Book Image

Salesforce CRM - The Definitive Admin Handbook - Fifth Edition

By : Paul Goodey
Book Image

Salesforce CRM - The Definitive Admin Handbook - Fifth Edition

By: Paul Goodey

Overview of this book

Salesforce’s winter ’19 release offers a host of new features for CRM designed to meet your sales and marketing requirements. With this comprehensive guide to implementing Salesforce CRM, administrators of all levels can easily get a thorough understanding of the platform. This Salesforce handbook begins by guiding you in setting up users and security and then progresses to configuration, data management, and data analytics. You’ll discover process automation and approval mechanisms, while also exploring the functional areas of Sales Cloud, Service Cloud, Marketing Cloud, and Salesforce Chatter. This book covers Salesforce CRM system administration in a practical way, and it’ll serve as an invaluable reference for both new administrators and experienced professionals. Furthermore, you’ll also delve into Salesforce mobile apps and mobile administration, along with Salesforce Adoption Manager. You’ll gain insights into Lightning Experience, Salesforce's new app, and learn how its modern design and sleek interface helps you to build customizable components. Finally, we'll see how the two versions compare and help manage the transition from Salesforce Classic to Lightning Experience. By the end of the book, you will have mastered the techniques to configure and control various user interface features in Salesforce CRM.
Table of Contents (19 chapters)
Free Chapter
1
Section 1: Getting Started with Salesforce CRM
5
Section 2: Managing Data in Salesforce
9
Section 3: Business Processes, Cloud Development, and Lightning Experience
16
Section 4: Salesforce CRM Certification

The data access security model

There are several levels and methods that you can apply in Salesforce to configure the accessibility of object records.

In Chapter 3, Configuring Objects and Apps, we looked at the highest level that you can apply to manage the access to records by setting properties for the objects. We learned that the configuration and assignment of profiles and permission sets can be used to control the data that a user can create, view, edit, and delete.

We also looked at the creation of fields and field level security that is set at profile level and is applied to records at the database level. Returning to the diagram, we will now look at the security model that's shown in the top-right corner of the following diagram:

The data access security model is the lowest level of data access and security, and it allows you to control access at record level using...