SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
Salesforce Security:
Fully Automated
Daniel McGaughey, Developer
Cristy Spino, IT Service Owner
Enterprise CRM
University of Pittsburgh
University of Pittsburgh
Just a little information about Pitt
Getting Started with Salesforce
NOV 2015 – JAN 2016
• ERM selection committee
• Project team conducted 25 critical requirements sessions on 4 campuses
• Met with over 200 staff
• Identified 136 unique requirements for an Enterprise CRM
FEB 2016 – JUL 2016
• RFI sent to 15 vendors, 7 submitted responses
• RFP included 2 vendors
• Completed reference checks
• Conducted onsite product demos
Office of the Chancellor initiative
Getting Started with Salesforce
AUG 2016 – DEC 2016
• Salesforce Recommendation
• Roadmap, Planning
• Recruiting and Service Discovery
• Project and budget approval
JAN 2017 – FEB 2018
• Build the team
• Select implementation partner
• Go Live with 2 Applications (Recruiting and Service Desk)
• Roadmap 20+ new projects
• Support / maintain projects
Office of the Chancellor initiative
Salesforce Environment
Current Environment
• 5 Enterprise CRM team members in central IT
• 1,500 Salesforce licenses
• ~440 current users
Applications
• Service Cloud
• Marketing Cloud
• Knowledge
• Visit Days for Recruiting Events
• Conga
• Task Ray
University of Pittsburgh
“How can we maintain security for
1,500 users and support our
applications with 5 team members?
What can we automate?
Lots of users, Lots of requests, 1 small but powerful team
Team Users Roadmap
• 1 instance
• Support 2 active
application in Production
• Kick off 3 new projects
• Recruiting for Regional
Campuses
• Advancement
• Economic Partnership
• Manage 20+ new
application requests
Director
Admin Admin Developer
IT Service
owner
Security and Provisioning
Business Cases
PHASE 1
To enhance security, prepare for enterprise and better utilize our Salesforce Administrators time
• During authentication auto assign and enforce security by utilizing Active Directory group
membership validate access and system privileges
• An audit log is updated when a user is created and when a user or their permissions are changed
PHASE 2
Fully automate access requests and license management
• Salesforce Service Request to request elevated access with workflow for approval and automatic AD group
management
• Automate license recovery for inactive users
• Annual security audit process
Two Phases
High Level Requirements
JIT:
• Users must log in using Pitt
Passport – the university’s SSO
solution
• Users are provisioned every
time they log in to the system
• System times out and logs out
with inactivity, forces user to log
in again
• If the user has not logged in for
an extended period (3 months)
of time the license is revoked
Security Request
• Security form creates a Security
Request Case
Security Request Form
• Form will default fields related
to the submitters or on behalf of
contact record
• Ability to request to add or
remove privileges
• Two levels of approval is
required, manager and security,
unless the manager is
submitting on behalf of a direct
report
• Request for restricted data
requires a third level of
approval from the data steward
Security Case Approver
• Case is created and routed
through the approval process
• Approvers have two options,
approve or reject. If reject they
must enter a comment
• Approvers are notified when a
security case requires attention.
Notifications are sequential,
manager, then security, then
the data steward
AD Group Update
• Once approval is received, the
user credentials are added to
the appropriate AD group
Just in Time Provisioning / Security Request
Just in Time (JIT)
Just in Time
JIT Steps
Step 1
• The program uses the AD Group membership
provided by the Shibboleth response and creates
the permissions that should be assigned to a
person when they are logging in
Step 2
• The program compares the calculated
assignments to the ones that are currently active
on the User record
• If no updates are needed, process ends
• If new or the removal of privileges are needed
proceed to step three
Step 3
• The program creates or updates the user record.
It removes all of the current permissions listed and
replaces with the new ones calculated in step two
Step 4
• The Security audit log is updated with the actions
taken
Current Automation
User Creation / Update
License Assignment
Active / Inactive
Profile
Name
Email Address
User Access Checkboxes
Marketing User
Knowledge User
Service Cloud User
Live Agent User
Membership
Public Groups
Queues
Permission Sets
All of these items are automated – saving significant manual effort:
Setup Screens
AD Group definition
Setup Screens
Items Associated with AD Group
Questions?
Salesforce Security: Fully Automated

Weitere ähnliche Inhalte

Was ist angesagt?

Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)Yury Bondarau
 
Sharing and security in Salesforce
Sharing and security in SalesforceSharing and security in Salesforce
Sharing and security in SalesforceSaurabh Kulkarni
 
Salesforce admin training 5
Salesforce admin training 5Salesforce admin training 5
Salesforce admin training 5HungPham381
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14Paris Salesforce Developer Group
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Paris Salesforce Developer Group
 
Single Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce IdentitySingle Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce IdentitySalesforce Developers
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksRyan Flood
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts WSO2
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trainings
 
Salesforce admin training 2
Salesforce admin training 2Salesforce admin training 2
Salesforce admin training 2HungPham381
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudSalesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudDreamforce
 
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...Perficient, Inc.
 
Using Custom Permissions to Simplify Security
Using Custom Permissions to Simplify SecurityUsing Custom Permissions to Simplify Security
Using Custom Permissions to Simplify SecurityDaniel Peter
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Universal digital - Vedran's slides for mock review board
Universal digital - Vedran's slides for mock review boardUniversal digital - Vedran's slides for mock review board
Universal digital - Vedran's slides for mock review boardgemziebeth
 

Was ist angesagt? (20)

Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
 
Sharing and security in Salesforce
Sharing and security in SalesforceSharing and security in Salesforce
Sharing and security in Salesforce
 
Salesforce admin training 5
Salesforce admin training 5Salesforce admin training 5
Salesforce admin training 5
 
Sensibilisation à la Sécurité Salesforce
Sensibilisation à la Sécurité SalesforceSensibilisation à la Sécurité Salesforce
Sensibilisation à la Sécurité Salesforce
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Introducing Salesforce Identity
Introducing Salesforce IdentityIntroducing Salesforce Identity
Introducing Salesforce Identity
 
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
 
Single Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce IdentitySingle Sign-On and User Provisioning with Salesforce Identity
Single Sign-On and User Provisioning with Salesforce Identity
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and Tricks
 
AM Side details
AM Side detailsAM Side details
AM Side details
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Salesforce admin training 2
Salesforce admin training 2Salesforce admin training 2
Salesforce admin training 2
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudSalesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
 
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...
 
Using Custom Permissions to Simplify Security
Using Custom Permissions to Simplify SecurityUsing Custom Permissions to Simplify Security
Using Custom Permissions to Simplify Security
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Universal digital - Vedran's slides for mock review board
Universal digital - Vedran's slides for mock review boardUniversal digital - Vedran's slides for mock review board
Universal digital - Vedran's slides for mock review board
 

Ähnlich wie Salesforce Security: Fully Automated

Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration PresentationJames Garrett
 
Iam update 2014.10.16
Iam update   2014.10.16Iam update   2014.10.16
Iam update 2014.10.16kevin_donovan
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaEnergySec
 
O365Con18 - Compliance Manager - Tomislav Lulic
O365Con18 - Compliance Manager - Tomislav LulicO365Con18 - Compliance Manager - Tomislav Lulic
O365Con18 - Compliance Manager - Tomislav LulicNCCOMMS
 
Practical tips for implementing corporate performance management system
Practical tips for implementing corporate performance management systemPractical tips for implementing corporate performance management system
Practical tips for implementing corporate performance management systemKetan Parekh
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
HR Software - Find Your Match
HR Software - Find Your MatchHR Software - Find Your Match
HR Software - Find Your MatchCascadeHR
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...Kaseya
 
Module 6 - Insider Risk.pptx
Module 6 - Insider Risk.pptxModule 6 - Insider Risk.pptx
Module 6 - Insider Risk.pptxErikHof4
 

Ähnlich wie Salesforce Security: Fully Automated (20)

Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration Presentation
 
Iam update 2014.10.16
Iam update   2014.10.16Iam update   2014.10.16
Iam update 2014.10.16
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six Sigma
 
Xite people management solution introduction
Xite people management solution introductionXite people management solution introduction
Xite people management solution introduction
 
O365Con18 - Compliance Manager - Tomislav Lulic
O365Con18 - Compliance Manager - Tomislav LulicO365Con18 - Compliance Manager - Tomislav Lulic
O365Con18 - Compliance Manager - Tomislav Lulic
 
Practical tips for implementing corporate performance management system
Practical tips for implementing corporate performance management systemPractical tips for implementing corporate performance management system
Practical tips for implementing corporate performance management system
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
 
