- Explain the importance of Salesforce user records.
- Explain the difference between deactivating and freezing a user record.
- Explain how a user can become locked and unlocked.
- Explain the concept of record ownership.
- Describe the capabilities of queues.
- Describe which objects support queues.
- Explain the difference between user and feature licenses.
- Explain how licensing influences what actions a user can perform.
- Explain the implications of user localization settings.
- Describe the translation capabilities of Salesforce.
- Describe the different methods that can be used to authenticate to Salesforce.
- Describe identity verification, and under what conditions it occurs.
- Describe how to monitor and remove activations.
- Describe the security token, and under what conditions it is required.
- Describe the steps required to login as another user.
- Describe a session, and what settings influence sessions.
- Describe how to monitor and remove sessions.
- User Setup – Module Checkpoint
Reset Your Security Token
Documentation Could Short Salesforce.com
Objectives for this Resource:
A user must append their security token to their password when authenticating via the API, unless they are connecting within a Trusted IP range.
“When you access Salesforce from an IP address that’s outside your company’s trusted IP range using a desktop client or the API, you need a security token to log in.”