SlideShare a Scribd company logo
Setting up security
​ Naveen Gabrani Joseph Dindinger
​ CEO CEO
​ ngabrani@astreait.com TO A FINISH
​ @ngabrani
​ 
​ Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
​ This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties
materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed
or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-
looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any
statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new,
planned, or upgraded services or technology developments and customer contracts or use of our services.
​ The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new
functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our
operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any
litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our
relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our
service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger
enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our
annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter.
These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section
of our Web site.
​ Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available
and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features
that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Safe Harbor
Naveen Gabrani
CEO, Astrea IT Services Pvt Ltd
​ 
§  Security: Who has access to what records
§  What type of access: No access, View, Write, Delete
§  Scenarios
Importance of Security
Criteria Access Level Profile
Opportunity value > 1 Million Visible Sales persons
Account in California Editable Sales team in CA
Cases Visible All organization
§  Talk to senior users and management
§  What tasks different users need to perform
§  What all information needs to be kept secure
§  Classify your users into groups that perform similar operations
§  Map your objects to these user groups
§  What level of visibility is needed
Design of Security
Access is a many layered thing....
ORG
ACCESS
OBJECT
ACCESS
RECORD
ACCESS
FIELD
ACCESS
IP RANGES,LOGIN
HOURS
PROFILES
ROLE HIERARCHY
FIELD LEVEL
SECURITY
§  Profiles: Group of users that perform similar operations
§  Sales Team based in Boston
§  Customer Service Project Managers
§  Call center agents for European customers
§  Each user is mapped to a unique profile
Profiles
§  Minimum access needed for all the Salesforce users to an object
§  Possible Values
§  Private
§  Public Read Only
§  Public Read/Write
OWD: Organization Wide Default
Role Hierarchy
CEO
VP Sales
Sales Director
International
Sales Director
US
VP Projects
Project
Manager
A Manager has access to all records that are accessible to
its reportees
ü  “Grant Access Using Hierarchies”
Record owner and Salesforce Admin have access to all records
Master Detail relationship, child inherits OWD from parent
View All Data settings: access to all records
Each user is mapped to a unique role
Joseph Dindinger
CEO, To A Finish LLC
​ 
§  Control access to company data
§  Rules for sharing access to data
§  Accounts
§  Contacts
§  Widgets_c
§  Etc.
What ARE sharing rules?
Access to objects
Access to fields
Access to features
What sharing rules are NOT.
Private
Sharing Rules Starting Point
Public
​ 
§  Read Only
§  Read Write
§  Full Access
Different Types of Access
​ 
§  Transfer
§  Use
§  Public Read/Write
§  Public Read Only
§  Private
§  Controlled by Parent
§  Grant Access Using Hierarchies
Common Sharing Settings
Manual
Sharing
Sharing Settings Strategies
Rule-based
Sharing
Programmatic
Sharing
Sharing Rules Scenario
​ Cars X provides high-end cars for
executives around the world. Sales reps
at Cars X are given full access to all
accounts, but can only edit contacts that
belong to them. Opportunities are
strictly private; only the sales rep and his
or her management tree are allowed to
see them.
​ * Note: Some opportunities, those under
$10,000 should be seen by everyone.
​ We must set the
Accounts to:
​ Public Read/
Write (Default)
Step 1: Account Sharing Settings
We must set the
Contacts to:
Public Read Only
(change from Controlled
by Parent)
Step 2: Contact Sharing Settings
§  We must set the Opportunities to:
Private (Change from Public Read Only)
§  We must add a sharing rule to give read only access to sales reps
who share roles
Step 3a: Opportunity Sharing Settings
§  We must add a sharing
rule based on specific
criteria to give read only
access to any
opportunity below $10k
Step 3b: Opportunity Sharing Settings
Sharing Rules Demo
Sharing Settings Overview
§  Can be enabled or disabled per object
§  Can be confusing and only to be used in
cases where rules cannot be made to fit
§  Needs maintenance, especially if ownership
changes
Manual
Sharing
§  The most common solution for most
situations
§  Extremely powerful and customizable
§  Once set, can be forgotten until the rules of
business change
Rule-based
Sharing
§  If default settings don't work
§  If roles don't fit the bill
§  If rules can't be written
§  If manual sharing is too tedious and error
prone...
​ THEN you can use Apex programing to
share records correctly
Programmatic
Sharing
Programming Scenario
​ Cars X hires drivers in each state who will take a
car from the dealer and drive it to the buyer’s
house. These drivers are in the Cars X Partner
Community and should be able to edit only three
fields on Closed Opportunities in their assigned
states. The three fields they can edit are:
1.  Assigned Driver (a lookup to the User object)
2.  Target Delivery Date
3.  Date Delivered
​ * Note: Once the Assigned Driver field has been
saved, all other drivers should no longer be able
to see the opportunity.
Programming Sample Code
Sample 1: Trigger to Share Code
Sample 2: Trigger to Remove Share
Sample 3:
Trigger
Handler
Code to
do the
actual
Sharing
§  Think it through with all involved
§  Document thoroughly
§  “Bulkify” your code carefully and
thoroughly
§  Set up a log in case of failure
§  Use Asynchronous Code
(@Future or Batch)
Tips for Programming Sharing
Permission Sets & Profiles Overview
§  Which Objects and Fields you can see
(not which records)
§  Which Features/Functions you can use
Permission Sets & Profiles Determine
Permission Sets vs Profiles
​  Differences include :
§  The ability to set features across multiple
profiles
§  Ease of assigning to multiple users
Profiles,
Permission Sets & Sharing Rules
Data vs. MetaData
Permission Sets
& Profiles
Sharing
Rules
Our Last Scenario
Our last scenario could not have been
completed without sharing rules AND
permission sets/profiles
Thank you
Share Your Feedback, and Win a GoPro!
3
Earn a GoPro prize entry for
each completed survey
Tap the bell to take a
survey2Enroll in a session1

