SlideShare a Scribd company logo
1 of 19
Presented By: Sunil Kumar
Email id: sunil02kumar@gmail.com
Twitter : @sunil02kumar
Blog: http://sunil02kumar.blogspot.in/
PROFILES AND
PERMISSION SETS IN
SALESFORCE
Module Agenda
 Overview of profiles.
 Profiles and Permissions.
 Profile and Access to Data.
 Profiles and the User Interface.
 Permission Sets
What is a Profile?
 Defines a user`s permissions to perform different functions.
 Determines how a user sees records to which s/he has access.
 Every user has a profile(only 1 profile).
 we can group the things that profiles control into three categories :
- Permission, Access to Data, and User Interface.
Permissions Access to Data User Interface
General User
Permissions
Field Level
Security
Page Layout
Administrative
Permissions
Object CRUD Record Type
Standard/Custom
Object CRUD
Login Hours and
IP Ranges
Tabs
What Do Profile Control?
 Tab setting determine which tabs users see when they log in.
 Permissions determine what users can do to record to which they
have access.
What Do Profile Control?(Cont.)
Login Hours and Login IP Ranges
 Sets the hours when users with a particular profile can use the
system
 Sets the IP addresses from which users with a particular profile can
log in.
Additional Information About Profiles
 Salesforce provides many standard profile.
- Permission on standard profile can not be customize.
 Developers can create custom profiles.
- when creating a new custom profile, developers need to select a
profile from which to copy over permission and settings.
 Typically, Organizations will have one profile for each actor.
Module Agenda
 Overview of profiles.
 Profiles and Permissions.
 Profile and Access to Data.
 Profiles and the User Interface.
 Permission Sets
Profile have set of permissions
 Profiles control Administrator Permissions.
 Profiles control General User Permissions.
A Few Permission to Note
• “ View All Data ”
• “ Modify All Data ”
• “ Customize Application ”
• “ API Only User ”
• “ Password Never Expires ”
Object Permissions
 Permissions determine what users can do to records to which their
have access.
 Lacking the “Read” permission for an object means that users will
not be able to access it at all.
- No access in the application or API.
- No access on Reports.
- No access through search.
Module Agenda
 Overview of profiles.
 Profiles and Permissions.
 Profile and Access to Data.
 Profiles and the User Interface.
 Permission Sets
What is Field-Level Security?
 Restricts users` access to view and edit fields.
 Overrides any less-restrictive field access setting in page layouts
and search layouts.
 Controls which fields users can access in related lists, list views,
reports, force.com connect offline, email and mail merge templates,
custom links, and when synchronizing data or importing data.
Module Agenda
 Overview of profiles.
 Profiles and Permissions.
 Profile and Access to Data.
 Profiles and the User Interface.
 Permission Sets
Record Types
Record types are used to tailor user interaction experience to specific
business needs.
Note: Record types only affect the way that data is displayed in the UI.
It is not a form of sub-classing.
 Record types can determine page layouts, in conjunction with
profiles.
 Or limit picklist options.
What does a page layout Control?
 How detail and edit pages are organized.
 Page section customizations.
 Which fields, related lists, and custom links a user sees.
 Field properties-visible, read-only and required.
Note: May establish unique layouts for different business scenarios.
Module Agenda
 Overview of profiles.
 Profiles and Permissions.
 Profile and Access to Data.
 Profiles and the User Interface.
 Permission Sets
Permission Sets
• A permission set is a collection of settings and permissions that give users access
to various tools and functions.
• The settings and permissions in permission sets are also found in profiles, but
permission sets extend users’ functional access without changing their profiles.
• For example, to give users access to a custom object, create a permission set,
enable the required permissions for the object, and assign the permission set to the
users. You never have to change profiles, or create a profile for a single use case.
While users can have only one profile, they can have multiple permission sets.
• Permission sets are assigned to users. You can assign permission to multiple users
using Apex data loader.
• Permission sets are very useful when you want to assign permission to users on
ad-hoc basis without doing any changes to user’s profile.
• Assigned apps
• Object settings, which include:
 Tab settings
 Record type settings
 Object permissions
 Field permissions
• App permissions
• Apex class access
• Visualforce page access
• System permissions
Permission Sets
Various permission which can be configured in permission sets
are:
Profiles and permission sets in salesforce

More Related Content

What's hot

Salesforce sharing and visibility Part 1
Salesforce sharing and visibility Part 1Salesforce sharing and visibility Part 1
Salesforce sharing and visibility Part 1Ahmed Keshk
 
Admin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & PermissionsAdmin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & PermissionsSalesforce Admins
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce OrgSalesforce Admins
 
