Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Salesforce CRM - The Definitive Admin Handbook - Fourth Edition

You're reading from  Salesforce CRM - The Definitive Admin Handbook - Fourth Edition

Product type Book
Published in Dec 2016
Publisher Packt
ISBN-13 9781786468963
Pages 644 pages
Edition 4th Edition
Languages
Concepts

Table of Contents (18) Chapters

Salesforce CRM - The Definitive Admin Handbook - Fourth Edition
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface
1. Setting up Salesforce CRM and the Company Profile 2. Managing Users and Controlling System Access 3. Configuring Objects and Apps 4. Securing Access to Data and Data Validation 5. Managing Data in Salesforce CRM 6. Generating Data Analytics with Reports and Dashboards 7. Implementing Business Processes in Salesforce CRM 8. Introducing Sales Cloud, Service Cloud, and the Collaborative Features of Salesforce CRM 9. Extending and Enhancing Salesforce CRM 10. Administrating the Mobile Features of Salesforce CRM 11. Studying for the Certified Administrator Exam

The data access security model


There are several flexible options for you to control how records are accessed within your organization.

In the previous chapter, we looked at the broadest way that you can control data by setting properties for the objects that a user can view, edit, and create through the configuration and assignment of profiles.

We also looked at the creation of fields and field-level security which is set at profile level and is applied to records at the database level. Returning to the diagram, we will now look at the security model shown at the top-right corner of the following diagram:

The data access security model is the lowest level of data access and security, and enables you to control access at record level using the following four features:

  • Organization-Wide Defaults (OWDs)

  • Role hierarchy

  • Sharing rules

  • Manual sharing

The following diagram shows how, with the addition of each extra feature shown, the scope of provided access to records widens:

We will now look at mechanisms...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}