Security is perhaps the No.1 feature of Salesforce. Salesforce provides multiple layers of security at every level starting from servers to mobile SDKs. One such security feature is “PIN Security” feature. Enable it and it will force mobile (i.e. both Native or Hybrid SDK) users to set 4 to 8 digit passcode for their app. Once enabled, if the user switches to a different app and comes back after some specified time, the app will ask for the passcode! Sweet, isn’t it?
Even cooler part is that it’s built-in and with few simple configurations, your users are ready to use it. Let’s see how it works.
Vancouver presented a solid week of world-class information security conferences and courses geared at developers and hackers between CanSacWest and BSides. Salesforce.com and Unbounce collaborated to present an accessible security discussion, our Tech Security Talks (#techsec) event. We decided on an evening fireside chat with industry experts followed by a Q&A session that would be geared towards covering the implications of security issues ranging from bugs to privacy laws.
With the powerful Salesforce sharing features, you can support collaboration within your organization while keeping sensitive information secure. And while you must always balance collaboration with security, there are situations in which you might need to make absolutely sure that record access is limited to a very small number of people, regardless of their position within the corporate hierarchy. In this post, you’ll learn about the sharing features and strategies you can use to do just that.
Learn how Salesforce Identity features fit together to provide coordinated user authorization management and access to third party apps. Start using My Domain, connected apps, and the App Launcher together for a streamlined user experience. And, find out more about other features like Identity Connect for Active Directory user synchronization, custom login pages, two-factor authentication, mobile apps, and reporting.
Record ownership is at the core of Salesforce’s record access capabilities, which allow you to specify which users or types of users should be able to access specific records or types of records. Salesforce.com’s architects and developers have spent years creating a highly functional and massively scalable record access infrastructure around record ownership, saving you the monumental effort of building that infrastructure yourself.
In this post, you’ll learn how those years of heavy lifting have actually simplified record access for the most common enterprise security models, allowing you to configure record access declaratively instead of with painstakingly developed code. You’ll also get an “under the hood” view of record access, and learn how to implement your record access model and avoid potential pitfalls along the way.
It’s important that you are confident that your cloud provider has the world-class security and privacy solutions to adequately protect your data. So what does it take to trust a cloud? Read on to learn why you should trust salesforce.com cloud solutions with your assets.
Since the Code Consultations at Dreamforce ’12 were jam packed, I have decided to make the Code Consultations part of the Developer Zone at Cloudforce NY on October 19. The consultation will provide you help architecting or coding your application, as well as get technical help with building applications in the cloud. Reserve you private 1-on-1 code […]
The Security Workbook is a hands-on guide to the Salesforce platform’s least-privilege, user-centric security model. It explains the various policies, rules, and grouping mechanisms that control login and access controls.
Permission sets make salesforce.com admin’s lives easier by assigning permissions to users with more granularity than what a profile already provides. Using SOQL enables admins to view those permission assignments across their user’s profile and permission sets.