官术网_书友最值得收藏!

Secure Data Access

In each Salesforce organization, the administrator is the key holder: they are the guardian of the company's data and thus their main concern is protecting this valuable asset. The right object permissions shape data according to the kind of user who accesses it, while planning the right sharing strategy enables users to see only the subset of records they are authorized to read and/or write, thus delivering coherent and safe business processes.

In this chapter, we will learn about the following topics:

  • How data security is handled within the Salesforce platform
  • The difference between profiles and permission sets to define what users can do
  • Setting up record-level security to restrict/allow access to data depending on the user's shape
  • The Salesforce sharing model (from organization-wide default sharing to manual sharing), which determines which objects can be accessed by whom
  • Setting up Enterprise Territory Management for a territory-based record-sharing model
  • Handling sharing in Salesforce communities to give external users access to data
主站蜘蛛池模板: 泽州县| 习水县| 荣昌县| 巨野县| 新河县| 西充县| 新疆| 永顺县| 葫芦岛市| 昭觉县| 油尖旺区| 灯塔市| 康保县| 信丰县| 德惠市| 通河县| 二连浩特市| 梁平县| 耒阳市| 高州市| 十堰市| 桓台县| 普兰店市| 博湖县| 封丘县| 元氏县| 晋宁县| 永年县| 乡城县| 修文县| 莱阳市| 贡觉县| 临朐县| 德令哈市| 湘乡市| 桃园县| 砚山县| 宣恩县| 镶黄旗| 泗水县| 朝阳区|