Salesforce Security Guide Impl
User Manual:
Open the PDF directly: View PDF
Page Count: 181 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Salesforce Security Guide
- Salesforce Security Basics
- Authenticate Users
- The Elements of User Authentication
- Configure User Authentication
- Restrict Where and When Users Can Log In to Salesforce
- Restrict Login IP Ranges in the Enhanced Profile User Interface
- Restrict Login IP Addresses in the Original Profile User Interface
- View and Edit Login Hours in the Enhanced Profile User Interface
- View and Edit Login Hours in the Original Profile User Interface
- Set Trusted IP Ranges for Your Organization
- Set Password Policies
- Expire Passwords for All Users
- Modify Session Security Settings
- Create a Login Flow
- Connect a Login Flow to a Profile
- Set Up Two-Factor Authentication
- Set Two-Factor Authentication Login Requirements
- Set Two-Factor Authentication Login Requirements for Single Sign-On, Social Sign-On, and Communities
- Set Two-Factor Authentication Login Requirements for API Access
- Connect Salesforce Authenticator (Version 2 or Later) to Your Account for Identity Verification
- Connect a One-Time Password Generator App or Device for Identity Verification
- Disconnect Salesforce Authenticator (Version 2 or Later) from a User’s Account
- Disconnect a User’s One-Time Password Generator App
- Generate a Temporary Identity Verification Code
- Expire a Temporary Verification Code
- Delegate Two-Factor Authentication Management Tasks
- Restrict Where and When Users Can Log In to Salesforce
- Give Users Access to Data
- Securing Data Access
- User Permissions
- User Permissions and Access
- Permission Sets
- User Licenses in Permission Sets
- Create and Edit Permission Set List Views
- Edit Permission Sets from a List View
- App and System Settings in Permission Sets
- Permission Set Assigned Users Page
- Search Permission Sets
- View and Edit Assigned Apps in Permission Sets
- Assign Custom Record Types in Permission Sets
- Enable Custom Permissions in Permission Sets
- Manage Permission Set Assignments
- Object Permissions
- Salesforce Classic Mobile Permissions
- Custom Permissions
- Profiles
- Work in the Enhanced Profile User Interface Page
- Work in the Original Profile Interface
- Manage Profile Lists
- Edit Multiple Profiles with Profile List Views
- Clone Profiles
- Viewing a Profile's Assigned Users
- View and Edit Tab Settings in Permission Sets and Profiles
- Enable Custom Permissions in Profiles
- User Role Hierarchy
- Share Objects and Fields
- Field-Level Security
- Sharing Rules
- Criteria-Based Sharing Rules
- Creating Lead Sharing Rules
- Creating Account Sharing Rules
- Creating Account Territory Sharing Rules
- Creating Contact Sharing Rules
- Creating Opportunity Sharing Rules
- Creating Case Sharing Rules
- Creating Campaign Sharing Rules
- Creating Custom Object Sharing Rules
- Creating User Sharing Rules
- Sharing Rule Categories
- Editing Lead Sharing Rules
- Editing Account Sharing Rules
- Editing Account Territory Sharing Rules
- Editing Contact Sharing Rules
- Editing Opportunity Sharing Rules
- Editing Case Sharing Rules
- Editing Campaign Sharing Rules
- Editing Custom Object Sharing Rules
- Editing User Sharing Rules
- Sharing Rule Considerations
- Recalculate Sharing Rules
- Asynchronous Parallel Recalculation of Sharing Rules
- User Sharing
- What Is a Group?
- Organization-Wide Sharing Defaults
- Protect Your Salesforce Data with Shield Platform Encryption
- Monitoring Your Organization's Security
- Security Tips for Apex and Visualforce Development
- Index