Data Security Flashcards
____—provide the bluntest way to control data access. You can prevent a user from seeing, creating, editing, or deleting any instance of a particular object type, such as a lead or opportunity, by using ______. You can hide tabs and objects from selected users, so that they don’t even know that type of data exists.
Object-level security—or object permissions
object permissions
____ are collections of settings and permissions that determine what a user can do in the application
Permission sets and profiles
____ are defined by a user’s job function, such as Salesforce admin or sales representative. You can assign one _____ to many users, but you can assign only one _____ per user.
(same word all 3)
profiles
You can use ______ to grant more ____ and access settings to users. Now it’s easier to manage users’ _____ and access because you can assign multiple ______ to a single user.
permission sets
permissions
control whether a user can see, edit, and delete the value for a particular field on an object. You can protect sensitive fields without hiding the entire object.
Field-level security—or field permissions
____ control the visibility of fields in any part of the app, including related lists, list views, reports, and search results.
Field permissions
____ lets you give users access to some object records, but not others.
Record-level security
In a hierarchy, users higher in the hierarchy always have the same access to users below them in the hierarchy. T/F
T
To specify record-level security, set your organization-wide sharing settings, define a hierarchy, and create sharing rules
Organization-wide
Role hierarchy
Sharing rules
Manual sharing
User sharing
Apex managed sharing
Restriction rules
Scoping rules
With ____ rules you can set criteria to help your users see only records that are relevant to them. ____ rules don’t restrict the record access that your users already have. They ____ the records that your users see. Your users can still open and report on all records that they have access to per your sharing settings.
scoping
When a ____ rule is applied to a user, the data that they had read access to via your sharing settings is further scoped to only records matching the record criteria that you set. This behavior is similar to how you can filter results in a list view or report, except that it’s permanent
restriction
If sharing rules and manual sharing don’t provide the required control, you can use ____ ____ ____. ____ allows developers to programmatically share custom objects. When you use ____ on a custom object, only users with the Modify All Data permission can add or change the sharing on the custom object’s record. The sharing access is maintained across record owner changes.
Apex managed sharing
With _____, you can show or hide an internal or external user from another user in your organization. ______ rules are based on membership to a public group, role, or territory, so you must create the appropriate public groups, roles, or territories before creating ______. Each _____ shares members of a source group with members of the target group. Users inherit the same access as users below them in the role hierarchy.
User sharing
Sometimes it’s impossible to define a consistent group of users who need access to a particular set of records. Record owners can use _____ to give read and edit permissions to users who don’t have access any other way. _____ isn’t automated like organization-wide sharing settings, role hierarchies, or sharing rules. But it gives record owners the flexibility to share records with users that must see them.
Manual sharing
With _____ you can make automatic exceptions to organization-wide sharing settings for sets of users. Use _____ to give these users access to records they don’t own or can’t normally see. _____, like role hierarchies, are only used to give more users access to records—they can’t be stricter than your organization-wide default settings.
sharing rules
After you specify organization-wide sharing settings, the first way to give wider access to records is with a ______. Similar to an organization chart, a _______ is the level of data access that a user or group of users needs. The _______ ensures that users higher in the hierarchy can always access the same data as users who are lower, regardless of the organization-wide default settings. Each role in the hierarchy can represent a level of data access that a user or group of users needs rather than matching your organization chart
role hierarchy
The first step in record-level security is to determine the _____ for each object. ______ specify the default level of access that users have to each others’ records.
Organization-wide sharing settings
You use ____ to lock your data to the most restrictive level. Use the other record-level security and sharing tools to selectively give access to other users.
organization-wide sharing settings
For example, users have object-level permissions to read and edit opportunities, and the organization-wide sharing setting is Read-Only. By default, those users can read all opportunity records, but can’t edit any unless they own the record or are granted other permissions.
_____ lets you give the right people the right access to the right resources at the right time.
Salesforce Identity
_____ lets users access all authorized resources without logging in separately to each one—and without having to create (and remember) different user credentials for each app
Single sign-on (SSO)
And what are those “authorized resources” that your signed-on users have access to?
connected apps
With ______ users log in to a Salesforce org with their username and password from an external authentication provider, like Facebook, Twitter, LinkedIn, or Google. You can set up any of these providers with a few clicks. With a little bit of work, you can set up other providers, like PayPal and Amazon.
social sign-on