SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Getting Started with Security 
Alex Sutherland 
Salesforce MVP | Philly Dev & Partner UG Leader 
Technical Architect at CRM Science 
@apexsutherland 
Maria Belli 
Salesforce MVP | CT Developer Group Leader 
Salesforce Technical Lead at CASE Partners 
@JustAGirlyGeek
Safe Harbor 
Safe harbor statement under the Private Securities Litigation Reform Act of 1995: 
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions 
proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements 
other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or 
other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or 
upgraded services or technology developments and customer contracts or use of our services. 
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products 
and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, 
breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we 
operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful 
customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential 
factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on 
Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor 
Information section of our Web site. 
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time 
or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no 
obligation and does not intend to update these forward-looking statements.
Overview 
Organization Access 
IP Ranges, Login Hours 
Object Access 
Profiles 
Field Access 
Field Level Security 
Organization-Wide Defaults 
Record Access 
Role Hierarchy 
Sharing Rules
Organization access 
By default, your active users can log in 
to your org from any location at any hour 
For increased security you can setup: 
• IP Ranges (Company Level) 
Users logging in outside the range are sent an activation code 
to the email address on their user record 
Setup > Security Controls > Network Access 
• IP Ranges (Profile Level) 
Users outside this range are denied access 
Setup > Manage Users > Profiles > Select Profile > Login IP Ranges 
• Login Hours 
Specify hours users can log into your org 
Setup > Manage Users > Profiles > Select Profile > Login Hours 
• Freeze User Accounts 
Setup > Manage Users > User | Select user > Click Freeze
Object access 
Profiles 
• Determine the objects users can access and 
permissions users have on an object record 
• Set whether fields are visible, required, 
editable, or read only 
• Controls Tab visibility 
• Controls App availability 
• Controls Object Permissions 
(Create, Read, Edit, Delete) 
• Setup > Manage Users > Profile 
Standard Profiles vs Custom Profiles 
• Standard profiles cannot be edited 
but can be cloned 
• Group, Contact Manager, and Professional 
Editions do not support Custom Profiles 
Standard User 
Create, Read, Edit, Delete 
on records they can access 
Read Only 
Only view records they 
can access 
System Administrator 
View all data 
Modify all data 
Solution Manager 
Standard User + 
manage published solutions 
Marketing User 
Standard User + 
import leads 
Contract Manager 
Standard User + 
manage contracts
Field access 
Page Layouts 
• Set whether fields are visible, required, editable, or read only 
Field-Level Security 
• Further restrict users' access to fields by setting whether those 
fields are visible, editable, or read only 
Permissions 
• Some user permissions override both page layouts and field-level 
security settings. (For example, users with the “Edit Read Only 
Fields” permission can always edit read-only fields regardless of 
any other settings) 
Universally required fields 
• A custom field can be made universally required, which overrides 
any less-restrictive settings on page layouts or field-level security
Organization-wide defaults 
Determine what access and permissions 
users have to records they don’t own 
Cannot grant more access to users than they 
have through their object permissions 
For most objects, organization-wide sharing 
settings can be set to Public Read/Write/ 
Transfer, Public Read/Write, Public Read 
Only, or Private 
Setup > Security Controls > Sharing Settings
Record access 
Role Hierarchy 
• Extends access to records when sharing settings 
are set to anything more restrictive than Public 
Read/Write 
• Cannot restrict record access to less than what is 
granted through the org-wide defaults 
• It is not necessary to create individual roles for 
each title at your company, rather you want to 
define a hierarchy of roles to control access of 
information entered by users in lower level roles 
• Setup > Manage Users > Roles
Sharing rules 
Allows users to see/edit data they 
don’t own in an otherwise private setup 
• For example, use sharing rules to extend sharing 
access to users in roles, public groups, or 
territories 
Owner or Criteria Based Sharing 
Can never be stricter than your 
organization-wide default settings
The conversation never ends! 
Join the Conversation! 
Over 1,000,000 members strong! 
Engage directly with 
Salesforce experts! 
Hear from our MVP’s, 
other customers and 
Salesforce resources! 
Access resources, webinars, 
people, all designed to help 
you achieve success! 
Join our Success 
Collaboration Groups on 
success.salesforce.com
Getting started with Salesforce security

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Sharing and security in Salesforce
Sharing and security in SalesforceSharing and security in Salesforce
Sharing and security in Salesforce
 
Sharing and setting in salesforce
Sharing and setting in salesforceSharing and setting in salesforce
Sharing and setting in salesforce
 
Record sharing model in salesforce
Record sharing model in salesforceRecord sharing model in salesforce
Record sharing model in salesforce
 
Understanding the Salesforce Architecture: How We Do the Magic We Do
Understanding the Salesforce Architecture: How We Do the Magic We DoUnderstanding the Salesforce Architecture: How We Do the Magic We Do
Understanding the Salesforce Architecture: How We Do the Magic We Do
 
