{"id":47806,"date":"2018-01-18T05:58:42","date_gmt":"2018-01-18T00:28:42","guid":{"rendered":"http:\/\/blog.odango.com\/?p=47806"},"modified":"2023-02-03T17:48:31","modified_gmt":"2023-02-03T12:18:31","slug":"a-guide-on-salesforce-security-models","status":"publish","type":"post","link":"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/","title":{"rendered":"A Guide on Salesforce Security Models &#8211; 2018"},"content":{"rendered":"\n[et_pb_section bb_built=&#8221;1&#8243; next_background_color=&#8221;#000000&#8243;][et_pb_row][et_pb_column type=&#8221;4_4&#8243;][et_pb_post_title _builder_version=&#8221;3.0.105&#8243; title=&#8221;on&#8221; meta=&#8221;off&#8221; author=&#8221;on&#8221; date=&#8221;on&#8221; categories=&#8221;on&#8221; comments=&#8221;on&#8221; featured_image=&#8221;off&#8221; featured_placement=&#8221;below&#8221; text_color=&#8221;dark&#8221; text_background=&#8221;off&#8221; title_font=&#8221;Source Sans Pro||||||||&#8221; title_font_size=&#8221;47&#8243; title_font_size_tablet=&#8221;40&#8243; title_font_size_phone=&#8221;35&#8243; title_font_size_last_edited=&#8221;on|desktop&#8221; title_text_color=&#8221;rgba(0,0,0,0.8)&#8221; title_text_align=&#8221;left&#8221; text_shadow_horizontal_length=&#8221;0.08em&#8221; text_shadow_vertical_length=&#8221;0.08em&#8221; text_shadow_blur_strength=&#8221;0.08em&#8221; title_text_shadow_horizontal_length=&#8221;0.08em&#8221; title_text_shadow_vertical_length=&#8221;0.08em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;|||10%&#8221; \/][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=&#8221;4_4&#8243;][et_pb_text _builder_version=&#8221;3.12.2&#8243; text_font=&#8221;Titillium Web|300|||||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_line_height=&#8221;1.6em&#8221; max_width=&#8221;800px&#8221; custom_margin=&#8221;|||10%&#8221;]\r\n\r\n<a href=\"https:\/\/asha24.net\/blog\/guide-on-salesforce-crm-and-its-types\/\">Salesforce<\/a> is created by security to protect your data and applications. You can also give your own security scheme to reveal the design and demands of your business. Protecting your data is a joint responsibility between you and Salesforce.\r\n\r\nBefore we get started implementing our security and sharing rules, let&#8217;s quickly take a look at all the ways that we can control data on the platform:\r\n\r\nSalesforce provides various techniques to ensure data security.\r\n\r\n[\/et_pb_text][et_pb_image _builder_version=&#8221;3.0.106&#8243; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; force_fullwidth=&#8221;off&#8221; show_bottom_space=&#8221;on&#8221; src=&#8221;https:\/\/asha24.net\/blog\/\/wp-content\/uploads\/2018\/03\/download-107.png&#8221; align=&#8221;center&#8221; \/][et_pb_text _builder_version=&#8221;3.12.2&#8243; text_font=&#8221;Titillium Web|300|||||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_line_height=&#8221;1.6em&#8221; max_width=&#8221;800px&#8221; custom_margin=&#8221;|||10%&#8221;]\r\n\r\n<strong>Object-Level Security:<\/strong>\r\n\r\nWe can control data by preventing a Manager from viewing, creating, editing, or deleting an instance of a particular type of object, like a position or review.\r\n\r\nOn the platform, we fix the object-level access among object permissions in Manager Profiles and permission sets.\r\n\r\n<strong>Field-Level Security:<\/strong>\r\n\r\nA user can be prevented from viewing, editing, or removing the value form a particular field of the object. Field-level access concedes us to hide sensitive information like the maximum salary for a position or a candidate&#8217;s social security number outwardly having to hide the total object.\r\n\r\nOn the platform, we set field-level access with field permissions, also in profiles and permission sets. We&#8217;ll also learn more about them shortly.\r\n\r\n<strong>Record-Level Security:<\/strong>\r\n\r\nIt&#8217;s Ensure the data security of your confidential customer data and other company data. And it will restrict access to sensitive data\r\n\r\n1.\u00a0\u00a0\u00a0 Give people access to the records they need to work on or collaborate on.\r\n\r\n2.\u00a0\u00a0\u00a0 Promote efficiency without exposing sensitive information.\r\n\r\n3.\u00a0\u00a0\u00a0 Restrict searches in order to show only relevant records.\r\n\r\n4.\u00a0\u00a0\u00a0 A Below image showing sharing and security settings available for different types of Managers.