0% found this document useful (0 votes)
13 views14 pages

UNIT-3-DATA SECURITY & User Management

The document discusses data security in Salesforce including organization level security, object level security, field level security, and record level security. It also discusses user management in Salesforce including creating and managing users as well as controlling access at the organization level through settings like password policies and IP restrictions.

Uploaded by

ayush.relyb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views14 pages

UNIT-3-DATA SECURITY & User Management

The document discusses data security in Salesforce including organization level security, object level security, field level security, and record level security. It also discusses user management in Salesforce including creating and managing users as well as controlling access at the organization level through settings like password policies and IP restrictions.

Uploaded by

ayush.relyb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

What Is Data Security in Salesforce?

“Data security in Salesforce deals with the security or sharing settings of data and visibility
between users across the organization.”

It means data security defines what a user can see and what operations a user can perform on
the platform.

The Salesforce platform provides a flexible, layered sharing model that makes it easy to
assign different data sets to different sets of users.

The Security and Sharing model can be configured entirely using the user interface yet it is
implemented at the API level which means any permissions specified for objects, records,
and fields apply even if a user query or update the data via API calls.

Salesforce Levels of Data Access


The data access on Salesforce is categorized in four levels, the following are:

1. Organization Level
In Organizational level security in Salesforce, you can keep a list of authorized users for your
entire organization, set password policies, and restrict logins to specific hours and locations.

2. Object Level
Object-level security provides the simplest way to control which users have different kinds of
access to each and every object. By setting permissions on a particular type of object, you can
prevent a group of users from creating, viewing, editing, or deleting any records of that
object. For example, one user can only read and create student records, and another user is
having read and edit access.

3. Field Level
Field Level Security restricts access to certain fields, even for objects a user already has
access. For example, you can make the salary field in a position object invisible to
interviewers but visible to hiring managers and recruiters.

4. Record Level
Record Level security lets users access some records but not others. It is used to control data
access with greater precision. Users can have access to view an object but can be restricted to
individual records.
For example, There are various students from different courses. so, we can set the particular
user (let’s say Mohan who is having Training Manager profile) can only see the records from
the particular course(let’s say Java)

Note: Always make a table for various types of users and the level of access to data that each
user has in your organization to implement a security and sharing model.

What You’ll Learn

What is User Management in Salesforce?

How to create a User in Salesforce?

When to Freeze and when to deactivate a user?

Control Access To The Organization


Access to an organization (Salesforce User Management) can be restricted by four means:

1. Allowing only authorized users to access Salesforce


2. Setting Password Policies
3. Restricting IP ranges for Users
4. Restricting Login Hours for Users

What Is User Management In Salesforce ?


A user is anyone who logs in to Salesforce. Users are employees in your organization. Every
user in Salesforce has a user account. The user account identifies the user, and the account
settings determine what features and records the user can access.

Each user account contains at least the following:

Usernames
It must be unique across all Salesforce organizations(instances).
User Licenses
It determines which features the user can access in Salesforce. For example, you can allow
users access to standard Salesforce features and Chatter with the standard Salesforce license.
But, if you want to grant a user to access only some features in Salesforce, you have a host of
licenses to choose from. For example, if you have to grant a user access to Chatter without
allowing them to see any data in Salesforce, you can give them a Chatter Free license.

Profiles
It determines what users can do in Salesforce. Profiles should be selected based on a user’s
job function.

Roles
It determines what additional access a user has in Salesforce based on where they are located
in the role hierarchy. These are optional but each user can have only one role assigned.

Alias
An alias is a short name to identify the user on list pages, reports, or other places where their
entire name doesn’t fit. By default, the alias is the first letter of the user’s first name and the
first four letters of their last name.

Example: a user with the name ‘Rohan Sharma’ will have the alias ‘Rshar’

User records in Salesforce can’t be deleted, they can only be deactivated or frozen.

Difference Between Deactivating And Freezing A User


Deactivate a User Freeze a User
Users cannot be deleted so A user cannot be deactivated
to stop the user from immediately when a user is selected in
logging in to the Salesforce a custom hierarchy field. So to prevent
organization administrators the user from login into the
need to deactivate them. organization while administrators
perform the steps to deactivate them,
they can simply freeze that user first.
Deactivating the user frees The license assigned to the user does
up the license assigned to not free by Freezing a user.
the user. So that now new
users can use that license to
access Salesforce platform
features.

What You’ll Learn

How to manage your Org's password?

What Is Managing Salesforce Password Policies?


Password policies in Salesforce are configured to ensure that the user’s
password is strong and secure. Managing Password Policies is important.

There are several settings to ensure this:


Password Policies

Set login and password policies, such as minimum password length, the
type of password complexity, and specifying the amount of time before all
user’s passwords expire.
User Password Expiration

Expire the passwords for all the users in your organization after a specific
duration, except for users with “Password Never Expires” permission.
User Password Resets

Reset a password for specific users.


Login Attempts And Lockout Periods

Specifies the number of attempts a user can make and if a user is locked
out due to too many failed login attempts, the administrator can unlock its
access.
How to restrict a user at Org Level and Profile through IP?

Restrict Login Access By IP Address (Control Access to


Organisation)
By default, Salesforce doesn’t restrict the location for login access.
However, for added security, administrators can restrict login access by IP.

Administrators can specify an IP address range for the entire organization


as well as for specific user profiles, but the behavior is very different for
each option.

If the login IP range is set at:


Organization Level
Users who log in outside the IP range(which is set) are shown a login
challenge. If they complete the challenge question, typically by entering an
activation code sent to their mobile device or email address, login access is
granted. This method does not restrict access, entirely, for users outside of
the IP range(which is set). Here the set IP range is called the “trusted” IP
range.
Profile Level
Users outside the permitted IP range(which is set) are always denied
access.

What You’ll Learn

How to protect an Object in Salesforce?

What is Profile Level Security?

Object Level Security In Salesforce


Salesforce Object Level Security provides the simplest way to control data
access. It prevents a user or group of users from creating, viewing, editing,
or deleting any records of an object by setting permissions on that object.

There are two ways of setting object permissions:

1. Profiles: It determines the objects a user can access and the permissions
a user has on any object record.

2. Permission Sets: It provides additional permissions and access settings


to users. In Permission Sets, we can only give additional permissions to
users but we can’t restrict the permissions which are already given to users
at their profile level and they can only be assigned to users, not to profiles.

About Profiles In Salesforce


A profile is a collection of settings and permissions that determine which
data and features in the platform users have access to.

It is like a template, it means whenever we want to create a new profile we


have to choose a profile that is already given by Salesforce and then we
can customize them according to our requirements.

We must have to choose a profile while creating a new profile so we don’t


have to set all the permissions and settings from the scratch.

Settings determine what users can see for example apps, tabs, fields, and
record types whereas Permission determines what users can do for
example create or edit records of a certain type, run reports, and customize
the app.
1. Profiles Control

 Object Permission

 Field Permission

 User Permission

 Tab Settings

 App Settings
 Apex class access

 Visualforce page access

 Page Layouts

 Record Types

 Login Hours

 Login IP Ranges
Profiles are typically defined by a user’s job function but anything that
makes sense in an organization can be created as a profile. The platform
includes a set of standard profiles. Each of the standard profiles includes a
default set of permissions for all of the standard objects available on the
platform.
2. Standard User

Standard User profile has Read, Edit, and Delete permissions to most
standard objects
3. Read Only

The Read-only users had permissions exactly similar to the standard user
but limited access to read-only.
4. Marketing User

Permissions of Standard User + Additional Permissions.


5. Contract Manager

Permissions of Standard User + Additional Permissions.


6. Solution Manager

Permissions of Standard User + Additional Permissions.


7. System Administrator

The System Administrator profile has the widest access to data and the
greatest ability to configure and customize Salesforce. The System
Administrator profile also includes two special permissions namely “View
All Data” and “Modify All Data”.
When a custom object is created most profiles except those with modify
all data permission do not give access to that custom object.
Note:

1. Object permissions on the Standard profile cannot be edited.

 So to overcome this, it is good to make a new profile by copying/cloning standard profiles and then

customize the copies to fit the needs of the organization.

 The profile functionality in an organization depends on the user license type.


2. Every profile should have at least one visible app.

3. If an app is visible, its tab won’t show up unless a profile has


permission to view the associated objects.

4. A profile can be assigned to many users but the user can be assigned to
only one profile at a time.

What You’ll Learn

What is Field Level Security or FLS?

How to achieve Field level of Security?

What Is Field Level Security In Salesforce?


Field-level security in salesforce controls whether a user can see and edit the value for a
particular field on an object’s record, unlike page layouts which only control the visibility of
the field on detail and edit pages of an object. It secures the visibility of fields in any part of
the app including related lists, list views, reports, and search results.

It restricts a user to access the field anywhere in the org such as in the formula field, but if we
hide it from the page layout then the user can use the field value of that field. It will only be
hidden in the page layout.
Field-level security can be applied to multiple fields on a single profile or permission set and
can also be applied to a single field on all profiles.

Methods Used To Achieve Field-Level Security In Salesforce


1. Restrict Field Access with a Profile
Restrict a user’s general access to fields by providing Read Access and Edit Access.

2. Add Field Access with a Permission Set


A permission set is for expanding a user’s access to fields that are restricted in their profile.

Note

We can also set field-level security from field accessibility in Setup.

What You’ll Learn

What is Record Level Security?

Types of Implementing Salesforce Record-Level Security

What Is Salesforce Record Level Security ?


Record Level Security in Salesforce determines which individual records
in each object can be viewed and edited by users they have access to in
their profile.

The permission on a record is always evaluated according to a


combination of object, field, and record-level security permission. When
object-level permissions versus record-level permissions conflict, the most
restrictive settings win.

To implement it the administrator needs to answer the following questions:

 Should the users have open access to every record or a subset?

 If it’s a subset then what rules should determine whether the user can access them?
Types of Implementing Salesforce Record-Level Security
Salesforce provides 4 ways to implement record-level sharing:
1. Org-wide defaults specify the default(base) level of access users have to each other’s

records.

2. Role hierarchies ensure managers have access to their subordinates’ records. Each

role in the hierarchy represents a level of data access that a user or group of users

needs.

3. Sharing rules are automatic exceptions to org-wide defaults for particular groups of

users, to give them access to records they don’t own or can’t normally see.

4. Manual sharing lets record owners give read and edit permissions to users who might

not have access to the record because of OWD.

5. What You’ll Learn


6.

7. What is Organisation Wide Default?

8. Mechanism of OWD

9. How OWD works?

What Is Salesforce Organization-Wide Default?


“Salesforce Organization-Wide default or Organization-Wide sharing
settings determine the default or baseline level of access for all records of
an object. Organization-wide defaults can never grant users more access
than they have through their object permissions.”

Organization-Wide defaults should be most restrictive in record-level


security because other record-level security implementations only grant
additional accesses, they cannot restrict the access of records provided by
Organization-Wide defaults.

Access Level Of Organization Wide Defaults In Salesforce


Organization-Wide defaults can be set to any of the 3 below:
1. Public Read/Write

All users can view, edit, and report on all records.


2. Public Read-Only

All users can view and report on records but not edit them. Only the
owner, and users above that role in the hierarchy, can edit those records.
3. Private:

Only the record owner, and users above that role in the hierarchy, can
view, edit, and report on those records.

Mechanism of OWD
To determine the Organization-wide default of an object consider the
below diagram:
The data may be too restrictive for some users according to org-wide
defaults but it can be opened for users who need more access using role
hierarchies, sharing rules, and manual sharing. A sharing recalculation
starts applying access changes to records whenever an update is made for
Organization-Wide Default settings. An email is sent by Salesforce
whenever it gets completed or we can see the update on Setup Audit Trail.
Note

The owner of the record will always have all the permission(as per object
level) and it is not dependent on what the record level security is set for
that user.

Identity Basics
https://trailhead.salesforce.com/content/learn/modules/
identity_basics#:~:text=Secure%20your%20org%20so%20users,apps%2C
%20orgs%2C%20and%20services.

Automate Business Processes for a Recruiting App


https://trailhead.salesforce.com/content/learn/projects/automate-business-
processes-recruiting-app

You might also like