Skip to main content

Solutioning with Security: Permissions and Sharing Considerations

  • Chapter
  • First Online:
Practical Salesforce Development Without Code
  • 548 Accesses

Abstract

Although one chapter is not nearly enough to cover all of its facets, I would be remiss to completely omit security considerations in this book. The world of Salesforce security is vast and involves a number of features and intricacies. However, I believe that I can break down the key security elements, as they relate to Salesforce development without code, in a meaningful, understandable way to help you as you build declarative solutions on the platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    All Salesforce screenshots in this chapter © copyright Salesforce, Inc. Used with permission.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Philip Weinmeister

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Weinmeister, P. (2019). Solutioning with Security: Permissions and Sharing Considerations. In: Practical Salesforce Development Without Code. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4871-3_15

Download citation

Publish with us

Policies and ethics