
Getting started with Salesforce security
Getting started with Salesforce securityGetting started with Salesforce security
Getting started with Salesforce security
 
Salesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every AdminSalesforce Security Best Practices for Every Admin
Salesforce Security Best Practices for Every Admin
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
 
Salesforce Sharing Architecture
Salesforce Sharing ArchitectureSalesforce Sharing Architecture
Salesforce Sharing Architecture
 
Getting Started with Process Builder
Getting Started with Process BuilderGetting Started with Process Builder
Getting Started with Process Builder
 
Enterprise Integration - Solution Patterns From the Field
Enterprise Integration - Solution Patterns From the FieldEnterprise Integration - Solution Patterns From the Field
Enterprise Integration - Solution Patterns From the Field
 
Introduction to Force.com Canvas Apps
Introduction to Force.com Canvas AppsIntroduction to Force.com Canvas Apps
Introduction to Force.com Canvas Apps
 
Exploring the Salesforce REST API
Exploring the Salesforce REST APIExploring the Salesforce REST API
Exploring the Salesforce REST API
 
Salesforce CPQ updated 1.pptx
Salesforce CPQ updated 1.pptxSalesforce CPQ updated 1.pptx
Salesforce CPQ updated 1.pptx
 
SFDC Organization Setup
SFDC Organization SetupSFDC Organization Setup
SFDC Organization Setup
 
Salesforce REST API
Salesforce  REST API Salesforce  REST API
Salesforce REST API
 
Salesforce talk
Salesforce talkSalesforce talk
Salesforce talk
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
 
Why Flow with Salesforce Flow
Why Flow with Salesforce FlowWhy Flow with Salesforce Flow
Why Flow with Salesforce Flow
 
Salesforce CPQ
Salesforce CPQSalesforce CPQ
Salesforce CPQ
 
Lightning web components - Episode 4 : Security and Testing
Lightning web components  - Episode 4 : Security and TestingLightning web components  - Episode 4 : Security and Testing
Lightning web components - Episode 4 : Security and Testing
 

Viewers also liked

Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
CipherCloud
 
How-to Create a 'Lock' record in Salesforce
How-to Create a 'Lock' record in SalesforceHow-to Create a 'Lock' record in Salesforce
How-to Create a 'Lock' record in Salesforce
Saaspoint
 
Custom Links Buttons In Salesforce Com
Custom Links Buttons In Salesforce ComCustom Links Buttons In Salesforce Com
Custom Links Buttons In Salesforce Com
amber9904
 
How to be a SalesFIERCE Salesforce Admin
How to be a SalesFIERCE Salesforce AdminHow to be a SalesFIERCE Salesforce Admin
How to be a SalesFIERCE Salesforce Admin
Jared Miller
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information Sharing
Gov BizCouncil
 
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
vraopolisetti
 
12 Things Your Salesforce Admin Needs You to Know
12 Things Your Salesforce Admin Needs You to Know12 Things Your Salesforce Admin Needs You to Know
12 Things Your Salesforce Admin Needs You to Know
Cloudingo
 
Trailhead Live Developer Workshop - Salesforce App Cloud
Trailhead Live Developer Workshop - Salesforce App CloudTrailhead Live Developer Workshop - Salesforce App Cloud
Trailhead Live Developer Workshop - Salesforce App Cloud
Sam Garforth
 
Data Management for Salesforce Admins at Dreamforce 2016
Data Management for Salesforce Admins at Dreamforce 2016Data Management for Salesforce Admins at Dreamforce 2016
Data Management for Salesforce Admins at Dreamforce 2016
Salesforce Admins
 
Secure Development on the Salesforce Platform - Part I
Secure Development on the Salesforce Platform - Part ISecure Development on the Salesforce Platform - Part I
Secure Development on the Salesforce Platform - Part I
Salesforce Developers
 
Advanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social AuthenticationAdvanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social Authentication
Salesforce Developers
 
Salesforce Data Structures
Salesforce Data StructuresSalesforce Data Structures
Salesforce Data Structures
Idealist Consulting
 

Viewers also liked (12)

Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
 
How-to Create a 'Lock' record in Salesforce
How-to Create a 'Lock' record in SalesforceHow-to Create a 'Lock' record in Salesforce
How-to Create a 'Lock' record in Salesforce
 