Salesforce Integration
Salesforce IntegrationSalesforce Integration
Salesforce Integration
 
Salesforce Integration Pattern Overview
Salesforce Integration Pattern OverviewSalesforce Integration Pattern Overview
Salesforce Integration Pattern Overview
 
Salesforce Presentation
Salesforce PresentationSalesforce Presentation
Salesforce Presentation
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
 
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)Sales Cloud Lightning Migration Best Practices (May 12, 2017)
Sales Cloud Lightning Migration Best Practices (May 12, 2017)
 
Salesforce administrator training presentation slides
Salesforce administrator training presentation slides Salesforce administrator training presentation slides
Salesforce administrator training presentation slides
 
Salesforce complete overview
Salesforce complete overviewSalesforce complete overview
Salesforce complete overview
 
Admin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & PermissionsAdmin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & Permissions
 
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...
Introduction to Salesforce | Salesforce Tutorial for Beginners | Salesforce T...
 
SFDC User Setup
SFDC User SetupSFDC User Setup
SFDC User Setup
 
Salesforce data model
Salesforce data modelSalesforce data model
Salesforce data model
 
Supercharge your Salesforce Reports and Dashboards
Supercharge your Salesforce Reports and DashboardsSupercharge your Salesforce Reports and Dashboards
Supercharge your Salesforce Reports and Dashboards
 
Salesforce Streaming event - PushTopic and Generic Events
Salesforce Streaming event - PushTopic and Generic EventsSalesforce Streaming event - PushTopic and Generic Events
Salesforce Streaming event - PushTopic and Generic Events
 
Salesforce Community Cloud
Salesforce Community CloudSalesforce Community Cloud
Salesforce Community Cloud
 
Introducing the Salesforce platform
Introducing the Salesforce platformIntroducing the Salesforce platform
Introducing the Salesforce platform
 
Episode 20 - Trigger Frameworks in Salesforce
Episode 20 - Trigger Frameworks in SalesforceEpisode 20 - Trigger Frameworks in Salesforce
Episode 20 - Trigger Frameworks in Salesforce
 

Ähnlich wie Getting started with Salesforce security

To Share or Not to Share
To Share or Not to ShareTo Share or Not to Share
To Share or Not to Share
dreamforce2006
 
Salesforce1 data gov lunch toronto deck
Salesforce1 data gov lunch toronto deckSalesforce1 data gov lunch toronto deck
Salesforce1 data gov lunch toronto deck
Beth Fitzpatrick
 

Ähnlich wie Getting started with Salesforce security (20)

Top 5 User Problems Admins Solve by Colleen Burnsed & Meagan Diegalman
Top 5 User Problems Admins Solve by Colleen Burnsed & Meagan DiegalmanTop 5 User Problems Admins Solve by Colleen Burnsed & Meagan Diegalman
Top 5 User Problems Admins Solve by Colleen Burnsed & Meagan Diegalman
 
How to Become a Security-Minded Admin
How to Become a Security-Minded AdminHow to Become a Security-Minded Admin
How to Become a Security-Minded Admin
 
Webinar: Cut that Clutter! Maintain a Clean Org and Improve Productivity
Webinar: Cut that Clutter! Maintain a Clean Org and Improve ProductivityWebinar: Cut that Clutter! Maintain a Clean Org and Improve Productivity
Webinar: Cut that Clutter! Maintain a Clean Org and Improve Productivity
 
Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission Sets
 
To Share or Not to Share
To Share or Not to ShareTo Share or Not to Share
To Share or Not to Share
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
Df16 - Troubleshooting user access problems
Df16 - Troubleshooting user access problemsDf16 - Troubleshooting user access problems
Df16 - Troubleshooting user access problems
 
Effectively Managing User Permissions with a Governance Strategy by Justice S...
Effectively Managing User Permissions with a Governance Strategy by Justice S...Effectively Managing User Permissions with a Governance Strategy by Justice S...
Effectively Managing User Permissions with a Governance Strategy by Justice S...
 
SalesforceA Webinar
SalesforceA WebinarSalesforceA Webinar
SalesforceA Webinar
 
ISV Tech Talk: Environment Hub (Dreamforce 2015)
ISV Tech Talk: Environment Hub (Dreamforce 2015)ISV Tech Talk: Environment Hub (Dreamforce 2015)
ISV Tech Talk: Environment Hub (Dreamforce 2015)
 
Essential Habits for Salesforce Admins: Security
Essential Habits for Salesforce Admins: SecurityEssential Habits for Salesforce Admins: Security
Essential Habits for Salesforce Admins: Security
 
Integrating Active Directory with Salesforce
Integrating Active Directory with SalesforceIntegrating Active Directory with Salesforce
Integrating Active Directory with Salesforce
 
