Play by Play: Authenticating External App and Service Integrations with Salesforce

In this course, you’ll learn how the authentication and authorization mechanisms work, and your options for connecting external inbound and outbound integrations to your Salesforce org.
Course info
Rating
(16)
Level
Intermediate
Updated
Jun 4, 2018
Duration
2h 7m
Table of contents
Course Overview
Introduction and Setting the Stage
Calling out from Salesforce: Out of the Box
Calling out from Salesforce: Custom Authentication Providers
Calling into Salesforce: Configuration
Calling into Salesforce: Demos
Summary and Recap
Description
Course info
Rating
(16)
Level
Intermediate
Updated
Jun 4, 2018
Duration
2h 7m
Description

Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. In this course, Play by Play: Authenticating External App and Service Integrations with Salesforce, Chuck Liddell and Don Robins demonstrate how to choose from the many options available for securing external app and service integrations with Salesforce. Learn an overview of TLS and HTTP network mechanics, Apex callouts using Named Credentials to cleanly separate code from authentication configuration, OAuth and common Salesforce OAuth flows, and authenticating inbound calls to various Salesforce APIs using both SOAP and REST. By the end of this course, you’ll have gained deep and valuable insight into the flexible and powerful authentication mechanisms available for both inbound and outbound Salesforce integrations.

About the author
About the author

Don Robins is a well known Salesforce MVP, instructor, author, and speaker. A custom business application developer for more decades than he cares to admit, he focuses on Salesforce technical instruction and knowledge sharing

More from the author
More courses by Don Robins
About the author

Chuck comes from the trenches of enterprise Salesforce development. A developer and consultant on the platform for the last decade, he holds 21 Salesforce certifications and is a Salesforce MVP

More from the author
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
(Music) Welcome to this Salesforce Play by Play with Pluralsight. Salesforce Play by Play is an interactive series where we sit down with Salesforce experts, such as MVPs, consultants, developers, and architects, to discuss common challenges faced every day by Salesforce customers. We'll be learning while discussing concepts and debating tradeoffs on various approaches to solving real-world problems. We learn by reviewing system configurations or writing code, and then exploring the benefits of any particular solution. In this course, we challenge Chuck Liddell, technical architect and community leader, to help us understand how to choose from the many options available for securing external app and service integrations with Salesforce. First, Chuck sets the context and shapes our conversation around authorization versus authentication. He provides an overview of TLS and HTTP network mechanics, and using analogy simplifies the complexity of OAUTH and its basic flows. Then he takes us into a discussion of outbound integrations initiated from Salesforce, and the power and flexibility of named credentials, a declarative low-code security mechanism. He shows us Apex callouts using named credentials to cleanly separate code from authentication configuration, and demonstrates both password and OAuth callouts, introducing auth providers and showing how they complement named credentials. Chuck then takes us on a deep dive into custom auth provider implementations, and how developers can build their own using Apex code. We change direction, and Chuck dissects the various use cases for inbound calls to Salesforce, exploring how service and app integrations depend on a Salesforce feature called the connected app. Along the way, he demonstrates authenticating inbound calls to various Salesforce APIs using both SOAP and REST, shows us some freely available developer tools, and demystifies the different kinds of tokens used in authentication processes. By the time we're done, you'll have gained some deep and valuable insight into the flexible and powerful authentication mechanisms available for both inbound and outbound Salesforce integrations, and you'll have a solid understanding of how to best configure your own application and service integrations with your Salesforce org. So, please join us for Authenticating External App and Service Integrations with Salesforce.