Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Salesforce CRM - The Definitive Admin Handbook

You're reading from   Salesforce CRM - The Definitive Admin Handbook A Deep-dive into the working of Salesforce CRM

Arrow left icon
Product type Paperback
Published in Dec 2016
Publisher Packt
ISBN-13 9781786468963
Length 644 pages
Edition 4th Edition
Concepts
Arrow right icon
Author (1):
Arrow left icon
Paul Goodey Paul Goodey
Author Profile Icon Paul Goodey
Paul Goodey
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Setting up Salesforce CRM and the Company Profile 2. Managing Users and Controlling System Access FREE CHAPTER 3. Configuring Objects and Apps 4. Securing Access to Data and Data Validation 5. Managing Data in Salesforce CRM 6. Generating Data Analytics with Reports and Dashboards 7. Implementing Business Processes in Salesforce CRM 8. Introducing Sales Cloud, Service Cloud, and the Collaborative Features of Salesforce CRM 9. Extending and Enhancing Salesforce CRM 10. Administrating the Mobile Features of Salesforce CRM 11. Studying for the Certified Administrator Exam

The data access security model

There are several flexible options for you to control how records are accessed within your organization.

In the previous chapter, we looked at the broadest way that you can control data by setting properties for the objects that a user can view, edit, and create through the configuration and assignment of profiles.

We also looked at the creation of fields and field-level security which is set at profile level and is applied to records at the database level. Returning to the diagram, we will now look at the security model shown at the top-right corner of the following diagram:

The data access security model

The data access security model is the lowest level of data access and security, and enables you to control access at record level using the following four features:

  • Organization-Wide Defaults (OWDs)
  • Role hierarchy
  • Sharing rules
  • Manual sharing

The following diagram shows how, with the addition of each extra feature shown, the scope of provided access to records widens:

The data access security model

We will now look at mechanisms...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image