SDLC
SDLCSDLC
SDLC
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
HR Software - Find Your Match
HR Software - Find Your MatchHR Software - Find Your Match
HR Software - Find Your Match
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Module 6 - Insider Risk.pptx
Module 6 - Insider Risk.pptxModule 6 - Insider Risk.pptx
Module 6 - Insider Risk.pptx
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
proposal presentation
proposal presentationproposal presentation
proposal presentation
 
Rajiv Resume (1) (1)
Rajiv Resume (1) (1)Rajiv Resume (1) (1)
Rajiv Resume (1) (1)
 
Rajiv Resume (1) (1)
Rajiv Resume (1) (1)Rajiv Resume (1) (1)
Rajiv Resume (1) (1)
 

Mehr von Salesforce.org

Introduction to the Higher Education Advisory Council 2020
Introduction to the Higher Education Advisory Council 2020Introduction to the Higher Education Advisory Council 2020
Introduction to the Higher Education Advisory Council 2020Salesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown UniversityAmelia at Georgetown University
Amelia at Georgetown UniversitySalesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University Salesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University Salesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University Salesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University Salesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University Salesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University Salesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University Salesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University Salesforce.org
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University Salesforce.org
 
Intro to the Higher Ed Advisory Council 2018-19
Intro to the Higher Ed Advisory Council 2018-19Intro to the Higher Ed Advisory Council 2018-19
Intro to the Higher Ed Advisory Council 2018-19Salesforce.org
 
Super Session- A Day in the Life of a Nonprofit Fundraiser
Super Session- A Day in the Life of a Nonprofit FundraiserSuper Session- A Day in the Life of a Nonprofit Fundraiser
Super Session- A Day in the Life of a Nonprofit FundraiserSalesforce.org
 
Df18 Fundraising Made Easy
Df18 Fundraising Made Easy Df18 Fundraising Made Easy
Df18 Fundraising Made Easy Salesforce.org
 
Making Moves Magic- A Moves Management 101 for Nonprofit Cloud
Making Moves Magic- A Moves Management 101 for Nonprofit Cloud Making Moves Magic- A Moves Management 101 for Nonprofit Cloud
Making Moves Magic- A Moves Management 101 for Nonprofit Cloud Salesforce.org
 
Living Large: Enterprise Organizations on Nonprofit Cloud
Living Large: Enterprise Organizations on Nonprofit CloudLiving Large: Enterprise Organizations on Nonprofit Cloud
Living Large: Enterprise Organizations on Nonprofit CloudSalesforce.org
 

Mehr von Salesforce.org (20)

Introduction to the Higher Education Advisory Council 2020
Introduction to the Higher Education Advisory Council 2020Introduction to the Higher Education Advisory Council 2020
Introduction to the Higher Education Advisory Council 2020
 
Amelia at Georgetown University
Amelia at Georgetown UniversityAmelia at Georgetown University
Amelia at Georgetown University
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University
 
Amelia at Georgetown University
Amelia at Georgetown University Amelia at Georgetown University
Amelia at Georgetown University
 
Warchild Holland
Warchild HollandWarchild Holland
Warchild Holland
 
Daniella Part 2
Daniella Part 2Daniella Part 2
Daniella Part 2
 
Daniella Part 1
Daniella Part 1Daniella Part 1
Daniella Part 1
 
Haifa at UOC
Haifa at UOCHaifa at UOC
Haifa at UOC
 
Intro to the Higher Ed Advisory Council 2018-19
Intro to the Higher Ed Advisory Council 2018-19Intro to the Higher Ed Advisory Council 2018-19
Intro to the Higher Ed Advisory Council 2018-19
 
Super Session- A Day in the Life of a Nonprofit Fundraiser
Super Session- A Day in the Life of a Nonprofit FundraiserSuper Session- A Day in the Life of a Nonprofit Fundraiser
Super Session- A Day in the Life of a Nonprofit Fundraiser
 
Df18 Fundraising Made Easy
Df18 Fundraising Made Easy Df18 Fundraising Made Easy
Df18 Fundraising Made Easy
 
Making Moves Magic- A Moves Management 101 for Nonprofit Cloud
Making Moves Magic- A Moves Management 101 for Nonprofit Cloud Making Moves Magic- A Moves Management 101 for Nonprofit Cloud
Making Moves Magic- A Moves Management 101 for Nonprofit Cloud
 