Custom Links Buttons In Salesforce Com
Custom Links Buttons In Salesforce ComCustom Links Buttons In Salesforce Com
Custom Links Buttons In Salesforce Com
 
How to be a SalesFIERCE Salesforce Admin
How to be a SalesFIERCE Salesforce AdminHow to be a SalesFIERCE Salesforce Admin
How to be a SalesFIERCE Salesforce Admin
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information Sharing
 
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
 
12 Things Your Salesforce Admin Needs You to Know
12 Things Your Salesforce Admin Needs You to Know12 Things Your Salesforce Admin Needs You to Know
12 Things Your Salesforce Admin Needs You to Know
 
Trailhead Live Developer Workshop - Salesforce App Cloud
Trailhead Live Developer Workshop - Salesforce App CloudTrailhead Live Developer Workshop - Salesforce App Cloud
Trailhead Live Developer Workshop - Salesforce App Cloud
 
Data Management for Salesforce Admins at Dreamforce 2016
Data Management for Salesforce Admins at Dreamforce 2016Data Management for Salesforce Admins at Dreamforce 2016
Data Management for Salesforce Admins at Dreamforce 2016
 
Secure Development on the Salesforce Platform - Part I
Secure Development on the Salesforce Platform - Part ISecure Development on the Salesforce Platform - Part I
Secure Development on the Salesforce Platform - Part I
 
Advanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social AuthenticationAdvanced Platform Series - OAuth and Social Authentication
Advanced Platform Series - OAuth and Social Authentication
 
Salesforce Data Structures
Salesforce Data StructuresSalesforce Data Structures
Salesforce Data Structures
 

Similar to Sharing and security in Salesforce

SFDC Database Security
SFDC Database SecuritySFDC Database Security
SFDC Database Security
Sujit Kumar
 
Dataverse Permissions Demystified - PowerAddicts BE 11-2022.pptx
Dataverse Permissions Demystified - PowerAddicts BE 11-2022.pptxDataverse Permissions Demystified - PowerAddicts BE 11-2022.pptx
Dataverse Permissions Demystified - PowerAddicts BE 11-2022.pptx
Rebekka Aalbers-de Jong
 
Cairo meetup low code best practices
Cairo meetup low code best practicesCairo meetup low code best practices
Cairo meetup low code best practices
Ahmed Keshk
 
2020 07-22 fireside chat : Record Ownership Deep Dive
2020 07-22 fireside chat : Record Ownership Deep Dive2020 07-22 fireside chat : Record Ownership Deep Dive
2020 07-22 fireside chat : Record Ownership Deep Dive
Jihun Jung
 
recordsharingmodelinsalesforce-170519074428.pdf
recordsharingmodelinsalesforce-170519074428.pdfrecordsharingmodelinsalesforce-170519074428.pdf
recordsharingmodelinsalesforce-170519074428.pdf
rohitgupt1
 
SFDC Database Additional Features
SFDC Database Additional FeaturesSFDC Database Additional Features
SFDC Database Additional Features
Sujit Kumar
 
2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture
Jihun Jung
 
SQL: Permissions and Data Protection
SQL: Permissions and Data ProtectionSQL: Permissions and Data Protection
SQL: Permissions and Data Protection
LearnNowOnline
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners Guide
Courtney Llamas
 
How to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloHow to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris Zullo
Salesforce Admins
 
Oracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners GuideOracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners Guide
Courtney Llamas
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CloudIDSummit
 
Less06 users
Less06 usersLess06 users
Less06 users
Imran Ali
 
Adm 201 study group session 1 user interface kathy c
Adm 201 study group session 1   user interface kathy cAdm 201 study group session 1   user interface kathy c
Adm 201 study group session 1 user interface kathy c
ovalisgroup
 
Adm 201 study group session 1 user interface kathy c
Adm 201 study group session 1   user interface kathy cAdm 201 study group session 1   user interface kathy c
Adm 201 study group session 1 user interface kathy c
ovalisgroup
 
98_364_Slides_Lesson05.ppt
98_364_Slides_Lesson05.ppt98_364_Slides_Lesson05.ppt
98_364_Slides_Lesson05.ppt
RahafKhalid14
 
Cache Security- The Basics
Cache Security- The BasicsCache Security- The Basics
Cache Security- The Basics
InterSystems Corporation
 