Keys Things to Consider When Implementing Partner Communities
Keys Things to Consider When Implementing Partner CommunitiesKeys Things to Consider When Implementing Partner Communities
Keys Things to Consider When Implementing Partner Communities
 
Salesforce1 data gov lunch toronto deck
Salesforce1 data gov lunch toronto deckSalesforce1 data gov lunch toronto deck
Salesforce1 data gov lunch toronto deck
 
Introduction to Force.com
Introduction to Force.comIntroduction to Force.com
Introduction to Force.com
 
2023-05 Stockholm Admin Community Group - Summer '23.pptx
2023-05 Stockholm Admin Community Group - Summer '23.pptx2023-05 Stockholm Admin Community Group - Summer '23.pptx
2023-05 Stockholm Admin Community Group - Summer '23.pptx
 
Df14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for distDf14 Maintaining your orgs setup for optimal efficiency for dist
Df14 Maintaining your orgs setup for optimal efficiency for dist
 
Configuration in Disguise
Configuration in DisguiseConfiguration in Disguise
Configuration in Disguise
 
Key Things to Consider When Implementing Partner Communities - Viet Nguyen & ...
Key Things to Consider When Implementing Partner Communities - Viet Nguyen & ...Key Things to Consider When Implementing Partner Communities - Viet Nguyen & ...
Key Things to Consider When Implementing Partner Communities - Viet Nguyen & ...
 

Mehr von Salesforce Admins

Mehr von Salesforce Admins (20)

Admin Best Practices: Dashboards for Every Admin
Admin Best Practices: Dashboards for Every AdminAdmin Best Practices: Dashboards for Every Admin
Admin Best Practices: Dashboards for Every Admin
 
Admin Best Practices: Building Useful Formulas
Admin Best Practices: Building Useful FormulasAdmin Best Practices: Building Useful Formulas
Admin Best Practices: Building Useful Formulas
 
Admin Best Practices: 3 Steps to Seamless Deployments
Admin Best Practices: 3 Steps to Seamless DeploymentsAdmin Best Practices: 3 Steps to Seamless Deployments
Admin Best Practices: 3 Steps to Seamless Deployments
 
Awesome Admins Automate: Integrate Flow with AI and Chatbots
Awesome Admins Automate: Integrate Flow with AI and ChatbotsAwesome Admins Automate: Integrate Flow with AI and Chatbots
Awesome Admins Automate: Integrate Flow with AI and Chatbots
 
#AwesomeAdmins Automate: Create Triggered Flows and Batch Jobs
#AwesomeAdmins Automate:  Create Triggered Flows and Batch Jobs#AwesomeAdmins Automate:  Create Triggered Flows and Batch Jobs
#AwesomeAdmins Automate: Create Triggered Flows and Batch Jobs
 
Admin Best Practices: Introducing Einstein Recommendation Builder
Admin Best Practices: Introducing Einstein Recommendation BuilderAdmin Best Practices: Introducing Einstein Recommendation Builder
Admin Best Practices: Introducing Einstein Recommendation Builder
 
Admin Best Practices: Remove Security Risk From Your Org with a User Audit
Admin Best Practices: Remove Security Risk From Your Org with a User AuditAdmin Best Practices: Remove Security Risk From Your Org with a User Audit
Admin Best Practices: Remove Security Risk From Your Org with a User Audit
 
Essential Habits for New Admins
Essential Habits for New AdminsEssential Habits for New Admins
Essential Habits for New Admins
 
Essential Habits for Salesforce Admins: Actionable Analytics
Essential Habits for Salesforce Admins: Actionable AnalyticsEssential Habits for Salesforce Admins: Actionable Analytics
Essential Habits for Salesforce Admins: Actionable Analytics
 
Essential Habits for Salesforce Admins: Data Management
Essential Habits for Salesforce Admins: Data ManagementEssential Habits for Salesforce Admins: Data Management
Essential Habits for Salesforce Admins: Data Management
 
Essential Habits for Salesforce Admins: User Management
Essential Habits for Salesforce Admins: User ManagementEssential Habits for Salesforce Admins: User Management
Essential Habits for Salesforce Admins: User Management
 
Admin Best Practices: Explore the Power of Data with Tableau
Admin Best Practices: Explore the Power of Data with TableauAdmin Best Practices: Explore the Power of Data with Tableau
Admin Best Practices: Explore the Power of Data with Tableau
 
Essential Habits for New Admins
Essential Habits for New AdminsEssential Habits for New Admins
Essential Habits for New Admins
 
Admin trailhead Live: Leverage Einstein Search to Increase Productivity
Admin trailhead Live: Leverage Einstein Search to Increase ProductivityAdmin trailhead Live: Leverage Einstein Search to Increase Productivity
Admin trailhead Live: Leverage Einstein Search to Increase Productivity
 
