官术网_书友最值得收藏!

Secure Data Access

In each Salesforce organization, the administrator is the key holder: they are the guardian of the company's data and thus their main concern is protecting this valuable asset. The right object permissions shape data according to the kind of user who accesses it, while planning the right sharing strategy enables users to see only the subset of records they are authorized to read and/or write, thus delivering coherent and safe business processes.

In this chapter, we will learn about the following topics:

  • How data security is handled within the Salesforce platform
  • The difference between profiles and permission sets to define what users can do
  • Setting up record-level security to restrict/allow access to data depending on the user's shape
  • The Salesforce sharing model (from organization-wide default sharing to manual sharing), which determines which objects can be accessed by whom
  • Setting up Enterprise Territory Management for a territory-based record-sharing model
  • Handling sharing in Salesforce communities to give external users access to data
主站蜘蛛池模板: 育儿| 屏东县| 丽水市| 阿瓦提县| 犍为县| 山阴县| 西乌珠穆沁旗| 白城市| 聊城市| 玉田县| 罗甸县| 甘孜| 柳江县| 临沭县| 洛南县| 封丘县| 宿州市| 桑植县| 藁城市| 泗阳县| 于田县| 晋城| 仁怀市| 西藏| 上蔡县| 罗平县| 沐川县| 锦屏县| 来凤县| 治县。| 临高县| 闻喜县| 左贡县| 扎鲁特旗| 会理县| 陕西省| 保康县| 二手房| 福海县| 耿马| 莱西市|