Record sharing model in salesforce
Record sharing model in salesforceRecord sharing model in salesforce
Record sharing model in salesforceSunil kumar
 
Reports and dashboards @salesforce
Reports and dashboards @salesforceReports and dashboards @salesforce
Reports and dashboards @salesforceKapil Kumar Patle
 
Apex Enterprise Patterns: Building Strong Foundations
Apex Enterprise Patterns: Building Strong FoundationsApex Enterprise Patterns: Building Strong Foundations
Apex Enterprise Patterns: Building Strong FoundationsSalesforce Developers
 
Salesforce Admin 201-certification Notes
Salesforce Admin 201-certification NotesSalesforce Admin 201-certification Notes
Salesforce Admin 201-certification NotesAslam Tayyab
 
Salesforce complete overview
Salesforce complete overviewSalesforce complete overview
Salesforce complete overviewNitesh Mishra ☁
 
Salesforce administrator training presentation slides
Salesforce administrator training presentation slides Salesforce administrator training presentation slides
Salesforce administrator training presentation slides Salesforce Associates
 
Modeling and Querying Data and Relationships in Salesforce
Modeling and Querying Data and Relationships in SalesforceModeling and Querying Data and Relationships in Salesforce
Modeling and Querying Data and Relationships in SalesforceSalesforce Developers
 
Salesforce Presentation
Salesforce PresentationSalesforce Presentation
Salesforce PresentationChetna Purohit
 
Salesforce Sharing Architecture
Salesforce Sharing ArchitectureSalesforce Sharing Architecture
Salesforce Sharing Architecturegemziebeth
 
Salesforce Spring 23 Webinar
Salesforce Spring 23 WebinarSalesforce Spring 23 Webinar
Salesforce Spring 23 Webinarbrightgenss
 
Salesforce integration best practices columbus meetup
Salesforce integration best practices   columbus meetupSalesforce integration best practices   columbus meetup
Salesforce integration best practices columbus meetupMuleSoft Meetup
 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedCalvin Noronha
 
Two-Way Integration with Writable External Objects
Two-Way Integration with Writable External ObjectsTwo-Way Integration with Writable External Objects
Two-Way Integration with Writable External ObjectsSalesforce Developers
 

What's hot (20)

Salesforce sharing and visibility Part 1
Salesforce sharing and visibility Part 1Salesforce sharing and visibility Part 1
Salesforce sharing and visibility Part 1
 
Pardot
PardotPardot
Pardot
 
Admin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & PermissionsAdmin Webinar—An Admin's Guide to Profiles & Permissions
Admin Webinar—An Admin's Guide to Profiles & Permissions
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
 
Record sharing model in salesforce
Record sharing model in salesforceRecord sharing model in salesforce
Record sharing model in salesforce
 
Reports and dashboards @salesforce
Reports and dashboards @salesforceReports and dashboards @salesforce
Reports and dashboards @salesforce
 
Apex Enterprise Patterns: Building Strong Foundations
Apex Enterprise Patterns: Building Strong FoundationsApex Enterprise Patterns: Building Strong Foundations
Apex Enterprise Patterns: Building Strong Foundations
 
Salesforce Admin 201-certification Notes
Salesforce Admin 201-certification NotesSalesforce Admin 201-certification Notes
Salesforce Admin 201-certification Notes
 
Salesforce complete overview
Salesforce complete overviewSalesforce complete overview
Salesforce complete overview
 
Salesforce administrator training presentation slides
Salesforce administrator training presentation slides Salesforce administrator training presentation slides
Salesforce administrator training presentation slides
 
Relationships in Salesforce
Relationships in SalesforceRelationships in Salesforce
Relationships in Salesforce
 
Modeling and Querying Data and Relationships in Salesforce
Modeling and Querying Data and Relationships in SalesforceModeling and Querying Data and Relationships in Salesforce
Modeling and Querying Data and Relationships in Salesforce
 
Salesforce Presentation
Salesforce PresentationSalesforce Presentation
Salesforce Presentation
 
Salesforce Sharing Architecture
Salesforce Sharing ArchitectureSalesforce Sharing Architecture
Salesforce Sharing Architecture
 
SFDC User Setup
SFDC User SetupSFDC User Setup
SFDC User Setup
 
Salesforce Spring 23 Webinar
Salesforce Spring 23 WebinarSalesforce Spring 23 Webinar
Salesforce Spring 23 Webinar
 
Salesforce integration best practices columbus meetup
Salesforce integration best practices   columbus meetupSalesforce integration best practices   columbus meetup
Salesforce integration best practices columbus meetup
 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - Demystified
 
Two-Way Integration with Writable External Objects
Two-Way Integration with Writable External ObjectsTwo-Way Integration with Writable External Objects
Two-Way Integration with Writable External Objects
 
