Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Salesforce CRM : The Definitive Admin Handbook - Third Edition

You're reading from   Salesforce CRM : The Definitive Admin Handbook - Third Edition Successfully administer Salesforce CRM and Salesforce mobile implementations with best practices and real-world scenarios

Arrow left icon
Product type Paperback
Published in Jan 2015
Publisher Packt
ISBN-13 9781784397562
Length 480 pages
Edition 3rd Edition
Arrow right icon
Authors (2):
Arrow left icon
Paul Goodey GP Paul Goodey GP
Author Profile Icon Paul Goodey GP
Paul Goodey GP
Paul Goodey Paul Goodey
Author Profile Icon Paul Goodey
Paul Goodey
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Organization Administration 2. User Management in Salesforce CRM FREE CHAPTER 3. Configuration in Salesforce CRM 4. Data Management 5. Data Analytics with Reports and Dashboards 6. Implementing Business Processes in Salesforce CRM 7. Salesforce CRM Functions 8. Extending Salesforce CRM 9. Best Practices for Enhancing Productivity 10. Mobile Administration Index

The data access security model

There are several flexible options that are available for you to control how records are accessed within your organization.

In the previous chapter, we looked at the broadest way in which you can control data by setting properties for the objects that a user can view, edit, and create through the configuration and assignment of profiles.

We also looked at the creation of fields and field-level security that is set at the profile level and is applied to records at the database level. Returning to the diagram, we will now look at the security model shown in the top-right corner of the following diagram:

The data access security model

To specify and set the individual records that a user can view and edit, we now look at other mechanisms that can be applied, which are setting your Organization-Wide Defaults, defining a role hierarchy, and creating sharing rules.

The following diagram shows how, with the addition of each extra feature shown, access to records is broadened:

The data access security model
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image