More Related Content

What's hot (20)

PPTX
Sharing and security in Salesforce
Saurabh Kulkarni
 
PPTX
Migrating To Lightning
Fabrice Cathala
 
PPT
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Yury Bondarau
 
PDF
Replicate Salesforce Data in Real Time with Change Data Capture
Salesforce Developers
 
PPTX
Salesforce Integration Patterns
usolutions
 
PPTX
Salesforce integration best practices columbus meetup
MuleSoft Meetup
 
PPTX
Reports and dashboards @salesforce
Kapil Kumar Patle
 
PPT
Salesforce Integration
Joshua Hoskins
 
PDF
Automate All The Things with Flow
Salesforce Admins
 
PPTX
Integration using Salesforce Canvas
Dhanik Sahni
 
PPTX
Salesforce Service Cloud automatons
RAMNARAYAN R
 
PDF
Managing the Role Hierarchy at Enterprise Scale
Salesforce Developers
 
PPTX
Why Flow with Salesforce Flow
Algoworks Inc
 
PPTX
Sharing and setting in salesforce
Vishesh Singhal
 
PPTX
Introducing the Salesforce platform
John Stevenson
 
PPTX
An introduction to Salesforce
valuebound
 
PPTX
Secure Coding: Field-level Security, CRUD, and Sharing
Salesforce Developers
 
PPTX
Record sharing model in salesforce
Sunil kumar
 
PPTX
Salesforce Service Cloud - An overview
Ajay Balakrishnan
 
PPTX
Data model in salesforce
Chamil Madusanka
 
Sharing and security in Salesforce
Saurabh Kulkarni
 
Migrating To Lightning
Fabrice Cathala
 
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Yury Bondarau
 
Replicate Salesforce Data in Real Time with Change Data Capture
Salesforce Developers
 
Salesforce Integration Patterns
usolutions
 
Salesforce integration best practices columbus meetup
MuleSoft Meetup
 
Reports and dashboards @salesforce
Kapil Kumar Patle
 
Salesforce Integration
Joshua Hoskins
 
Automate All The Things with Flow
Salesforce Admins
 
Integration using Salesforce Canvas
Dhanik Sahni
 
Salesforce Service Cloud automatons
RAMNARAYAN R
 
Managing the Role Hierarchy at Enterprise Scale
Salesforce Developers
 
Why Flow with Salesforce Flow
Algoworks Inc
 
Sharing and setting in salesforce
Vishesh Singhal
 
Introducing the Salesforce platform
John Stevenson
 
An introduction to Salesforce
valuebound
 
Secure Coding: Field-level Security, CRUD, and Sharing
Salesforce Developers
 
Record sharing model in salesforce
Sunil kumar
 
Salesforce Service Cloud - An overview
Ajay Balakrishnan
 
Data model in salesforce
Chamil Madusanka
 

Similar to Setting up Security in Your Salesforce Instance (20)

