So far, we have seen how to build and secure a Force.com application. In this chapter, we will take a look at ways to administer the application and the available tools that will help us achieve these.
We will cover the following topics in this chapter:
Managing the access control
An overview of Force.com licenses
Restricting data access
Understanding the stakeholders in the organization
Understanding the security pyramid
Managing profiles
Setting up roles
Sharing settings
Managing different types of accounts
Now that we know how to build an application on Force.com, it is time to set up the platform to be used. We are going to bring everything we learned so far and put them together to be used by different people. So, let's begin.