Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Security and Data Access Document

Security and Data Access Document

Ratings: (0)|Views: 290|Likes:
Published by Amit Sharma
BISP is committed to provide BEST learning material to the beginners and advance learners. In the same series, we have prepared a complete end-to end Hands-on Beginner’s Guide for SalesForce. The document focuses on
basic keywords, terminology and definitions one should know before starting SalesForce Join our professional training program and learn from experts.
BISP is committed to provide BEST learning material to the beginners and advance learners. In the same series, we have prepared a complete end-to end Hands-on Beginner’s Guide for SalesForce. The document focuses on
basic keywords, terminology and definitions one should know before starting SalesForce Join our professional training program and learn from experts.

More info:

Published by: Amit Sharma on Jan 03, 2014
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/09/2014

pdf

text

original

 
Getting Started with SalesForce CRM
Security and Data Access in SalesForce CRMDescription:
BISP is committed to provide BEST learning material to the beginners and advance learners. In the same series, we have prepared a complete end-to end Hands-on Beginner’s Gide !or Sales"orce. The docment !ocses on basic #e$words, terminolog$ and de!initions one shold #now be!ore starting Sales"orce  %oin or pro!essional training program and learn !rom e&perts.
History:
Version Description Change Author Publish Date0.!nitial Dra"t Chandra Pra#ash Shar$a0
th
 %o& '0(0.Re&ie)*A$it Shar$a0
th
 %o& '0( 
 
 ....................................................................................................................................( )estrict logins.................................................................................................................*+ogin hor restrictions ................................................................................................*+ogin Hors .............................................................................................................*)estricting +ogin IP ddresses ..................................................................................../etermine 0b1ect ccess Secrit$...................................................................................23iewing the 0b1ect ccess and "ield-+evel Secrit$ )eport .......................................2..................................................................................................................................24stom 0b1ect Secrit$ ..............................................................................................56anage record access with the role hierarch$ ...............................................................7)oles ...........................................................................................................................7How to Set )les .....................................................................................................8Permission Sets ........................................................................................................'(E&ceptions ....................................................................................................................'6anage !ield-level secrit$ ...........................................................................................'2"or 3iew "ield level Secrit$ .................................................................................'56anage "ield +evel Secrit$ ..................................................................................'7
 
 
 Restrict logins
 To help protect $or organi9ation’s data against nathori9ed access, $o have several options !or setting login restrictions.
+ogin hour restrictions :
I! login hor restrictions are set !or the ser:s pro!ile, an$ login attempt otside the speci!ied hors is denied. "or each pro!ile, $o can set the hors when sers can log in.
+ogin Hours :
Sales"orce provide to $o +ogin histor$ !eatres, ;o can set login hors in organi9ation Start or end time .
,R
Select the da$s and hors that sers with this pro!ile are allowed to log in. <ote that all times are e&act times speci!ic to a time 9one. +ogin hors will be applied at those e&act times even !or sers in di!!erent time 9ones.
Ho) to Set +ogin hours :
Setup
 =
Mange users
 =
Pro"ile
Select pro!ile name >E&- )ecriter ?> which want do $o need?. !ter then come to down on page there is $o can !ind
+ogin hours
. see below
Step  :-
!ter that clic# on
dit
 btton. then $o can see new page below.
Step ' :-
In this page $o can set Start or End time b$ da$, !ter that select login hors clic# on
Sa&e

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->