Summary
In this chapter, you have dived into the details of the security architecture domain. You learned what is expected from a CTA to cover and the level of detail. You then discovered how the delegated authentication flow differs from other flows based on standards such as SAML, before digging into the details of some security and data visibility functionalities in Salesforce.
You then tackled a mini hypothetical scenario that focused on security, found the solution, and created some attention-grabbing presentation pitches. You developed a set of OWDs to restrict records from specific objects to their owners. You then built a complex role hierarchy and a set of sharing mechanisms to allow users to access the right records.
Finally, you worked with multiple types of communities and proposed a secure solution to allow social sign-on via Facebook. You added extra security using second-factor authentication. Then, you explained how to utilize a third-party identity management...