๐Ÿ” Security and Permissions - Solution for Guru

Table of Contents
< All Topics
Print

๐Ÿ” Security and Permissions

Overview

Salesforce provides robust security and permission controls to protect sensitive business data while ensuring users have access to what they need. This article outlines the key components of Salesforceโ€™s security model and how permissions are managed across the platform.


๐Ÿงฑ Layers of Security in Salesforce

Salesforce security is built on multiple layers:

LayerPurpose
Organization-LevelControls overall access to Salesforce (login hours, IP ranges).
Object-LevelManages access to specific objects like Accounts, Contacts, etc.
Field-LevelControls visibility/edit rights to individual fields.
Record-LevelDefines who can see or edit specific records within an object.

๐Ÿ”‘ Organization-Level Security

1. Login Access

  • IP Restrictions: Block/allow logins by IP address range.
  • Login Hours: Set time windows for when users can log in.

2. Two-Factor Authentication (2FA)

  • Required for certain users, especially admins or external access.
  • Managed via Permission Sets and Session Settings.

๐Ÿ“ฆ Object-Level Security

1. Profiles

  • Control object-level access (Read, Create, Edit, Delete).
  • Assign one profile per user.
  • Profiles also manage login IPs, hours, and app access.

2. Permission Sets

  • Grant additional permissions beyond the profile.
  • Reusable and flexible โ€” assign multiple to a user.
  • Ideal for managing exceptions without cloning profiles.

๐Ÿ” Field-Level Security

  • Configure through Profiles or Permission Sets.
  • Control visibility and editability of individual fields on an object.
  • Hidden fields remain inaccessible via API, UI, and reports.

๐Ÿ—‚๏ธ Record-Level Security

1. Organization-Wide Defaults (OWD)

  • Set the baseline access for each object (Private, Read-Only, Read/Write).

2. Role Hierarchies

  • Users in higher roles inherit access to records owned by users below them.
  • Not a security feature for restriction โ€” it’s for data visibility expansion.

3. Sharing Rules

  • Grant record access to users based on criteria (public groups, roles).
  • Can be based on record owner or field values.

4. Manual Sharing

  • Users can share individual records if they have the rights to do so.

๐Ÿงฐ Tools for Security Management

ToolUse Case
Profile and Permission Set UIAssign and review permissions for users.
Field Accessibility ViewerCheck field-level visibility across profiles.
Sharing Settings PageConfigure OWDs and sharing rules.
Security Health CheckAnalyze and improve org security posture.
Setup Audit TrailTrack configuration changes.

โœ… Best Practices

  • Least Privilege Access: Always start with minimal access and add more only when needed.
  • Use Permission Sets: For flexibility and easier permission management.
  • Review Regularly: Audit user access and deactivate unused accounts.
  • Enable 2FA: Especially for sensitive data and integrations.
  • Test with Login-As: Verify user access by logging in as the user (Admins only).

๐Ÿ“ Summary

Salesforceโ€™s layered security model offers precise control over who sees what โ€” from login settings down to individual records and fields. Using Profiles, Permission Sets, and Sharing Settings effectively ensures your users have the access they need, and nothing more.