Book Image

Learning Apex Programming

Book Image

Learning Apex Programming

Overview of this book

Table of Contents (17 chapters)
Learning Apex Programming
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

For your consideration


When deciding on which technology to use to interact with other systems, there are several aspects to keep in mind. What are our limitations, what are the other system's limitations, do we need authentication, should our data be XML or JSON? and so on.

If you are creating users that will only be interacting with your web services and APIs, you can mark this on their profile as API-only to protect the rest of your organization. Also, unless you specify IP range whitelists for your users' profiles, a security token will be required in order to authenticate the user and retrieve a valid session ID for use. A security token is a unique string that is generated on request from a user's personal settings and is tied to the password, meaning that it is reset when the user changes their password.

Pros and cons

As with everything else in life, there are pros and cons to every decision we make. We're going to choose to use a table for these, as follows:

 

Force.com site

REST

SOAP...