|
User Management Best Practices
When managing user access to your Salesforce org, your first priority is to ensure users have access to the data they need to do their job. It’s also important to establish an approach that provides flexibility in the future and simplifies the process for you. To keep your data safe and eliminate headaches down the road, create a plan for what type of access users need to see what they need to see and only what they need to see. Assigning the right profiles, roles, and data access means you will have more flexibility in the future. Using the right data access methods will help simplify user management as your teams grow and change. Consider a comprehensive user management strategy that incorporates these best practices. Get the full user management scoop via this user management trailmix on Trailhead, our free, hands-on learning platform. Manage Users • Create Logins Take the User Management module on Trailhead to learn how to create usernames and login accounts for your users. • Assign accurate profiles to grant object access Watch the Who Sees What: Object Access video to learn how to grant users access to objects by using profiles. • Increase object access through permission sets Watch the Who Sees What: Permission Sets video to learn how to use permission sets to grant access to objects outside of profiles. Take the Permission Set Groups module on Trailhead to learn how to bundle permission sets for a job function. • Assign accurate roles to grant record access Watch the Who Sees What: Record Access video to learn how to assign users to a role hierarchy to provide access to records accessible within their team. • Determine and grant data access Watch the Who Sees What: Organization-Wide Defaults video to learn how to determine what data is private and what data is shared. Learn About the Multi-factor Authentication Requirement Effective February 1, 2022, all customers are contractually required to use MFA when accessing Salesforce products. Customer trust is our highest priority at Salesforce, which is why we build security into our products from the ground up. But keeping up with the evolving security landscape is an ongoing, joint partnership between Salesforce and our customers. As security threats grow more common, it's important to implement strong security measures that protect your business. 1. Take the User Authentication module on Trailhead to learn how to Secure your org with multi-factor authentication, My Domain, and single sign-on. 2. Learn how to implement and roll out MFA to your users with the MFA Quick Guide for Admins. 3. Download the MFA Authentication Rollout Pack for planning and change management templates and guidance. 4. Explore the MFA FAQ document to learn about the MFA requirement. 5. Watch the Introduction to Salesforce Authenticator video to learn how to use Salesforce Authenticator for MFA logins. Keep the Momentum Going Whether you are just getting started with user management, or you want to explore more ways to improve how your users are set up, we’ve got resources for you to keep the momentum going. 1. Attend the Application Security expert coaching webinar to learn how to build safeguards into your Salesforce org to protect your data. Premier and Signature customers can request an individual follow-up. 2. Update your user settings to incorporate profiles, permission sets, roles, and data security. Take a look at the AppExchange Profiles and Permission Set Helper to report, analyze, and manage your user permissions. 3. Take the Data Security module on Trailhead to learn how to control access to data using point-and-click security tools. 4. Need additional guidance? Connect with other Trailblazers and experts on the Customer Success Group on the Trailblazer Community. 5. Explore our Salesforce Support YouTube channel for answers to our most frequently asked questions.
As DreamHouse grew, their sales and service teams became more distinct and needed to focus on their respective roles and to access different sets of data. Sales needed access to opportunities, and the service team needed access to cases. Other objects were unnecessary and a distraction. Knowing they needed a new user management strategy, DreamHouse's admin went to the User Management and Permission Set Groups Trailhead modules to learn how to create custom profiles and roles and how to set up new, organization-wide defaults. These adjustments, along with new sharing rules, permission sets, and permission set groups creates more flexibility and simplifies management of permission sets as their sales and service teams grow. After watching the Who Sees What video series to see these aspects of user management in action, the admin implemented new profiles for each team, assigned roles, and fine-tuned data access through organization-wide defaults and sharing rules. The new strategy gave each team the access they needed to do their jobs, and set them up to adjust access as changing needs arise. |
000389249

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.