Sitecore Security Overview
Sitecore Security OverviewSitecore Security Overview
Sitecore Security Overview
Randy Woods
 
Advanced Apex Security Expert Tips and Best Practices (1).pptx
Advanced Apex Security Expert Tips and Best Practices (1).pptxAdvanced Apex Security Expert Tips and Best Practices (1).pptx
Advanced Apex Security Expert Tips and Best Practices (1).pptx
mohayyudin7826
 

Similar to Sharing and security in Salesforce (20)

SFDC Database Security
SFDC Database SecuritySFDC Database Security
SFDC Database Security
 
Dataverse Permissions Demystified - PowerAddicts BE 11-2022.pptx
Dataverse Permissions Demystified - PowerAddicts BE 11-2022.pptxDataverse Permissions Demystified - PowerAddicts BE 11-2022.pptx
Dataverse Permissions Demystified - PowerAddicts BE 11-2022.pptx
 
Cairo meetup low code best practices
Cairo meetup low code best practicesCairo meetup low code best practices
Cairo meetup low code best practices
 
2020 07-22 fireside chat : Record Ownership Deep Dive
2020 07-22 fireside chat : Record Ownership Deep Dive2020 07-22 fireside chat : Record Ownership Deep Dive
2020 07-22 fireside chat : Record Ownership Deep Dive
 
recordsharingmodelinsalesforce-170519074428.pdf
recordsharingmodelinsalesforce-170519074428.pdfrecordsharingmodelinsalesforce-170519074428.pdf
recordsharingmodelinsalesforce-170519074428.pdf
 
SFDC Database Additional Features
SFDC Database Additional FeaturesSFDC Database Additional Features
SFDC Database Additional Features
 
2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture
 
SQL: Permissions and Data Protection
SQL: Permissions and Data ProtectionSQL: Permissions and Data Protection
SQL: Permissions and Data Protection
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners Guide
 
How to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloHow to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris Zullo
 
Oracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners GuideOracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners Guide
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
 
Less06 users
Less06 usersLess06 users
Less06 users
 
Adm 201 study group session 1 user interface kathy c
Adm 201 study group session 1   user interface kathy cAdm 201 study group session 1   user interface kathy c
Adm 201 study group session 1 user interface kathy c
 
Adm 201 study group session 1 user interface kathy c
Adm 201 study group session 1   user interface kathy cAdm 201 study group session 1   user interface kathy c
Adm 201 study group session 1 user interface kathy c
 
98_364_Slides_Lesson05.ppt
98_364_Slides_Lesson05.ppt98_364_Slides_Lesson05.ppt
98_364_Slides_Lesson05.ppt
 
Cache Security- The Basics
Cache Security- The BasicsCache Security- The Basics
Cache Security- The Basics
 
Sitecore Security Overview
Sitecore Security OverviewSitecore Security Overview
Sitecore Security Overview
 
Advanced Apex Security Expert Tips and Best Practices (1).pptx
Advanced Apex Security Expert Tips and Best Practices (1).pptxAdvanced Apex Security Expert Tips and Best Practices (1).pptx
Advanced Apex Security Expert Tips and Best Practices (1).pptx
 

Recently uploaded

🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
campbellclarkson
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptxOperational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
sandeepmenon62
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
OnePlan Solutions
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
kalichargn70th171
 
DevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps ServicesDevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps Services
seospiralmantra
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
Yara Milbes
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 

Recently uploaded (20)

🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptxOperational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
 
DevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps ServicesDevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps Services
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 

