- Describe how security is structured in Salesforce.com.
- Explain how to determine what security permissions are required in order to complete an action in Salesforce.com.
- Describe profiles and their influence on security.
- Describe the significance of the Enable Enhanced Profile User Interface setting.
- List and describe the standard Salesforce profiles.
- Explain when to create a custom profile in Salesforce.com.
- Describe permission sets, and common use cases where they are appropriate.
- Describe the settings an administrator controls to conditionally allow or prevent user authentication.
- Describe how Organization-Wide Defaults (OWDs) influence security.
- Describe how the sharing button can be used to monitor record access and facilitate manual record sharing in Salesforce.com.
- Describe the significance of a user’s role and Grant Access Using Hierarchies on record security.
- Given a scenario, determine how to properly structure the role hierarchy.
- Describe the impact of role configuration on accessing records related to an account (contacts, cases, opportunities).
- Describe sharing rules, and when their usage is appropriate.
- Describe the different types of groups available in Salesforce and when their use is appropriate.
- Describe when to select Grant Access Using Hierarchies when configuring a public group.
- Describe a queue’s influence on security.
- Describe how access to list views, documents, email templates, and similar information is secured in Salesforce.com.
- Describe the permissions required to transfer (change ownership) a record in Salesforce.com.
- Describe delegated administration, and when its usage would be appropriate.
- Describe the significance of the View All and Modify All permissions in Salesforce.com.
- Security – Module Checkpoint
Salesforce.com Security Configuration Matrix
Article
Should
Short
CertifiedOnDemand.com
This matrix should serve as a starting point for tracking down security-related issues, although it is not an all-inclusive list by any means.
Organization | Objects | Fields | Records | |
---|---|---|---|---|
Profile | Login Hours Login IP Ranges API Enabled | Create Read Edit Delete | Read Edit | View All Data View All (Per Object) Modify All Data Modify All (Per Object) |
Permission Set | API Enabled | Create Read Edit Delete | Read Edit | View All Data View All (Per Object) Modify All Data Modify All (Per Object) |
Role | (No Impact) | (No Impact) | (No Impact) | Sharing Rules Role Hierarchy Inheritance |
Group Membership | (No Impact) | (No Impact) | (No Impact) | Sharing Rules |
Org-Wide Defaults | (No Impact) | (No Impact) | (No Impact) | Default Access per Object |
Objectives for this Resource:
Thank you for taking the time to complete this module. Please review these final resources. We welcome your feedback on anything that can be done to improve this content.