\r\n\r\n<strong>Profiles:<\/strong>\r\n\r\nIn Salesforce, profiles manage access to object-level and field-level security with another thing like apps, tabs, and etc.,\r\n\r\n<strong>Create profile:<\/strong>\r\n<ul>\r\n \t<li>Log in to \u201c<a href=\"https:\/\/developer.salesforce.com\/signup\">SFDC DEVELOPER ACCOUNT<\/a>\u00a0\u201c.<\/li>\r\n \t<li>The home page on the left side select Users.<\/li>\r\n \t<li>Click on profiles &amp; fill the New User details.<\/li>\r\n<\/ul>\r\n[\/et_pb_text][et_pb_image _builder_version=&#8221;3.0.106&#8243; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; force_fullwidth=&#8221;off&#8221; show_bottom_space=&#8221;on&#8221; src=&#8221;https:\/\/asha24.net\/blog\/\/wp-content\/uploads\/2018\/03\/download-1-13.png&#8221; align=&#8221;center&#8221; \/][et_pb_text _builder_version=&#8221;3.12.2&#8243; text_font=&#8221;Titillium Web|300|||||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_line_height=&#8221;1.6em&#8221; max_width=&#8221;800px&#8221; custom_margin=&#8221;|||10%&#8221;]\r\n<ul>\r\n \t<li>Giving the appropriate permissions.<\/li>\r\n<\/ul>\r\n[\/et_pb_text][et_pb_image _builder_version=&#8221;3.0.106&#8243; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; force_fullwidth=&#8221;off&#8221; show_bottom_space=&#8221;on&#8221; src=&#8221;https:\/\/asha24.net\/blog\/\/wp-content\/uploads\/2018\/03\/download-2-10.png&#8221; align=&#8221;center&#8221; \/][et_pb_text _builder_version=&#8221;3.12.2&#8243; text_font=&#8221;Titillium Web|300|||||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_line_height=&#8221;1.6em&#8221; max_width=&#8221;800px&#8221; custom_margin=&#8221;|||10%&#8221;]\r\n\r\n<strong>Permission sets:<\/strong>\r\n\r\nPermission sets are utilized to implement additional permissions to users are already in a profile.\r\n<ul>\r\n \t<li>Click on Users below that select Permission sets.<\/li>\r\n<\/ul>\r\n[\/et_pb_text][et_pb_image _builder_version=&#8221;3.0.106&#8243; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; force_fullwidth=&#8221;off&#8221; show_bottom_space=&#8221;on&#8221; src=&#8221;https:\/\/asha24.net\/blog\/\/wp-content\/uploads\/2018\/03\/download-3-8.png&#8221; align=&#8221;center&#8221; \/][et_pb_text _builder_version=&#8221;3.12.2&#8243; text_font=&#8221;Titillium Web|300|||||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_line_height=&#8221;1.6em&#8221; max_width=&#8221;800px&#8221; custom_margin=&#8221;|||10%&#8221;]\r\n<ul>\r\n \t<li>Assign Permission to set users.<\/li>\r\n<\/ul>\r\n[\/et_pb_text][et_pb_image _builder_version=&#8221;3.0.106&#8243; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; force_fullwidth=&#8221;off&#8221; show_bottom_space=&#8221;on&#8221; src=&#8221;https:\/\/asha24.net\/blog\/\/wp-content\/uploads\/2018\/03\/download-4-12.png&#8221; align=&#8221;center&#8221; \/][et_pb_text _builder_version=&#8221;3.12.2&#8243; text_font=&#8221;Titillium Web|300|||||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_line_height=&#8221;1.6em&#8221; max_width=&#8221;800px&#8221; custom_margin=&#8221;|||10%&#8221;]\r\n<h3 style=\"font-weight: 500;\"><b><strong>\u00a0Tips:<\/strong><\/b><\/h3>\r\n<table style=\"font-weight: 400;\">\r\n<tbody>\r\n<tr>\r\n<td>\r\n<ul>\r\n \t<li>We can add and remove permissions upon a minute subset of users at any period.<\/li>\r\n \t<li>We can add various permission sets to a particular user.<\/li>\r\n \t<li>Utilize permission sets just when a subset of users requires additional permissions.<\/li>\r\n \t<li>Where a number of people into a profile need such permission, then build a custom profile and add permission immediately to the profile.<\/li>\r\n<\/ul>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<ul style=\"font-weight: 400;\">\r\n \t<li>In field-level, we can view the details of user like maximum salary and field-level permissions or we can hide the complete object.<\/li>\r\n<\/ul>\r\n[\/et_pb_text][et_pb_image _builder_version=&#8221;3.0.106&#8243; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; force_fullwidth=&#8221;off&#8221; show_bottom_space=&#8221;on&#8221; src=&#8221;https:\/\/asha24.net\/blog\/\/wp-content\/uploads\/2018\/03\/download-5-8.png&#8221; align=&#8221;center&#8221; \/][et_pb_text _builder_version=&#8221;3.12.2&#8243; text_font=&#8221;Titillium Web|300|||||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_line_height=&#8221;1.6em&#8221; max_width=&#8221;800px&#8221; custom_margin=&#8221;|||10%&#8221;]\r\n<ul>\r\n \t<li>You can provide specific Users to see the object, but restrict the single object records that they&#8217;re authorized to see.