Admin Best Practices: Reports & Dashboards
Admin Best Practices: Reports & DashboardsAdmin Best Practices: Reports & Dashboards
Admin Best Practices: Reports & Dashboards
 
Trailhead Live: Essential Habits & Core Admin Responsibilities
Trailhead Live: Essential Habits & Core Admin ResponsibilitiesTrailhead Live: Essential Habits & Core Admin Responsibilities
Trailhead Live: Essential Habits & Core Admin Responsibilities
 
Build AI-Powered Predictions with Einstein Prediction Builder
Build AI-Powered Predictions with Einstein Prediction BuilderBuild AI-Powered Predictions with Einstein Prediction Builder
Build AI-Powered Predictions with Einstein Prediction Builder
 
Trailhead Live: Build an Awesome Team of Admins
Trailhead Live: Build an Awesome Team of AdminsTrailhead Live: Build an Awesome Team of Admins
Trailhead Live: Build an Awesome Team of Admins
 
Semper Salesforce: Become a Salesforce Military Champion
Semper Salesforce: Become a Salesforce Military ChampionSemper Salesforce: Become a Salesforce Military Champion
Semper Salesforce: Become a Salesforce Military Champion
 
Best Practices and Tools for Backing Up Salesforce Data
Best Practices and Tools for Backing Up Salesforce DataBest Practices and Tools for Backing Up Salesforce Data
Best Practices and Tools for Backing Up Salesforce Data
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Getting started with Salesforce security

  • 1. Getting Started with Security Alex Sutherland Salesforce MVP | Philly Dev & Partner UG Leader Technical Architect at CRM Science @apexsutherland Maria Belli Salesforce MVP | CT Developer Group Leader Salesforce Technical Lead at CASE Partners @JustAGirlyGeek
  • 2. Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 3. Overview Organization Access IP Ranges, Login Hours Object Access Profiles Field Access Field Level Security Organization-Wide Defaults Record Access Role Hierarchy Sharing Rules
  • 4. Organization access By default, your active users can log in to your org from any location at any hour For increased security you can setup: • IP Ranges (Company Level) Users logging in outside the range are sent an activation code to the email address on their user record Setup > Security Controls > Network Access • IP Ranges (Profile Level) Users outside this range are denied access Setup > Manage Users > Profiles > Select Profile > Login IP Ranges • Login Hours Specify hours users can log into your org Setup > Manage Users > Profiles > Select Profile > Login Hours • Freeze User Accounts Setup > Manage Users > User | Select user > Click Freeze
  • 5. Object access Profiles • Determine the objects users can access and permissions users have on an object record • Set whether fields are visible, required, editable, or read only • Controls Tab visibility • Controls App availability • Controls Object Permissions (Create, Read, Edit, Delete) • Setup > Manage Users > Profile Standard Profiles vs Custom Profiles • Standard profiles cannot be edited but can be cloned • Group, Contact Manager, and Professional Editions do not support Custom Profiles Standard User Create, Read, Edit, Delete on records they can access Read Only Only view records they can access System Administrator View all data Modify all data Solution Manager Standard User + manage published solutions Marketing User Standard User + import leads Contract Manager Standard User + manage contracts
  • 6. Field access Page Layouts • Set whether fields are visible, required, editable, or read only Field-Level Security • Further restrict users' access to fields by setting whether those fields are visible, editable, or read only Permissions • Some user permissions override both page layouts and field-level security settings. (For example, users with the “Edit Read Only Fields” permission can always edit read-only fields regardless of any other settings) Universally required fields • A custom field can be made universally required, which overrides any less-restrictive settings on page layouts or field-level security
  • 7. Organization-wide defaults Determine what access and permissions users have to records they don’t own Cannot grant more access to users than they have through their object permissions For most objects, organization-wide sharing settings can be set to Public Read/Write/ Transfer, Public Read/Write, Public Read Only, or Private Setup > Security Controls > Sharing Settings
  • 8. Record access Role Hierarchy • Extends access to records when sharing settings are set to anything more restrictive than Public Read/Write • Cannot restrict record access to less than what is granted through the org-wide defaults • It is not necessary to create individual roles for each title at your company, rather you want to define a hierarchy of roles to control access of information entered by users in lower level roles • Setup > Manage Users > Roles
  • 9. Sharing rules Allows users to see/edit data they don’t own in an otherwise private setup • For example, use sharing rules to extend sharing access to users in roles, public groups, or territories Owner or Criteria Based Sharing Can never be stricter than your organization-wide default settings
  • 10. The conversation never ends! Join the Conversation! Over 1,000,000 members strong! Engage directly with Salesforce experts! Hear from our MVP’s, other customers and Salesforce resources! Access resources, webinars, people, all designed to help you achieve success! Join our Success Collaboration Groups on success.salesforce.com