Pardot presentation
Pardot presentationPardot presentation
Pardot presentation
 

Similar to Profiles and permission sets in salesforce

Cairo meetup low code best practices
Cairo meetup low code best practicesCairo meetup low code best practices
Cairo meetup low code best practicesAhmed Keshk
 
2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architectureJihun Jung
 
Salesforce admin training 2
Salesforce admin training 2Salesforce admin training 2
Salesforce admin training 2HungPham381
 
August 12: Sugar’s Security Model – Teams and Roles
August 12: Sugar’s Security Model – Teams and Roles August 12: Sugar’s Security Model – Teams and Roles
August 12: Sugar’s Security Model – Teams and Roles ticomixcrm
 
recordsharingmodelinsalesforce-170519074428.pdf
recordsharingmodelinsalesforce-170519074428.pdfrecordsharingmodelinsalesforce-170519074428.pdf
recordsharingmodelinsalesforce-170519074428.pdfrohitgupt1
 
SFDC Database Security
SFDC Database SecuritySFDC Database Security
SFDC Database SecuritySujit Kumar
 
Adm 201 study group session 1 user interface kathy c
Adm 201 study group session 1   user interface kathy cAdm 201 study group session 1   user interface kathy c
Adm 201 study group session 1 user interface kathy covalisgroup
 
Adm 201 study group session 1 user interface kathy c
Adm 201 study group session 1   user interface kathy cAdm 201 study group session 1   user interface kathy c
Adm 201 study group session 1 user interface kathy covalisgroup
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013AntonioMaio2
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...AntonioMaio2
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanUsman Zafar Malik
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanUsman Zafar Malik
 
Ooluk Data Dictionary Manager
Ooluk Data Dictionary ManagerOoluk Data Dictionary Manager
Ooluk Data Dictionary ManagerSiddhesh Prabhu
 
Security and-data-access-document
Security and-data-access-documentSecurity and-data-access-document
Security and-data-access-documentAmit Sharma
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql databasegourav kottawar
 
Dev Dives: Master advanced authentication and performance in Productivity Act...
Dev Dives: Master advanced authentication and performance in Productivity Act...Dev Dives: Master advanced authentication and performance in Productivity Act...
Dev Dives: Master advanced authentication and performance in Productivity Act...UiPathCommunity
 
Software requirements specification (srs) by Dan Dharma
Software requirements specification (srs) by  Dan DharmaSoftware requirements specification (srs) by  Dan Dharma
Software requirements specification (srs) by Dan DharmaAvudaiappan Dharma Ph.D.,
 
Role-based access control (RBAC) and more
Role-based access control (RBAC) and moreRole-based access control (RBAC) and more
Role-based access control (RBAC) and moreTim Hermie ☁️
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsFredBrandonAuthorMCP
 

Similar to Profiles and permission sets in salesforce (20)

Cairo meetup low code best practices
Cairo meetup low code best practicesCairo meetup low code best practices
Cairo meetup low code best practices
 
2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture2020 07-08 fireside chat sharing architecture
2020 07-08 fireside chat sharing architecture
 
Salesforce admin training 2
Salesforce admin training 2Salesforce admin training 2
Salesforce admin training 2
 
August 12: Sugar’s Security Model – Teams and Roles
August 12: Sugar’s Security Model – Teams and Roles August 12: Sugar’s Security Model – Teams and Roles
August 12: Sugar’s Security Model – Teams and Roles
 
recordsharingmodelinsalesforce-170519074428.pdf
recordsharingmodelinsalesforce-170519074428.pdfrecordsharingmodelinsalesforce-170519074428.pdf
recordsharingmodelinsalesforce-170519074428.pdf
 
SFDC Database Security
SFDC Database SecuritySFDC Database Security
SFDC Database Security
 
Adm 201 study group session 1 user interface kathy c
Adm 201 study group session 1   user interface kathy cAdm 201 study group session 1   user interface kathy c
Adm 201 study group session 1 user interface kathy c
 
Adm 201 study group session 1 user interface kathy c
Adm 201 study group session 1   user interface kathy cAdm 201 study group session 1   user interface kathy c
Adm 201 study group session 1 user interface kathy c
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
 
Ooluk Data Dictionary Manager
Ooluk Data Dictionary ManagerOoluk Data Dictionary Manager
Ooluk Data Dictionary Manager
 
Security and-data-access-document
Security and-data-access-documentSecurity and-data-access-document
Security and-data-access-document
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
Dev Dives: Master advanced authentication and performance in Productivity Act...
Dev Dives: Master advanced authentication and performance in Productivity Act...Dev Dives: Master advanced authentication and performance in Productivity Act...
Dev Dives: Master advanced authentication and performance in Productivity Act...
 
Software requirements specification (srs) by Dan Dharma
Software requirements specification (srs) by  Dan DharmaSoftware requirements specification (srs) by  Dan Dharma
Software requirements specification (srs) by Dan Dharma
 
Role-based access control (RBAC) and more
Role-based access control (RBAC) and moreRole-based access control (RBAC) and more
Role-based access control (RBAC) and more
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
Tableau powerpoint
Tableau powerpointTableau powerpoint
Tableau powerpoint
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Profiles and permission sets in salesforce

  • 1. Presented By: Sunil Kumar Email id: sunil02kumar@gmail.com Twitter : @sunil02kumar Blog: http://sunil02kumar.blogspot.in/ PROFILES AND PERMISSION SETS IN SALESFORCE
  • 2. Module Agenda  Overview of profiles.  Profiles and Permissions.  Profile and Access to Data.  Profiles and the User Interface.  Permission Sets
  • 3. What is a Profile?  Defines a user`s permissions to perform different functions.  Determines how a user sees records to which s/he has access.  Every user has a profile(only 1 profile).  we can group the things that profiles control into three categories : - Permission, Access to Data, and User Interface. Permissions Access to Data User Interface General User Permissions Field Level Security Page Layout Administrative Permissions Object CRUD Record Type Standard/Custom Object CRUD Login Hours and IP Ranges Tabs
  • 4. What Do Profile Control?  Tab setting determine which tabs users see when they log in.  Permissions determine what users can do to record to which they have access.
  • 5. What Do Profile Control?(Cont.) Login Hours and Login IP Ranges  Sets the hours when users with a particular profile can use the system  Sets the IP addresses from which users with a particular profile can log in.
  • 6. Additional Information About Profiles  Salesforce provides many standard profile. - Permission on standard profile can not be customize.  Developers can create custom profiles. - when creating a new custom profile, developers need to select a profile from which to copy over permission and settings.  Typically, Organizations will have one profile for each actor.
  • 7. Module Agenda  Overview of profiles.  Profiles and Permissions.  Profile and Access to Data.  Profiles and the User Interface.  Permission Sets
  • 8. Profile have set of permissions  Profiles control Administrator Permissions.  Profiles control General User Permissions.
  • 9. A Few Permission to Note • “ View All Data ” • “ Modify All Data ” • “ Customize Application ” • “ API Only User ” • “ Password Never Expires ”
  • 10. Object Permissions  Permissions determine what users can do to records to which their have access.  Lacking the “Read” permission for an object means that users will not be able to access it at all. - No access in the application or API. - No access on Reports. - No access through search.
  • 11. Module Agenda  Overview of profiles.  Profiles and Permissions.  Profile and Access to Data.  Profiles and the User Interface.  Permission Sets
  • 12. What is Field-Level Security?  Restricts users` access to view and edit fields.  Overrides any less-restrictive field access setting in page layouts and search layouts.  Controls which fields users can access in related lists, list views, reports, force.com connect offline, email and mail merge templates, custom links, and when synchronizing data or importing data.
  • 13. Module Agenda  Overview of profiles.  Profiles and Permissions.  Profile and Access to Data.  Profiles and the User Interface.  Permission Sets
  • 14. Record Types Record types are used to tailor user interaction experience to specific business needs. Note: Record types only affect the way that data is displayed in the UI. It is not a form of sub-classing.  Record types can determine page layouts, in conjunction with profiles.  Or limit picklist options.
  • 15. What does a page layout Control?  How detail and edit pages are organized.  Page section customizations.  Which fields, related lists, and custom links a user sees.  Field properties-visible, read-only and required. Note: May establish unique layouts for different business scenarios.
  • 16. Module Agenda  Overview of profiles.  Profiles and Permissions.  Profile and Access to Data.  Profiles and the User Interface.  Permission Sets
  • 17. Permission Sets • A permission set is a collection of settings and permissions that give users access to various tools and functions. • The settings and permissions in permission sets are also found in profiles, but permission sets extend users’ functional access without changing their profiles. • For example, to give users access to a custom object, create a permission set, enable the required permissions for the object, and assign the permission set to the users. You never have to change profiles, or create a profile for a single use case. While users can have only one profile, they can have multiple permission sets. • Permission sets are assigned to users. You can assign permission to multiple users using Apex data loader. • Permission sets are very useful when you want to assign permission to users on ad-hoc basis without doing any changes to user’s profile.
  • 18. • Assigned apps • Object settings, which include:  Tab settings  Record type settings  Object permissions  Field permissions • App permissions • Apex class access • Visualforce page access • System permissions Permission Sets Various permission which can be configured in permission sets are: