salesforce_security_impl_guide
salesforce_security_impl_guide
salesforce_security_impl_guide
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Index<br />
Login (continued)<br />
identity confirmation 40<br />
IP address ranges, restricting 40, 42–43<br />
login verification 40<br />
restricting 6<br />
restricting IP addresses organization-wide 81<br />
session <strong>security</strong> 83<br />
trusted IP addresses 40<br />
two-factor authentication 40<br />
M<br />
Manual sharing 9<br />
Modify All permission 34<br />
N<br />
Network access 81<br />
O<br />
Object permissions 33–34<br />
Object-level <strong>security</strong> 8<br />
Organization-wide defaults<br />
parallel recalculation 68<br />
Organization-wide sharing settings<br />
about 8<br />
setting 48<br />
specifying 45–46<br />
user records 70<br />
P<br />
Page layouts<br />
assigning 23<br />
assigning in profiles 21<br />
Partner Portal<br />
organization-wide defaults 45<br />
Passwords<br />
changing by user 3, 87–88<br />
expiring 3<br />
expiring all passwords 81<br />
identity confirmation 87–88<br />
login verification 87–88<br />
policies 3<br />
settings and controls 78<br />
two-factor authentication 87–88<br />
Permission sets<br />
about 24<br />
app permissions 38<br />
apps 28<br />
assigned users 31<br />
assigning to a single user 32<br />
Permission sets (continued)<br />
assigning to multiple users 32<br />
cloning 25<br />
creating 25<br />
deleting 27<br />
editing 27<br />
field permissions 37<br />
licenses 25<br />
list views, creating and editing 26<br />
navigating 29<br />
object permissions 8, 33<br />
overview page 27<br />
record types 30<br />
removing user assignments 33<br />
searching 29<br />
system 28<br />
system permissions 38<br />
tab settings 20<br />
user licenses 25<br />
viewing 27<br />
Permissions<br />
about 10<br />
administrative 38<br />
app 38<br />
field 38<br />
general 38<br />
Modify All 34<br />
object 33–34<br />
revoking 11<br />
searching 18<br />
system 38<br />
user 38<br />
View All 34<br />
Personal groups 72<br />
Profiles<br />
about 12<br />
assigned users 15<br />
cloning 15<br />
creating 15<br />
deleting 13, 16, 19<br />
desktop client access 39–40<br />
editing 14<br />
editing, original user interface 19<br />
enhanced list views 13<br />
enhanced user interface, about 16<br />
field permissions 37<br />
field-level <strong>security</strong> 36<br />
login hours 44<br />
login IP address ranges 42–43<br />
108