Summary
In this chapter, you have gained knowledge about how to restrict and extend access to objects, fields, and records and understand how data security in the Lightning platform is applied using a number of layers.
You have learned about the key differences between object security, field-level security, and record sharing and how, with the use of object-level permissions, organization-wide defaults, and sharing settings, appropriate access to records can be configured.
You discovered the mechanisms for viewing and creating profiles and permission sets to control object and field access and how and when to assign profiles and permission sets. Learning about the different security options that are available will equip you with the necessary skills and confidence to configure and build secure apps in the Lightning Platform.
In the next chapter, you will learn about the features and capabilities to configure and build the functionality for custom buttons, links, and actions...