Summary
Record-level security is one of the most important topics when designing a successful Salesforce implementation. By completing this chapter, we have learned about the power of the Salesforce sharing model and all its possible options, from permissions to org-wide defaults, mastering sharing rules and role hierarchies, segmenting your accounts with Enterprise Territory Management, and controlling how Salesforce communities play a role in oversharing.
The Salesforce platform runs in a multi-tenant architecture, which means our Salesforce organization runs on the same server as other Salesforce organizations, which in turn means that we are all using the same resources. To keep your customization clean and performant, we need to know ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access