An overview of the new Salesforce Shield Encryption feature with a focus on developer strategies with SOQL, Apex, and point-and-click development features. Peter Chittum, Developer Evangelist, and Assaf Ben-Gur, Product Manager for the encryption feature break down the key features of platform encryption, how to enable the feature, and how it fits into the context of the whole suite of security tools that every Salesforce customer has in their environment. While platform encryption preserves much of the key business functionality of the platform, some features are currently limited. As such we discuss and suggest specific work-arounds to get the most out of encryption when you decide to enable it.
If you've seen the news lately, you know you need strong security protections for your online systems. Join us as we teach you that access control features like IP range restrictions, identity confirmation, and two-factor authentication are absolutely critical to the protection of your Salesforce instance. Hear from Salesforce security engineers about how these protections work, threats they mitigate, and possible drawbacks. We'll also teach you some tricks to securely using Salesforce alongside these features.
The Summer'15 Release of Salesforce is going live during the second week of June. Find out what's new in the Security and Compliance areas in the new release.
In this presentation, we will discuss Salesforce Security Best Practices for Every Admin. Following these advanced Salesforce Security best practices will help us get most of the powerful and out-of-the-box Salesforce CRM system. Through it, Salesforce admins can easily leverage all of the platform’s features to safeguard their company and customers' data.
When an employee or contractor is hired in an organization, admins need to grant them access to Salesforce and other applications. Employees need an easy way to launch these applications without having to remember their URLs or passwords. And, when the employee leaves the organization, their accounts need to be disabled across all the applications. Join us to learn how to implement Salesforce Identity features to simplify user lifecycle management, single sign-on (SSO) for your applications, and how customers are using it to solve their business problems.
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
This document summarizes 7 things that will make businesses love their developers again when using the Force.com platform. It highlights how Force.com handles infrastructure concerns so developers can focus on building apps. It also provides examples of customizable objects and fields, real-time customization, security and sharing controls, social features, process automation, reporting and analytics, and an app marketplace for integration.
Preparing to integrate? Join us to better understand how to store sensitive secrets on the Force.com Platform. Learn all the best practices for keeping your passwords, keys, and tokens secure. We will walk you through encrypted fields, protected custom settings, managed packages, and the brand new Named Credentials feature to provide you with all the knowledge you need to store a secret.
With Active Directory being the system of record for user identities at many organizations, keeping users in sync with Salesforce is a challenge. Salesforce Identity Connect allows you to sync users from Active Directory into Salesforce, authenticate users into Salesforce using Active Directory credentials, and provide seamless Single Sign-on using Integrated Windows Authentication (IWA). Join us to learn about this new product offering from Salesforce.
Presented these slides at Jaipur Dev Fest #JDF18 on 28 July 2018 to the developer community with the intent to list all the integration options and solutions with use cases.
This document provides an overview of how to integrate applications with the Salesforce platform using various APIs and frameworks. It discusses authentication methods like OAuth and endpoints for accessing data and functionality like the REST, SOAP, and Bulk APIs. It also covers using Canvas to embed third-party apps, calling external APIs from Apex, and exposing Apex code via endpoints.
Salesforce is an open and easily extensible platform. However, sometimes it's hard to figure out the best, most secure way to build these integrations. Join us as we help you build secure integrations with Salesforce by understanding the platform authentication and authorization constructs like profile permissions and OAuth scopes. We will demonstrate the importance of leveraging Salesforce security features like mutual SSL, IP range restrictions, and Connected Apps.
Salesforce Identity provides single sign-on, identity, and access management through a centralized cloud platform that allows users to securely login once to access all their apps, automates user provisioning and management across applications, and offers open standards-based integration with enterprise directories and applications. The platform offers extensibility, reporting, analytics, and the ability to run custom identity services.
Description: With the Summer '15 release, you will be able to automatically create, update, and delete user accounts on services such as Google and Box, based on changes to user accounts in your Salesforce organization or Active Directory service. This feature also provides a centralized view of all user accounts across your applications and services. Learn how you can automate user account management across third-party applications and services! What you will learn: How user events, such as creating a user or assigning a permission set, can trigger corresponding updates in third-party services How automatic de-provisioning of third-party user accounts can improve security while saving you time and money How Salesforce Identity Connect can capture events in Active Directory and apply user provisioning updates to Salesforce that in turn can trigger updates to an external application How approval processes, auditing, and reporting help you manage user accounts effectively Intended audience Existing or prospective Salesforce Platform admins and developers ISV partners who want to package this feature to automate user creation and deletion in their applications running outside the Salesforce platform.