PPTX
Top 5 User Problems Admins Solve by Colleen Burnsed & Meagan Diegalman
Salesforce Admins
 
PDF
How to be a SalesFIERCE Admin - Jared Miller & Davina Hanchuck
Salesforce Admins
 
PPTX
How to be a SalesFIERCE Salesforce Admin
Jared Miller
 
PDF
Salesforce Sharing and Security overview for new admins and devs
SayedMossad1
 
PPT
To Share or Not to Share
dreamforce2006
 
PPTX
Security Boundaries in Apex
Salesforce Developers
 
PDF
Moving Sharing to a Parallel Architecture
Salesforce Developers
 
PPT
Ags001 Wilhoit 091707
Dreamforce07
 
PDF
Introduction to Database.com
Salesforce Developers
 
PDF
Just-In-Time Sharing Using Apex
Salesforce Developers
 
PPT
IT Success with the Winter '07 Release Platform Overview
dreamforce2006
 
PPTX
Salesforce sharing and visibility Part 1
Ahmed Keshk
 
PDF
Secure Salesforce: CRUD / FLS / Sharing
Salesforce Developers
 
PPT
NYC Admin Zone: Build Your Security Superpowers
Salesforce Admins
 
PDF
Elevate workshop track1
Salesforce Developers
 
PDF
What’s new in summer’15 release - Security & Compliance
Shesh Kondi
 
PDF
What’s new in summer’15 release - Security & Compliance
Shesh Kondi
 
PDF
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Paris Salesforce Developer Group
 
PDF
ABCs of Security in the Cloud Webinar
Salesforce Developers
 
PDF
Five Developer Tips Every Admin Needs To Know
Salesforce Developers
 
Top 5 User Problems Admins Solve by Colleen Burnsed & Meagan Diegalman
Salesforce Admins
 
How to be a SalesFIERCE Admin - Jared Miller & Davina Hanchuck
Salesforce Admins
 
How to be a SalesFIERCE Salesforce Admin
Jared Miller
 
Salesforce Sharing and Security overview for new admins and devs
SayedMossad1
 
To Share or Not to Share
dreamforce2006
 
Security Boundaries in Apex
Salesforce Developers
 
Moving Sharing to a Parallel Architecture
Salesforce Developers
 
Ags001 Wilhoit 091707
Dreamforce07
 
Introduction to Database.com
Salesforce Developers
 
Just-In-Time Sharing Using Apex
Salesforce Developers
 
IT Success with the Winter '07 Release Platform Overview
dreamforce2006
 
Salesforce sharing and visibility Part 1
Ahmed Keshk
 
Secure Salesforce: CRUD / FLS / Sharing
Salesforce Developers
 
NYC Admin Zone: Build Your Security Superpowers
Salesforce Admins
 
Elevate workshop track1
Salesforce Developers
 
What’s new in summer’15 release - Security & Compliance
Shesh Kondi
 
What’s new in summer’15 release - Security & Compliance
Shesh Kondi
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Paris Salesforce Developer Group
 
ABCs of Security in the Cloud Webinar
Salesforce Developers
 
Five Developer Tips Every Admin Needs To Know
Salesforce Developers
 
Ad

More from Salesforce Developers (20)

PDF
Sample Gallery: Reference Code and Best Practices for Salesforce Developers
Salesforce Developers
 
PDF
Maximizing Salesforce Lightning Experience and Lightning Component Performance
Salesforce Developers
 
PDF
Local development with Open Source Base Components
Salesforce Developers
 
PPTX
TrailheaDX India : Developer Highlights
Salesforce Developers
 
PDF
Why developers shouldn’t miss TrailheaDX India
Salesforce Developers
 
PPTX
CodeLive: Build Lightning Web Components faster with Local Development
Salesforce Developers
 
PPTX
CodeLive: Converting Aura Components to Lightning Web Components
Salesforce Developers
 
PPTX
Enterprise-grade UI with open source Lightning Web Components
Salesforce Developers
 
