Salesforce security model
Salesforce security model
Introduction
Salesforce provides a robust security model that ensures data integrity, privacy, and access control
at various levels. Administrators play a key role in managing security configurations to align with
business requirements.
2. Profiles & Permission Sets: Define user permissions for objects and fields.
3. Role Hierarchies: Grant record access based on a user's position in the hierarchy.
Private: Only record owners and those granted access can view/edit records.
Public Read Only: All users can view records, but only owners can edit.
Permission Sets: Extend additional permissions to users without changing their profile.
Role Hierarchy
Sharing Rules
Controls which users can see or edit specific fields within an object.
Determines whether users can create, read, edit, or delete records of an object.
Record-Level Security
Manual Sharing: Users manually share records with specific users or groups.
Admin Basics
4. Workflow & Automation: Use Process Builder, Flow, and Workflow Rules to automate
tasks.
5. App & Object Customization: Modify page layouts, fields, and record types to match
business needs.
Best Practices
Conclusion
Salesforce security is multi-layered, ensuring that data is accessible only to authorized users. By
leveraging profiles, roles, OWD, sharing rules, and field-level security, administrators can
effectively control data access and maintain security compliance.