Managing large role hierarchies at enterprise scale presents challenges. Regular maintenance is needed to optimize performance as roles and data grow. Best practices include setting minimum role defaults, regularly deleting unused roles via API, and following guidance for major sharing changes to avoid performance issues. Symantec reduced their roles by 30,000 through analyzing sharing rules and portal roles with no users assigned. Periodic reviews help ensure a scalable and efficient security model.
Looking to expand your Sales, Service, and Marketing efforts into customer touchpoints on the web? Join us to learn how Salesforce Identity can help you recognize and delight your customer across all channels. You'll learn how to use Salesforce Identity to provide social sign-on, branded user registration, single sign-on across third-party web properties, and achieve a single view of your customer. Leave ready to transform your business!
In this presentation Roy Gilad display the diffrent ways to create integration with and using Salesforce.
Most organizations use Microsoft Active Directory as a system of record for their users. Join us to learn how you can easily integrate Salesforce with Active Directory to synchronize users and provide single sign-on (SSO). Your users and security teams will thank you!
Devendra Sawant and Shraddha Salvi presented on various topics from the Salesforce Summer '20 release. Key points included: 1. The new Split List View feature allows users to see list view data and a selected record simultaneously. Dynamic Forms allow creating sub-sections on Lightning pages with visibility rules. 2. The Salesforce Optimizer tool is now an interactive app to analyze org performance. The new In-App Guidance Builder simplifies creating prompts and guidance for users. 3. Major Flow updates include running flows after record saves, triggering flows from platform events, simplified loop elements, bypassing permissions, and passing records from Lightning pages. 4. Additional topics
Platform Encryption allows customers to encrypt data at rest in Salesforce while preserving functionality. ISVs need to test if their apps work with encrypted fields, as certain functions like SOQL WHERE clauses will fail. The roadmap includes allowing encryption on managed custom fields in Summer 2016. ISVs should update apps to use alternatives like SOSL where SOQL fails to ensure apps continue working with encryption.
The document provides an overview of a platform session on deep diving into the Salesforce platform. It begins with forward-looking statements and limitations. The presenter then introduces himself and his background. The presentation discusses building applications on the Salesforce platform using Heroku and leveraging add-ons. It provides an example of building a treasure hunt web app within a week using these tools to enable quick time-to-market and scalability.
The slide deck of Lightning Dev Week, presented in Bangalore Salesforce Developer Group, on March 14th 2015.
The Salesforce DX tool-set dramatically improves the development process for programmatic creation on the Salesforce platform but admins can use these same tools to streamline the declarative creation process as well. These slides were part of the Dreamforce 2017 admin track presentation titled "Salesforce DX - an Admin's Perspective" given on November 7, 2017.
Presentation on Platform Encryption feature of Salesforce platform. "Encryption as a Service" on Salesforce combines strong encryption and customer ownership of keys with ease of implementation. This presentation is oriented toward non-technical administrators who will need to understand the basic features of Platform Encryption, and what it means to maintain their org when using it.
How safe are your Lightning Components? Join us and learn about the foundations required for a secure application built on Lightning. We'll cover common misconceptions around field-level security, CRUD, content security policy (CSP), as well as other common mistakes with Lightning. You'll walk away with all the best practices for hardening your application and keeping your data secure.
This session will show mobile developers how to build enterprise Android applications using our new Salesforce Mobile SDK. Not only will users be shown how to use the new features and functions of the SDK but we'll also dive into best practices for building mobile APIs focussed on enterprise business applications.
This document provides an agenda and information for a community group meeting on strengthening data security with Shield Platform Encryption. The agenda includes a welcome, presentation on Shield Platform Encryption, and Q&A session. The document also provides background on the community group leaders and goals of the group to learn, connect, have fun, and give back to the community. It concludes with a welcome message for new members.
We recently announced over 300 new features and enhancements at TrailheaDX '19 and for the Summer '19 release. In our Developer Highlights webinar we explore the top features with in-depth demos, including the latest updates for Lightning Web Components (LWC), LWC Open Source, CLI updates, Change Data Capture for external objects, Asynchronous Apex Triggers, Notification Builder and more. Watch the recording here: https://youtu.be/kmOkk74QiCo