With the powerful Salesforce sharing features, you can support collaboration within your organization while keeping sensitive information secure. And while you must always balance collaboration with security, there are situations in which you might need to make absolutely sure that record access is limited to a very small number of people, regardless of their position within the corporate hierarchy. In this post, you’ll learn about the sharing features and strategies you can use to do just that.
Tag Archives: Security
Learn how Salesforce Identity features fit together to provide coordinated user authorization management and access to third party apps. Start using My Domain, connected apps, and the App Launcher together for a streamlined user experience. And, find out more about other features like Identity Connect for Active Directory user synchronization, custom login pages, two-factor authentication, mobile apps, and reporting.
Record ownership is at the core of Salesforce’s record access capabilities, which allow you to specify which users or types of users should be able to access specific records or types of records. Salesforce.com’s architects and developers have spent years creating a highly functional and massively scalable record access infrastructure around record ownership, saving you the monumental effort of building that infrastructure yourself.
In this post, you’ll learn how those years of heavy lifting have actually simplified record access for the most common enterprise security models, allowing you to configure record access declaratively instead of with painstakingly developed code. You’ll also get an “under the hood” view of record access, and learn how to implement your record access model and avoid potential pitfalls along the way.
It’s important that you are confident that your cloud provider has the world-class security and privacy solutions to adequately protect your data. So what does it take to trust a cloud? Read on to learn why you should trust salesforce.com cloud solutions with your assets.
Since the Code Consultations at Dreamforce ’12 were jam packed, I have decided to make the Code Consultations part of the Developer Zone at Cloudforce NY on October 19. The consultation will provide you help architecting or coding your application, as well as get technical help with building applications in the cloud. Reserve you private 1-on-1 code [...]
The Security Workbook is a hands-on guide to the Salesforce platform’s least-privilege, user-centric security model. It explains the various policies, rules, and grouping mechanisms that control login and access controls.
Permission sets make salesforce.com admin’s lives easier by assigning permissions to users with more granularity than what a profile already provides. Using SOQL enables admins to view those permission assignments across their user’s profile and permission sets.
Thanks to the updated Developer Console and Schema Builder’s new ability to manipulate the data structure directly, I’ve been spending a lot more time in my browser to build out applications. There is one way Schema Builder currently behaves, however, that developers should be aware of when creating new objects and fields. Currently the builder [...]
I’ve been playing with using the Force.com Migration Tool with a TextMate bundle, ForceDotBundle for a bit now (and yes, a full blog post on that bundle is forthcoming). However, I had one concern with the approach. Every project I created needed a build.properties file, which in turn needed to have the username and password in [...]