<\/li>\r\n<\/ul>\r\n<strong>Types of record-level security<\/strong>\r\n\r\n<strong>Organization-wide defaults:<\/strong>\r\n\r\n<a href=\"https:\/\/help.salesforce.com\/apex\/HTViewHelpDoc?id=admin_sharing.htm&amp;language=en_us\">Organization-wide defaults<\/a> (OWD) control the default behavior of how all records of a given object are accessed by Managers who don\u2019t own the record.\r\n\r\nE.g.:\r\n<ul>\r\n \t<li>OWD Accounts are Private; it means Manager can only view his\/her own record details.<\/li>\r\n<\/ul>\r\n[\/et_pb_text][et_pb_image _builder_version=&#8221;3.0.106&#8243; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; force_fullwidth=&#8221;off&#8221; show_bottom_space=&#8221;on&#8221; src=&#8221;https:\/\/asha24.net\/blog\/\/wp-content\/uploads\/2018\/03\/download-6-5.png&#8221; align=&#8221;center&#8221; \/][et_pb_text _builder_version=&#8221;3.12.2&#8243; text_font=&#8221;Titillium Web|300|||||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_line_height=&#8221;1.6em&#8221; max_width=&#8221;800px&#8221; custom_margin=&#8221;|||10%&#8221;]\r\n<ul>\r\n \t<li>OWD for Accounts are Read\/Write, it suggests anyone can read and update (but not to delete) the record.<\/li>\r\n<\/ul>\r\n[\/et_pb_text][et_pb_image _builder_version=&#8221;3.0.106&#8243; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; force_fullwidth=&#8221;off&#8221; show_bottom_space=&#8221;on&#8221; src=&#8221;https:\/\/asha24.net\/blog\/\/wp-content\/uploads\/2018\/03\/download-8-5.png&#8221; align=&#8221;center&#8221; \/][et_pb_text _builder_version=&#8221;3.12.2&#8243; text_font=&#8221;Titillium Web|300|||||||&#8221; text_font_size=&#8221;20&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_line_height=&#8221;1.6em&#8221; max_width=&#8221;800px&#8221; custom_margin=&#8221;|||10%&#8221;]\r\n\r\nIf you liked what you read and wish to know more about Salesforce, can go through other <a href=\"https:\/\/asha24.net\/blog\/step-by-step-guide-to-salesforce-personal-and-app-setup\/\">blogs<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section bb_built=&#8221;1&#8243; prev_background_color=&#8221;#000000&#8243;][et_pb_row][et_pb_column type=&#8221;4_4&#8243;][et_pb_team_member _builder_version=&#8221;3.0.106&#8243; name=&#8221;Arun Gandham&#8221; position=&#8221;Author&#8221; facebook_url=&#8221;&#8221; twitter_url=&#8221;&#8221; google_url=&#8221;&#8221; linkedin_url=&#8221;&#8221; image_url=&#8221;https:\/\/asha24.net\/blog\/\/wp-content\/uploads\/2018\/03\/123456.gif&#8221; background_layout=&#8221;light&#8221; header_font=&#8221;Titillium Web|700|||||||&#8221; body_font=&#8221;Titillium Web||||||||&#8221; body_font_size=&#8221;16&#8243;]\r\n\r\nHola peeps! A fitness freak, a lover of games, I catch a flick on the weekends and write for you about current trends.\r\n\r\n[\/et_pb_team_member][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":47824,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[30],"tags":[],"class_list":["post-47806","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-salesforce"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Guide on Salesforce Security Models - 2018 - Asha24 Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Guide on Salesforce Security Models - 2018 - Asha24 Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/\" \/>\n<meta property=\"og:site_name\" content=\"Asha24 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-18T00:28:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-03T12:18:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/asha24.net\/blog\/wp-content\/uploads\/2018\/03\/salesforce-security-models-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"970\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mahesh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/asha24.net\/blog\/#website\",\"url\":\"https:\/\/asha24.net\/blog\/\",\"name\":\"Asha24 Blog\",\"description\":\"Dedication Towards Learning\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/asha24.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/asha24.net\/blog\/wp-content\/uploads\/2018\/03\/salesforce-security-models-1.jpg\",\"contentUrl\":\"https:\/\/asha24.net\/blog\/wp-content\/uploads\/2018\/03\/salesforce-security-models-1.jpg\",\"width\":970,\"height\":646},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#webpage\",\"url\":\"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/\",\"name\":\"A Guide on Salesforce Security Models - 2018 - Asha24 Blog\",\"isPartOf\":{\"@id\":\"https:\/\/asha24.