Living Large: Enterprise Organizations on Nonprofit Cloud
Living Large: Enterprise Organizations on Nonprofit CloudLiving Large: Enterprise Organizations on Nonprofit Cloud
Living Large: Enterprise Organizations on Nonprofit Cloud
 

Kürzlich hochgeladen

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Kürzlich hochgeladen (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

Salesforce Security: Fully Automated

  • 1. Salesforce Security: Fully Automated Daniel McGaughey, Developer Cristy Spino, IT Service Owner Enterprise CRM University of Pittsburgh
  • 2. University of Pittsburgh Just a little information about Pitt
  • 3. Getting Started with Salesforce NOV 2015 – JAN 2016 • ERM selection committee • Project team conducted 25 critical requirements sessions on 4 campuses • Met with over 200 staff • Identified 136 unique requirements for an Enterprise CRM FEB 2016 – JUL 2016 • RFI sent to 15 vendors, 7 submitted responses • RFP included 2 vendors • Completed reference checks • Conducted onsite product demos Office of the Chancellor initiative
  • 4. Getting Started with Salesforce AUG 2016 – DEC 2016 • Salesforce Recommendation • Roadmap, Planning • Recruiting and Service Discovery • Project and budget approval JAN 2017 – FEB 2018 • Build the team • Select implementation partner • Go Live with 2 Applications (Recruiting and Service Desk) • Roadmap 20+ new projects • Support / maintain projects Office of the Chancellor initiative
  • 5. Salesforce Environment Current Environment • 5 Enterprise CRM team members in central IT • 1,500 Salesforce licenses • ~440 current users Applications • Service Cloud • Marketing Cloud • Knowledge • Visit Days for Recruiting Events • Conga • Task Ray University of Pittsburgh
  • 6. “How can we maintain security for 1,500 users and support our applications with 5 team members? What can we automate?
  • 7. Lots of users, Lots of requests, 1 small but powerful team Team Users Roadmap • 1 instance • Support 2 active application in Production • Kick off 3 new projects • Recruiting for Regional Campuses • Advancement • Economic Partnership • Manage 20+ new application requests Director Admin Admin Developer IT Service owner
  • 9. Business Cases PHASE 1 To enhance security, prepare for enterprise and better utilize our Salesforce Administrators time • During authentication auto assign and enforce security by utilizing Active Directory group membership validate access and system privileges • An audit log is updated when a user is created and when a user or their permissions are changed PHASE 2 Fully automate access requests and license management • Salesforce Service Request to request elevated access with workflow for approval and automatic AD group management • Automate license recovery for inactive users • Annual security audit process Two Phases
  • 10. High Level Requirements JIT: • Users must log in using Pitt Passport – the university’s SSO solution • Users are provisioned every time they log in to the system • System times out and logs out with inactivity, forces user to log in again • If the user has not logged in for an extended period (3 months) of time the license is revoked Security Request • Security form creates a Security Request Case Security Request Form • Form will default fields related to the submitters or on behalf of contact record • Ability to request to add or remove privileges • Two levels of approval is required, manager and security, unless the manager is submitting on behalf of a direct report • Request for restricted data requires a third level of approval from the data steward Security Case Approver • Case is created and routed through the approval process • Approvers have two options, approve or reject. If reject they must enter a comment • Approvers are notified when a security case requires attention. Notifications are sequential, manager, then security, then the data steward AD Group Update • Once approval is received, the user credentials are added to the appropriate AD group Just in Time Provisioning / Security Request
  • 11. Just in Time (JIT)
  • 13. JIT Steps Step 1 • The program uses the AD Group membership provided by the Shibboleth response and creates the permissions that should be assigned to a person when they are logging in Step 2 • The program compares the calculated assignments to the ones that are currently active on the User record • If no updates are needed, process ends • If new or the removal of privileges are needed proceed to step three Step 3 • The program creates or updates the user record. It removes all of the current permissions listed and replaces with the new ones calculated in step two Step 4 • The Security audit log is updated with the actions taken
  • 14. Current Automation User Creation / Update License Assignment Active / Inactive Profile Name Email Address User Access Checkboxes Marketing User Knowledge User Service Cloud User Live Agent User Membership Public Groups Queues Permission Sets All of these items are automated – saving significant manual effort: