Salesforce Security for Architects
A comprehensive guide to Salesforce security architecture — implicit sharing, roles vs territories, team sharing, data skew prevention, guest user security, and standard object sharing limitations.
8 posts tagged with "security"
A comprehensive guide to Salesforce security architecture — implicit sharing, roles vs territories, team sharing, data skew prevention, guest user security, and standard object sharing limitations.
Enforcing security in Apex code — with/without/inherited sharing, object and field-level security, SOQL injection prevention, Apex managed sharing, and building security-aware applications.
A deep dive into Salesforce org security — session settings, password policies, event monitoring, transaction security, platform encryption, field audit trail, and more.
How to set up SSO, two-factor authentication, Okta integration, and Experience Cloud authentication in Salesforce.
How to distribute administrative responsibilities without granting full System Administrator access — setting up delegated administration for user management, custom object administration, and more.
Master Salesforce record access including OWD settings, role hierarchies, public groups, queues, sharing rules, sharing sets, restriction rules, and more. Learn the complete record access pyramid with hands-on examples and a practical project.
A comprehensive guide to Salesforce's permission model — profiles, permission sets, permission set groups, object and field permissions, system permissions, Apex class access, custom permissions, and when to use each.
A complete guide to managing users in Salesforce — creating users, assigning licenses, resetting passwords, verifying logins, proxy login, and understanding how license types shape user access.