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#primaryimage\"},\"datePublished\":\"2018-01-18T00:28:42+00:00\",\"dateModified\":\"2023-02-03T12:18:31+00:00\",\"author\":{\"@id\":\"https:\/\/asha24.net\/blog\/#\/schema\/person\/f6167b78bbaddfc399ae1154cd5b6759\"},\"breadcrumb\":{\"@id\":\"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/asha24.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Guide on Salesforce Security Models &#8211; 2018\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/asha24.net\/blog\/#\/schema\/person\/f6167b78bbaddfc399ae1154cd5b6759\",\"name\":\"Mahesh\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/asha24.net\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/085c03e75ffb51af2509c1cfad9c7d78b30236d43a008db2e46f96e2f40c67fc?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/085c03e75ffb51af2509c1cfad9c7d78b30236d43a008db2e46f96e2f40c67fc?s=96&d=wavatar&r=g\",\"caption\":\"Mahesh\"},\"url\":\"https:\/\/asha24.net\/blog\/author\/mahesh\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Guide on Salesforce Security Models - 2018 - Asha24 Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/","og_locale":"en_US","og_type":"article","og_title":"A Guide on Salesforce Security Models - 2018 - Asha24 Blog","og_url":"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/","og_site_name":"Asha24 Blog","article_published_time":"2018-01-18T00:28:42+00:00","article_modified_time":"2023-02-03T12:18:31+00:00","og_image":[{"width":970,"height":646,"url":"https:\/\/asha24.net\/blog\/wp-content\/uploads\/2018\/03\/salesforce-security-models-1.jpg","path":"\/home\/reviews981\/public_html\/asha24.net\/blog\/wp-content\/uploads\/2018\/03\/salesforce-security-models-1.jpg","size":"full","id":47824,"alt":"","pixels":626620,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mahesh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/asha24.net\/blog\/#website","url":"https:\/\/asha24.net\/blog\/","name":"Asha24 Blog","description":"Dedication Towards Learning","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/asha24.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#primaryimage","inLanguage":"en-US","url":"https:\/\/asha24.net\/blog\/wp-content\/uploads\/2018\/03\/salesforce-security-models-1.jpg","contentUrl":"https:\/\/asha24.net\/blog\/wp-content\/uploads\/2018\/03\/salesforce-security-models-1.jpg","width":970,"height":646},{"@type":"WebPage","@id":"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#webpage","url":"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/","name":"A Guide on Salesforce Security Models - 2018 - Asha24 Blog","isPartOf":{"@id":"https:\/\/asha24.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#primaryimage"},"datePublished":"2018-01-18T00:28:42+00:00","dateModified":"2023-02-03T12:18:31+00:00","author":{"@id":"https:\/\/asha24.net\/blog\/#\/schema\/person\/f6167b78bbaddfc399ae1154cd5b6759"},"breadcrumb":{"@id":"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/asha24.net\/blog\/a-guide-on-salesforce-security-models\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/asha24.net\/blog\/"},{"@type":"ListItem","position":2,"name":"A Guide on Salesforce Security Models &#8211; 2018"}]},{"@type":"Person","@id":"https:\/\/asha24.net\/blog\/#\/schema\/person\/f6167b78bbaddfc399ae1154cd5b6759","name":"Mahesh","image":{"@type":"ImageObject","@id":"https:\/\/asha24.net\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/085c03e75ffb51af2509c1cfad9c7d78b30236d43a008db2e46f96e2f40c67fc?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/085c03e75ffb51af2509c1cfad9c7d78b30236d43a008db2e46f96e2f40c67fc?s=96&d=wavatar&r=g","caption":"Mahesh"},"url":"https:\/\/asha24.net\/blog\/author\/mahesh\/"}]}},"_links":{"self":[{"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/posts\/47806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/comments?post=47806"}],"version-history":[{"count":8,"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/posts\/47806\/revisions"}],"predecessor-version":[{"id":52136,"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/posts\/47806\/revisions\/52136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/media\/47824"}],"wp:attachment":[{"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/media?parent=47806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/categories?post=47806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/asha24.net\/blog\/wp-json\/wp\/v2\/tags?post=47806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}