Salesforce Security Guide Impl
User Manual:
Open the PDF directly: View PDF
Page Count: 260 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Salesforce Security Guide
- Salesforce Security Basics
- Authenticate Users
- Elements of User Authentication
- Configure User Authentication
- Restrict Where and When Users Can Log In to Salesforce
- Restrict Login IP Ranges in the Enhanced Profile User Interface
- Restrict Login IP Addresses in the Original Profile User Interface
- View and Edit Login Hours in the Enhanced Profile User Interface
- View and Edit Login Hours in the Original Profile User Interface
- Set Trusted IP Ranges for Your Organization
- Set Password Policies
- Expire Passwords for All Users
- Modify Session Security Settings
- Configure When Users Are Prompted to Verify Identity
- Require High-Assurance Session Security for Sensitive Operations
- Create a Login Flow
- Set Up a Login Flow and Connect to Profiles
- Login Flow Examples
- Set Up Two-Factor Authentication
- Set Two-Factor Authentication Login Requirements
- Set Two-Factor Authentication Login Requirements and Custom Policies for Single Sign-On, Social Sign-On, and Communities
- Set Two-Factor Authentication Login Requirements for API Access
- Connect Salesforce Authenticator (Version 3 or Later) to Your Account for Identity Verification
- Verify Your Identity with a One-Time Password Generator App or Device
- Disconnect Salesforce Authenticator (Versions 2 and 3) from a User’s Account
- Disconnect a User’s One-Time Password Generator App
- Generate a Temporary Identity Verification Code
- Expire a Temporary Verification Code
- Delegate Two-Factor Authentication Management Tasks
- Deploy Third-Party SMS-Based Two-Factor Authentication
- Limit the Number of Concurrent Sessions with Login Flows
- Restrict Where and When Users Can Log In to Salesforce
- Give Users Access to Data
- Control Who Sees What
- User Permissions
- User Permissions and Access
- Permission Sets
- Create and Edit Permission Set List Views
- Edit Permission Sets from a List View
- App and System Settings in Permission Sets
- Permission Set Assigned Users Page
- Search Permission Sets
- View and Edit Assigned Apps in Permission Sets
- Assign Custom Record Types in Permission Sets
- Enable Custom Permissions in Permission Sets
- Manage Permission Set Assignments
- Object Permissions
- Custom Permissions
- Profiles
- Work in the Enhanced Profile User Interface Page
- Work in the Original Profile Interface
- Manage Profile Lists
- Edit Multiple Profiles with Profile List Views
- Clone Profiles
- Viewing a Profile's Assigned Users
- View and Edit Tab Settings in Permission Sets and Profiles
- Enable Custom Permissions in Profiles
- User Role Hierarchy
- Share Objects and Fields
- Field-Level Security
- Sharing Rules
- Criteria-Based Sharing Rules
- Creating Lead Sharing Rules
- Creating Account Sharing Rules
- Create Account Territory Sharing Rules
- Create Contact Sharing Rules
- Creating Opportunity Sharing Rules
- Creating Case Sharing Rules
- Creating Campaign Sharing Rules
- Creating Custom Object Sharing Rules
- Creating User Sharing Rules
- Sharing Rule Categories
- Editing Lead Sharing Rules
- Editing Account Sharing Rules
- Editing Account Territory Sharing Rules
- Editing Contact Sharing Rules
- Editing Opportunity Sharing Rules
- Editing Case Sharing Rules
- Editing Campaign Sharing Rules
- Editing Custom Object Sharing Rules
- Editing User Sharing Rules
- Sharing Rule Considerations
- Recalculate Sharing Rules
- Asynchronous Parallel Recalculation of Sharing Rules
- User Sharing
- What Is a Group?
- Organization-Wide Sharing Defaults
- Strengthen Your Data's Security with Shield Platform Encryption
- Encrypt Fields, Files, and Other Data Elements With Encryption Policy
- Encrypt Fields
- Encrypt Fields on Custom Objects and Custom Fields
- Encrypt Files
- Get Statistics About Your Encryption Coverage
- Synchronize Your Data Encryption
- Fix Blockers
- Retrieve Encrypted Data with Formulas
- Apply Encryption to Fields Used in Matching Rules
- Encrypt Data in Chatter
- Encrypt Search Index Files
- Encrypt Einstein Analytics Data
- Filter Encrypted Data with Deterministic Encryption
- Cache-Only Key Service (Beta)
- How Cache-Only Keys Works
- Prerequisites and Terminology for Cache-Only Keys
- Create and Assemble Your Key Material
- Configure Your Cache-Only Key Callout Connection
- Check Your Cache-Only Key Connection
- Destroy a Cache-Only Key
- Reactivate a Cache-Only Key
- Considerations for Cache-Only Keys
- Troubleshoot Cache-Only Keys
- Manage Shield Platform Encryption
- Generate a Secret
- Rotate Keys
- Export a Key
- Destroy a Key
- Stop Encryption
- Require Two-Factor Authentication for Key Management
- How Encryption Works
- Encryption Best Practices
- Encryption Trade-Offs
- Encrypt Fields, Files, and Other Data Elements With Encryption Policy
- Monitoring Your Organization’s Security
- Security Guidelines for Apex and Visualforce Development
- Index