Appearance
Identity and Access
Overview
Securing your Salesforce org starts with controlling who can access what. The Principle of Least Privilege — giving users only the permissions they need to do their job — is the cornerstone of a healthy access model. In this chapter, you'll use User Access Summaries, reports, and Health Check to identify over-permissioned users and reel in that over-shared access.
What You'll Do
- Use User Access Summaries to audit individual user permissions
- Run reports to identify over-privileged users at scale
- Enforce the Principle of Least Privilege by correcting user profiles
- Understand the Salesforce security hierarchy: OWDs, profiles, permission sets, and permission set groups