Summary
The following diagram provides a useful summary of how security works in CRM Analytics:
As you have seen, you have a variety of options for implementing security in CRM Analytics. In this chapter, you learned about these security tools and how to deploy them.
What have you learned? First, you grasped the basics of security in CRMA. Next, you learned how to govern CRMA access permissions. Third, you learned how to use app-level security to control access to CRMA analytics app assets. Next, you became competent in configuring and enabling Salesforce sharing inheritance. Lastly, you learned how to build and deploy security predicates for more complex, detailed data governance use cases.
In the next chapter, you will learn to build your very first CRMA dashboard.