Designing Security

This chapter began with a brief discussion of why security is so central to the well-being of your application. As the remainder of the chapter has demonstrated, you have an extremely flexible security model for components and data on the Force Platform.

The flexibility you have with component permissions and record sharing can deliver a sophisticated implementation scheme, but arriving at the proper definition of that scheme is, in most cases, non-trivial. You should create a robust security plan, which takes into account the eventual uses of your applications and data, as part of your design process. Although you can change the security implementation in your Force Platform org at any time, you should start to plan security ...

Get The Developer’s Guide to the Force.com Platform now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.