Sharing and security in Salesforce

  • 1. Sharing & Security Salesforce.com
  • 2. Why Cloud…?? • Bringing down computing costs in organization. • Freedom to access data anywhere from any of the devices. (Mobile, Tablets, Computers, etc.) • Centralized and agile. • More Secure than a scattered network. • No headache of maintaining servers.
  • 3. Sharing & Security Importance • First of all it is important that who's actually going to be using the app. • How much access they should have to the data. • Otherwise app will expose sensitive information. • So the security controls should be configured, and the access should be defined.
  • 4. Controlling Access To Objects Controlling the application access can be done by two ways which are actually the collection of Settings and Permissions • Profile : A mandatory field of user which provides settings and permission which are used for data access purpose. • Permission Sets : A non-mandatory field that provide extra access to objects, fields etc.
  • 5. Profiles What controls a Profile holds: • Object Permission • Field permissions (Field-level security) • User permissions • Tab settings • App settings • Apex class access • VisualForce page access • Page layouts • Record types • Login hours • Login IP ranges
  • 6. Standard Profiles • Read Only • Standard User • Marketing User • Contract Manager • Solution Manager • System Administrator Creating a new profile will ask you to refer existing profile or make a clone of it.
  • 7. Permission Sets What controls a Permission set holds: • Object permissions • Field permissions(Field Level Security) • User permissions • Tab settings • App settings • Apex class access • VisualForce page access
  • 8. License Concept behind the User, Profiles & Permission sets • While creating a user , profile or a permission set the license must be specified. • These licenses are having some accessibilities which are provided along with them. • The license of a user should match with the permission set we are applying to it. • The licenses of a user, its profile and the permission set that is being assigned to it, are the same.
  • 9. Comparing Profiles & Permission Sets • User can have only one Profile but can have many permission sets. • Profiles are having more permissions options than permission sets. Record type, Page layout, Login hours, Login IP ranges is missing from the permission set. • Permissions are mostly used for temporary purpose. • Profile are mandatory and used for minimum access. • Permission are not mandatory and always used to grant more access.
  • 10. Data Access Concepts • Object-Level Security : Preventing a user from seeing, creating, editing, or deleting any instance of a particular type of object. • A profile or a permission set can provide object-level security. • Defined using Tab settings and object permissions. • Field-Level Security : Preventing a user from seeing, editing, or deleting the value for a particular field on an object. • A profile or a permission set can provide Field-level security. • Provide Read and Edit options for fields. • Record-Level Security : Preventing a user for individual object records that he is allowed to see.
  • 11. Record-Level Security can be achieved by: • Organization-wide Defaults : Allow us to specify the baseline level of access that a user has in our organization. The access can be, • Private • Public Read-only • Public Read/Write Org-wide defaults do not sets the access levels for a child record of Master-detail Relationship. • Manual Sharing : Allows record owners to give read and edit permissions to users who might not have access to the record any other way.
  • 12. • Role Hierarchies : Allow us to make sure that a user above in role hierarchy will always have access to the same records as his or her subordinates. • Grant access using role hierarchies can be decided from Org-wide Defaults for custom objects. • Sharing Rule : Allow us to make automatic exceptions to organization-wide defaults for particular groups of users. • Allows to be based on owner of record & Based on criteria. • Share with Public Groups.
  • 13. Points to Remember about the Record-Level Securities : • A Record-Level Security is used to grant more access not to restrict access. So we can say Org-default as most restrictive among all the record level securities. • A record creator can not be changed but the owner of the record can be changed. • A record can also be shared using the Apex Managed Sharing.
  • 14. Displaying Field Values and Page Layouts According to Profiles • We can use the different page layouts for different profiles. • For that, what we need is the record type. • The record type created will be assigned with a new page layout created. • Afterwards page layouts access can be assigned through the Profiles. • For field access the page layouts can further be modified.
  • 15. Exploring ViewAll/ ModifyAll • The ViewAll and ModifyAll from the Profile ignores all the sharing model , role hierarchies, sharing rules. • These provides access to all the records created by any type of user. • ModifyAll gives ability to mass transfer , mass update, mass delete records. • ModifyAll gives access to approvals also to Accept or Reject.
  • 16. Field Accessibility • The Sharing Controls of Salesforce provides a Field Accessibility which allows to view & modify the fields access from different aspects for a particular object. • View By Fields • View By Profiles • View By Record types
  • 17. Delegating Data Administration • There are two ways to quickly delegate restricted data administration access: • Object-Level Permissions • Provides the all Object level access to other user which can then act as a delegated administrator. • Delegated Administration Group. • Creating a new non-admin i.e. delegated administration group with limited admin privileges which are rather than object settings. Like creating new user, modify user , reset passwords, access to selected objected provided by primary admin.
  • 18. Accessing Records in Apex • While accessing the records or information of an custom object using SOQL queries will give you all the records access even if the user accessing it is not having the access to those records. • So at these conditions use the following type of syntax to classes to restrict the access as per the sharing rules Public with sharing class MyClassname{ }