Summary
In this chapter, we dived into the details of the security architecture domain. We learned what a CTA is expected to cover and at what level of detail. We then discovered how the delegated authentication flow differs from other flows based on standards such as SAML, before digging into the details of some security and data visibility functionalities in Salesforce.
We then tackled a mini hypothetical scenario that focused on security, and we solutioned it together and created some catching presentation pitches. We developed a set of OWDs to restrict records from specific objects to their owners. We then built a complex role hierarchy and a set of sharing mechanisms to allow users to access the right records.
Finally, we worked with multiple types of communities and proposed a secure solution to allow social sign-on via Facebook. We added extra security using second-factor authentication. Then, we explained how to utilize a third-party identity management tool to provide...