You are here:
Control Authorization with Custom Profiles and Roles
In identity and access management, it's important to control who is authorized to access resources. You can manage authorization by assigning your users profiles and roles. Profiles define how users access data and what they can do in Salesforce. Roles allow you to create a user hierarchy so that users can access data owned or shared by subordinates.
Salesforce provides standard profiles with pre-configured permissions and settings that define authorization. For more fine-grained control, you can clone a standard profile and edit its permissions. To modify a standard profile and assign it to a user, take these steps.
- From Setup, in the Quick Find box, enter Profiles, then select Profiles.
- Next to External Identity User, click Clone.
- Enter a name for the profile and save.
- To customize the profile, click Edit. You can modify the
permissions associated with the profile.
- Click Edit.
- Search for API Enabled, and then select the checkbox next to this permission.API Enabled gives users API access to your org’s data through any back-end mechanism.
- Click Save.
- Create a role structure.Sites require a user role hierarchy to help control how users share Salesforce data. Assign a role to the user who manages your site.
- From Setup, enter Role in the Quick Find box, then select Roles.
- From the dropdown list, select Product-based Sample, then select Set Up Roles.
- Under CEO, click Add Role.
- For the role label, enter Customer Manager.
- Click Save.
- Add the Customer Manager role to the user site manager so that the manager can modify
the Customer profile.Note The person who manages the site for your company must have a role. However, you can’t assign roles to users who have the External Identity license, which enables access to the Salesforce Customer Identity product.
- From Setup, enter Users in the Quick Find box, then select Users.
- Next to your username, click Edit.
- Under Role, select Customer Manager.
- Click Save.
You’ve now learned the basics of authorizing users. For more information about configuring authorization, check out the Data Security Trailhead module. For more information about creating users and securing access, see the User Management Trailhead module.