PPTX
TrailheaDX and Summer '19: Developer Highlights
Salesforce Developers
 
PDF
Live coding with LWC
Salesforce Developers
 
PDF
Lightning web components - Episode 4 : Security and Testing
Salesforce Developers
 
PDF
LWC Episode 3- Component Communication and Aura Interoperability
Salesforce Developers
 
PDF
Lightning web components episode 2- work with salesforce data
Salesforce Developers
 
PDF
Lightning web components - Episode 1 - An Introduction
Salesforce Developers
 
PDF
Migrating CPQ to Advanced Calculator and JSQCP
Salesforce Developers
 
PDF
Scale with Large Data Volumes and Big Objects in Salesforce
Salesforce Developers
 
PDF
Modern Development with Salesforce DX
Salesforce Developers
 
PDF
Get Into Lightning Flow Development
Salesforce Developers
 
PDF
Integrate CMS Content Into Lightning Communities with CMS Connect
Salesforce Developers
 
PDF
Introduction to MuleSoft
Salesforce Developers
 
Sample Gallery: Reference Code and Best Practices for Salesforce Developers
Salesforce Developers
 
Maximizing Salesforce Lightning Experience and Lightning Component Performance
Salesforce Developers
 
Local development with Open Source Base Components
Salesforce Developers
 
TrailheaDX India : Developer Highlights
Salesforce Developers
 
Why developers shouldn’t miss TrailheaDX India
Salesforce Developers
 
CodeLive: Build Lightning Web Components faster with Local Development
Salesforce Developers
 
CodeLive: Converting Aura Components to Lightning Web Components
Salesforce Developers
 
Enterprise-grade UI with open source Lightning Web Components
Salesforce Developers
 
TrailheaDX and Summer '19: Developer Highlights
Salesforce Developers
 
Live coding with LWC
Salesforce Developers
 
Lightning web components - Episode 4 : Security and Testing
Salesforce Developers
 
LWC Episode 3- Component Communication and Aura Interoperability
Salesforce Developers
 
Lightning web components episode 2- work with salesforce data
Salesforce Developers
 
Lightning web components - Episode 1 - An Introduction
Salesforce Developers
 
Migrating CPQ to Advanced Calculator and JSQCP
Salesforce Developers
 
Scale with Large Data Volumes and Big Objects in Salesforce
Salesforce Developers
 
Modern Development with Salesforce DX
Salesforce Developers
 
Get Into Lightning Flow Development
Salesforce Developers
 
Integrate CMS Content Into Lightning Communities with CMS Connect
Salesforce Developers
 
Introduction to MuleSoft
Salesforce Developers
 
Ad

Recently uploaded (20)

PDF
The 2025 InfraRed Report - Redpoint Ventures
Razin Mustafiz
 
PDF
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
AI Agents in the Cloud: The Rise of Agentic Cloud Architecture
Lilly Gracia
 
PDF
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PDF
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PDF
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
PDF
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PDF
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
PPTX
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
The 2025 InfraRed Report - Redpoint Ventures
Razin Mustafiz
 
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
AI Agents in the Cloud: The Rise of Agentic Cloud Architecture
Lilly Gracia
 
