Description
Course info
Rating
(20)
Level
Intermediate
Updated
Nov 22, 2017
Duration
1h 24m
Description

Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. In this course, Play by Play: Understanding Salesforce Security, Irena Miziolek and Don Robins dive deep into the difference between visibility and security, setup of profiles, permission sets, and sharing model ownership, including org-wide defaults and sharing rules. Learn about implications of security settings on Visual Force and Lightening, and how to address more challenging sharing situations with Apex managed sharing. By the end of this course, you'll have a clear understanding of the many moving parts for both declarative and programmatic security configuration, and how they work together to properly secure your org’s data.

About the author
About the author

Don Robins is a well known Salesforce MVP, instructor, author, and speaker. A custom business application developer for more decades than he cares to admit, he focuses on Salesforce technical instruction and knowledge sharing.

More from the author
More courses by Don Robins
About the author

Irena Miziolek has been implementing Salesforce.com solutions since 2008, and holds multiple Salesforce.com certifications including technical architect and advanced developer. She is an active member in the CTA and certification communities, and a frequent DreamForce speaker. Irena comes from a classical development background in .NET.

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to this Salesforce Play by Play with Pluralsight. Salesforce Play by Play is an interactive series where we sit down with Salesforce experts such as MVPs, consultants, developers, and architects to discuss common challenges faced every day by Salesforce customers. We'll be learning while discussing concepts and debating tradeoffs on various approaches to solving real-world problems. We learn by reviewing system configurations or writing code and then exploring the benefits of any particular solution. In this course we challenge certified technical architect, Irena Miziolek, to show us how she guides her customers through the powerful complexities of the Salesforce Security model and related mechanisms. Using some very simple examples, Irena takes us on a deep dive into the differences between visibility and security and the powerful effects of profile and permission-set configuration. She walks us into the sharing model and reviews record ownership, org-wide defaults, sharing rules, and the role hierarchy. Along the way she takes a peek under the hood at the sharing tables, shows how the security features work with custom Visualforce and Apex and provides some tips and tricks for troubleshooting different security issues. By the time we're done, you'll have a clear understanding of the many moving parts for both declarative and programmatic security configuration and how they work together to properly secure your org's data. Whether you're an admin, developer, manager, or end user, come learn about how it all works. Please join us for Understanding Salesforce Security. We hope you enjoy it.