December 2013
Intermediate to advanced
448 pages
13h 44m
English
To begin the design process, review the fundamentals of Force.com security and the sample application’s security requirements:
Force.com data security has two facets: profiles and the sharing model. Profiles protect objects and their fields, and the sharing model controls access to individual records.
Data security in the sample application is determined by an employee’s job function and business unit. Job functions are identical across business units, and business units do not normally share data.
The design strategy ...