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 

Setting up Security in Your Salesforce Instance

  • 1. Setting up security ​ Naveen Gabrani Joseph Dindinger ​ CEO CEO ​ [email protected] TO A FINISH ​ @ngabrani ​ 
  • 2. ​ Safe harbor statement under the Private Securities Litigation Reform Act of 1995: ​ This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward- looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. ​ The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. ​ Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements. Safe Harbor
  • 3. Naveen Gabrani CEO, Astrea IT Services Pvt Ltd
  • 4. ​  §  Security: Who has access to what records §  What type of access: No access, View, Write, Delete §  Scenarios Importance of Security Criteria Access Level Profile Opportunity value > 1 Million Visible Sales persons Account in California Editable Sales team in CA Cases Visible All organization
  • 5. §  Talk to senior users and management §  What tasks different users need to perform §  What all information needs to be kept secure §  Classify your users into groups that perform similar operations §  Map your objects to these user groups §  What level of visibility is needed Design of Security
  • 6. Access is a many layered thing.... ORG ACCESS OBJECT ACCESS RECORD ACCESS FIELD ACCESS IP RANGES,LOGIN HOURS PROFILES ROLE HIERARCHY FIELD LEVEL SECURITY
  • 7. §  Profiles: Group of users that perform similar operations §  Sales Team based in Boston §  Customer Service Project Managers §  Call center agents for European customers §  Each user is mapped to a unique profile Profiles
  • 8. §  Minimum access needed for all the Salesforce users to an object §  Possible Values §  Private §  Public Read Only §  Public Read/Write OWD: Organization Wide Default
  • 9. Role Hierarchy CEO VP Sales Sales Director International Sales Director US VP Projects Project Manager A Manager has access to all records that are accessible to its reportees ü  “Grant Access Using Hierarchies” Record owner and Salesforce Admin have access to all records Master Detail relationship, child inherits OWD from parent View All Data settings: access to all records Each user is mapped to a unique role
  • 10. Joseph Dindinger CEO, To A Finish LLC
  • 11. ​  §  Control access to company data §  Rules for sharing access to data §  Accounts §  Contacts §  Widgets_c §  Etc. What ARE sharing rules?
  • 12. Access to objects Access to fields Access to features What sharing rules are NOT.
  • 14. ​  §  Read Only §  Read Write §  Full Access Different Types of Access ​  §  Transfer §  Use
  • 15. §  Public Read/Write §  Public Read Only §  Private §  Controlled by Parent §  Grant Access Using Hierarchies Common Sharing Settings
  • 18. ​ Cars X provides high-end cars for executives around the world. Sales reps at Cars X are given full access to all accounts, but can only edit contacts that belong to them. Opportunities are strictly private; only the sales rep and his or her management tree are allowed to see them. ​ * Note: Some opportunities, those under $10,000 should be seen by everyone.
  • 19. ​ We must set the Accounts to: ​ Public Read/ Write (Default) Step 1: Account Sharing Settings
  • 20. We must set the Contacts to: Public Read Only (change from Controlled by Parent) Step 2: Contact Sharing Settings
  • 21. §  We must set the Opportunities to: Private (Change from Public Read Only) §  We must add a sharing rule to give read only access to sales reps who share roles Step 3a: Opportunity Sharing Settings
  • 22. §  We must add a sharing rule based on specific criteria to give read only access to any opportunity below $10k Step 3b: Opportunity Sharing Settings
  • 25. §  Can be enabled or disabled per object §  Can be confusing and only to be used in cases where rules cannot be made to fit §  Needs maintenance, especially if ownership changes Manual Sharing
  • 26. §  The most common solution for most situations §  Extremely powerful and customizable §  Once set, can be forgotten until the rules of business change Rule-based Sharing
  • 27. §  If default settings don't work §  If roles don't fit the bill §  If rules can't be written §  If manual sharing is too tedious and error prone... ​ THEN you can use Apex programing to share records correctly Programmatic Sharing
  • 29. ​ Cars X hires drivers in each state who will take a car from the dealer and drive it to the buyer’s house. These drivers are in the Cars X Partner Community and should be able to edit only three fields on Closed Opportunities in their assigned states. The three fields they can edit are: 1.  Assigned Driver (a lookup to the User object) 2.  Target Delivery Date 3.  Date Delivered ​ * Note: Once the Assigned Driver field has been saved, all other drivers should no longer be able to see the opportunity.
  • 31. Sample 1: Trigger to Share Code
  • 32. Sample 2: Trigger to Remove Share
  • 34. §  Think it through with all involved §  Document thoroughly §  “Bulkify” your code carefully and thoroughly §  Set up a log in case of failure §  Use Asynchronous Code (@Future or Batch) Tips for Programming Sharing
  • 35. Permission Sets & Profiles Overview
  • 36. §  Which Objects and Fields you can see (not which records) §  Which Features/Functions you can use Permission Sets & Profiles Determine
  • 37. Permission Sets vs Profiles ​  Differences include : §  The ability to set features across multiple profiles §  Ease of assigning to multiple users
  • 39. Data vs. MetaData Permission Sets & Profiles Sharing Rules
  • 40. Our Last Scenario Our last scenario could not have been completed without sharing rules AND permission sets/profiles
  • 42. Share Your Feedback, and Win a GoPro! 3 Earn a GoPro prize entry for each completed survey Tap the bell to take a survey2Enroll in a session1