{"id":26653,"date":"2025-06-06T10:15:48","date_gmt":"2025-06-06T14:15:48","guid":{"rendered":"https:\/\/www.h2kinfosys.com\/blog\/?p=26653"},"modified":"2025-06-06T10:16:26","modified_gmt":"2025-06-06T14:16:26","slug":"salesforce-security-controls-and-access-management-explained","status":"publish","type":"post","link":"https:\/\/www.h2kinfosys.com\/blog\/salesforce-security-controls-and-access-management-explained\/","title":{"rendered":"Salesforce Security Controls and Access Management Explained"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Introduction: Why Security Is the Core of Salesforce Success<\/strong><\/h2>\n\n\n\n<p>Imagine granting your sales team full access to sensitive customer data without restrictions. Now imagine an intern mistakenly deleting client records. Without proper security, such scenarios are not only possible but common. That\u2019s where Salesforce Security Controls come in.<\/p>\n\n\n\n<p>With Salesforce powering customer relationships for over 150,000 businesses globally, secure access management is more critical than ever. Whether you&#8217;re enrolled in a salesforce online course or advancing through <a href=\"https:\/\/www.h2kinfosys.com\/courses\/salesforce-admin-certification\/\">Salesforce admin training courses<\/a>, this foundational knowledge is essential to your success.<\/p>\n\n\n\n<p>In this blog, we\u2019ll explore every key element of Salesforce\u2019s robust security framework from login access to record-level sharing. Whether you&#8217;re aiming to become a certified Salesforce admin or developing your skills in salesforce developer training classes, this guide will give you practical insights to manage security like a pro.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Are Salesforce Security Controls?<\/strong><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"700\" src=\"https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/image-3-1024x700.png\" alt=\"\" class=\"wp-image-26662\" style=\"width:582px;height:auto\" title=\"\" srcset=\"https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/image-3-1024x700.png 1024w, https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/image-3-300x205.png 300w, https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/image-3-768x525.png 768w, https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/image-3-1536x1051.png 1536w, https:\/\/www.h2kinfosys.com\/blog\/wp-content\/uploads\/2025\/06\/image-3.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>Salesforce Security Controls are mechanisms designed to protect data, manage access, and enforce security policies across the Salesforce platform. These controls work across multiple levels:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Organization-Level Security<\/li>\n\n\n\n<li>Object-Level Security<\/li>\n\n\n\n<li>Field-Level Security<\/li>\n\n\n\n<li>Record-Level Security<\/li>\n\n\n\n<li>Profiles and Permission Sets<\/li>\n\n\n\n<li>Sharing Rules and Role Hierarchies<\/li>\n<\/ul>\n\n\n\n<p>Each layer of security allows for fine-tuned control, ensuring that users access only what they need and nothing more.<\/p>\n\n\n\n<p>These features are core components of any reputable online Salesforce course and are emphasized heavily in salesforce admin certification classes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Organization-Level Security Controls<\/h2>\n\n\n\n<p>These global Salesforce Security Controls define how users interact with your Salesforce environment and ensure that access is tightly regulated across the entire organization.<\/p>\n\n\n\n<p><strong>Key Controls Include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Password Policies<\/strong>: Enforce complexity rules, expiration periods, and password reuse limitations.<\/li>\n\n\n\n<li><strong>IP Restrictions<\/strong>: Prevent logins from untrusted or unauthorized IP addresses.<\/li>\n\n\n\n<li><strong>Login Hours<\/strong>: Allow or deny access based on specified working hours.<\/li>\n\n\n\n<li><strong>Two-Factor Authentication (2FA)<\/strong>: Add an extra layer of security to user logins.<\/li>\n\n\n\n<li><strong>Session Timeouts<\/strong>: Automatically log out inactive users to prevent unauthorized access.<\/li>\n\n\n\n<li><strong>Identity Confirmation<\/strong>: Prompt additional verification when a user logs in from a new device or location.<\/li>\n<\/ul>\n\n\n\n<p>If you&#8217;re exploring how to become a Salesforce admin, mastering these Salesforce Security Controls is your essential first step.<\/p>\n\n\n\n<p><strong>Real-World Example<\/strong>: A financial services company implemented strict IP restrictions allowing logins only from its office network, significantly reducing external attack vectors and strengthening their security posture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. Object-Level Security: Controlling Data Structures<\/strong><\/h2>\n\n\n\n<p>Object-level security determines what standard or custom objects a user can access, such as Leads, Accounts, or Opportunities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Set Through:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Profiles<\/strong>: Grant base-level object permissions.<\/li>\n\n\n\n<li><strong>Permission Sets<\/strong>: Provide additional or specialized access.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Access Levels:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create<\/li>\n\n\n\n<li>Read<\/li>\n\n\n\n<li>Edit<\/li>\n\n\n\n<li>Delete (CRED)<\/li>\n<\/ul>\n\n\n\n<p>In every <a href=\"https:\/\/www.h2kinfosys.com\/blog\/tag\/salesforce-administrator-courses\/\" data-type=\"post_tag\" data-id=\"2075\">Salesforce administrator course<\/a> online, object permissions are often the first hands-on assignment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. Field-Level Security: Protecting Data Sensitivity<\/strong><\/h2>\n\n\n\n<p>Field-Level Security is a critical part of Salesforce Security Controls, determining which specific fields on a record are visible or editable for users based on their role or profile.<\/p>\n\n\n\n<p><strong>Use Cases:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HR staff can edit sensitive fields like employee salaries, while sales reps may only see basic details such as job titles.<\/li>\n\n\n\n<li>Junior support agents might access customer contact details but be restricted from viewing confidential fields like credit card information.<\/li>\n<\/ul>\n\n\n\n<p><strong>Managed Via:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Profiles<\/strong><\/li>\n\n\n\n<li><strong>Field Accessibility Settings<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Grasping this concept is essential when preparing for your Salesforce Certified Administrator course.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4. Record-Level Security: Granular Access Management<\/strong><\/h2>\n\n\n\n<p>Record-level security is a core part of Salesforce Security Controls, ensuring users can only access the specific records they are authorized to view or edit within an object. This level of precision supports secure collaboration while protecting sensitive business data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Four Primary Tools for Record-Level Security:<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Org-Wide Defaults (OWD)<\/strong><br>These settings define the baseline level of access for records in an object across the entire organization.<br>Example options:\n<ul class=\"wp-block-list\">\n<li><strong>Private<\/strong>: Users can only see records they own.<\/li>\n\n\n\n<li><strong>Public Read Only<\/strong>: All users can view but not edit records.<\/li>\n\n\n\n<li><strong>Public Read\/Write<\/strong>: Full access for all users.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Role Hierarchies<\/strong><br>Role hierarchies automatically extend record access upward in the organizational structure.<br>For instance, a Regional Sales Director can access all records owned by their team members. This reflects managerial oversight built into Salesforce Security Controls.<\/li>\n\n\n\n<li><strong>Sharing Rules<\/strong><br>These rules allow administrators to define automatic access for users based on record ownership or field values.<br>For example, all users in the \u201cMarketing\u201d group can be given read access to Campaign records owned by \u201cProduct\u201d users.<\/li>\n\n\n\n<li><strong>Manual Sharing<\/strong><br>Enables record owners to grant access to individual users or groups on a case-by-case basis.<br>This is ideal for exceptions, such as when a project temporarily requires cross-team visibility.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Practical Example<\/h3>\n\n\n\n<p>In sfdc training online, a real-world exercise might require configuring access so that East Region Sales Managers can view and update only the Account records tagged as &#8220;East.&#8221; Using a combination of OWD set to Private, a role hierarchy for sales teams, and a sharing rule based on the Region field, this can be efficiently achieved.<\/p>\n\n\n\n<p>By mastering these components of Salesforce Security Controls, admins can design a system that balances accessibility and security with fine-tuned precision.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5. Profiles and Permission Sets: The Security Foundation<\/strong><\/h2>\n\n\n\n<p>Profiles and Permission Sets are core components of Salesforce Security Controls, determining what users can access and modify within the system.<\/p>\n\n\n\n<p><strong>Profiles<\/strong><\/p>\n\n\n\n<p>Every user in Salesforce is assigned a single profile, which governs:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Object-Level Access<\/strong> \u2013 Controls whether users can read, create, edit, or delete specific objects.<\/li>\n\n\n\n<li><strong>Field Permissions<\/strong> \u2013 Defines visibility and editability of individual fields within objects.<\/li>\n\n\n\n<li><strong>Login Hours\/IP Ranges<\/strong> \u2013 Restricts when and from where users can log in.<\/li>\n\n\n\n<li><strong>Tab Settings<\/strong> \u2013 Controls which tabs are visible or hidden.<\/li>\n\n\n\n<li><strong>Record Types<\/strong> \u2013 Determines which record formats a user can view or use.<\/li>\n<\/ul>\n\n\n\n<p><strong>Permission Sets<\/strong><\/p>\n\n\n\n<p>Permission Sets are add-on permissions that provide flexibility without changing the user\u2019s primary profile.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Users can be assigned multiple Permission Sets.<\/li>\n\n\n\n<li>Great for temporary access to features or tools.<\/li>\n\n\n\n<li>Useful for specialized roles that require additional capabilities beyond their base profile.<\/li>\n<\/ul>\n\n\n\n<p>These tools are thoroughly explored in both Salesforce admin online training and Salesforce developer training classes, reinforcing their importance in real-world access management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>6. Roles and the Salesforce Sharing Model<\/strong><\/h2>\n\n\n\n<p>The Salesforce Sharing Model plays a critical role in fine-tuning record-level access and enforcing Salesforce Security Controls across the organization. It determines who can view or edit specific records, ensuring that access aligns with an individual\u2019s responsibility and position within the company.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Core Components of the Sharing Model:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Roles<\/strong>: These reflect a user&#8217;s job function or position in the organization. Every user is assigned a role that determines their place in the role hierarchy.<\/li>\n\n\n\n<li><strong>Role Hierarchy<\/strong>: This structure allows users higher in the hierarchy typically managers or directors to access records owned by users below them. For example, a Sales Manager can automatically see opportunities owned by their team.<\/li>\n\n\n\n<li><strong>Sharing Rules<\/strong>: These allow administrators to extend access across roles or public groups based on specific criteria, such as record ownership or field values. This helps when cross-functional collaboration is required.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Real-World Use Case:<\/h3>\n\n\n\n<p>Imagine a Marketing Director who needs visibility into all marketing campaigns, regardless of which junior marketer created them. While the Role Hierarchy provides upward visibility to direct reports, Sharing Rules are implemented to grant access across different departments or geographic teams, ensuring no critical campaign data is missed.<\/p>\n\n\n\n<p>These mechanisms are essential in designing Salesforce Security Controls that are both flexible and secure, helping organizations meet compliance, confidentiality, and efficiency goals. Understanding and applying the Salesforce Sharing Model is a key focus in salesforce admin certification classes and is frequently encountered in real-world Salesforce deployments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>7. Folder-Level Access: Reports, Dashboards &amp; Templates<\/strong><\/h2>\n\n\n\n<p>Security doesn\u2019t stop at data. In Salesforce, reports, dashboards, and communication templates also require access restrictions to ensure sensitive business insights are not misused or altered unintentionally.<\/p>\n\n\n\n<p><strong>Folder Security Features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Viewer:<\/strong> Can view contents but cannot modify.<\/li>\n\n\n\n<li><strong>Editor:<\/strong> Can both view and edit contents.<\/li>\n\n\n\n<li><strong>Manager:<\/strong> Has full control can view, edit, and manage sharing permissions.<\/li>\n<\/ul>\n\n\n\n<p><strong>Example Use Case:<\/strong><br>In a typical enterprise setup, only Finance Managers may have Editor or Manager access to critical budget dashboards, while sales reps or analysts receive Viewer access to prevent unauthorized changes.<\/p>\n\n\n\n<p>These types of permission-based scenarios are often practiced during Salesforce online courses as part of mastering Salesforce Security Controls..<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>8. Security for AppExchange and API Integrations<\/strong><\/h2>\n\n\n\n<p>Salesforce integrates with third-party applications through the AppExchange or APIs. These can pose security risks if not managed correctly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Best Practices:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use Connected Apps with proper scopes.<\/li>\n\n\n\n<li>Restrict tokens and API keys to specific permission sets.<\/li>\n\n\n\n<li>Monitor API usage through Salesforce Event Monitoring.<\/li>\n<\/ul>\n\n\n\n<p>Developers enrolled in salesforce developer training classes often explore these in advanced modules.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>9. Best Practices for Salesforce Security Controls<\/strong><\/h2>\n\n\n\n<p>Let\u2019s simplify how to manage security effectively.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Best Practice<\/th><th>Why It Matters<\/th><\/tr><\/thead><tbody><tr><td>Principle of Least Privilege<\/td><td>Reduces unnecessary access<\/td><\/tr><tr><td>Use Permission Set Groups<\/td><td>Simplifies admin effort<\/td><\/tr><tr><td>Enforce Multi-Factor Authentication<\/td><td>Critical for remote and hybrid workforces<\/td><\/tr><tr><td>Monitor Login History<\/td><td>Detect unusual access patterns<\/td><\/tr><tr><td>Run Security Health Check<\/td><td>Salesforce feature to evaluate org security config<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>10. Salesforce Security Controls in Admin Certification<\/strong><\/h2>\n\n\n\n<p>Security-related questions make up around 13\u201315% of the Salesforce Administrator exam.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Common Topics:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Record access<\/li>\n\n\n\n<li>Profile &amp; Permission Sets<\/li>\n\n\n\n<li>Sharing Model<\/li>\n\n\n\n<li>Folder Security<\/li>\n\n\n\n<li>OWD and Manual Sharing<\/li>\n<\/ul>\n\n\n\n<p><strong>Sample Question:<\/strong> How would you restrict users from logging in outside office hours?<br><strong>Answer:<\/strong> Define Login Hours in the user\u2019s Profile.<\/p>\n\n\n\n<p>Studying Salesforce Security Controls thoroughly is essential for passing any salesforce certified administrator course.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>11. Real-World Case Study: Retail Chain Salesforce Access Setup<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Company Overview:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>100 stores across the U.S.<\/li>\n\n\n\n<li>National Sales Director<\/li>\n\n\n\n<li>Regional Managers<\/li>\n\n\n\n<li>Store-level Sales Reps<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Security Setup:<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Role<\/th><th>Access Rights<\/th><\/tr><\/thead><tbody><tr><td>Sales Rep<\/td><td>Sees only their store\u2019s records<\/td><\/tr><tr><td>Regional Manager<\/td><td>Sees all stores within their region<\/td><\/tr><tr><td>National Director<\/td><td>Sees all records across all stores<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Tools Used:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Role Hierarchy<\/li>\n\n\n\n<li>Sharing Rules by Region<\/li>\n\n\n\n<li>OWD set to Private<\/li>\n\n\n\n<li>Permission Sets for report editing<\/li>\n<\/ul>\n\n\n\n<p>Such real-world applications are commonly practiced in salesforce admin training courses and sales force online <a href=\"https:\/\/en.wikipedia.org\/wiki\/Tutorial\" rel=\"nofollow noopener\" target=\"_blank\">tutorials<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>12. Common Pitfalls in Salesforce Access Management<\/strong><\/h2>\n\n\n\n<p>Even experienced admins make these mistakes:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Over-permissioned Profiles<\/h3>\n\n\n\n<p>Solution: Use Permission Sets instead of broad profiles.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Ignoring Field-Level Security<\/h3>\n\n\n\n<p>Solution: Audit field permissions quarterly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Relying Solely on Role Hierarchies<\/h3>\n\n\n\n<p>Solution: Use sharing rules and manual sharing when needed.<\/p>\n\n\n\n<p>These are heavily discussed in salesforce training course projects and scenarios.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>13. Salesforce Security Controls in Multi-Cloud Environments<\/strong><\/h2>\n\n\n\n<p>Many organizations use multiple Salesforce clouds Sales, Marketing, Service, etc. Managing security across them requires even more vigilance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Strategies:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use Permission Set Groups to span across clouds.<\/li>\n\n\n\n<li>Apply External Identity Management for consistent login policies.<\/li>\n\n\n\n<li>Synchronize roles and sharing rules between clouds.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Example<\/strong>: A user in both Service Cloud and Marketing Cloud must have different levels of access in each. This is tackled using permission set groups.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>14. Hands-On Practice: Configure Security Settings (Step-by-Step)<\/strong><\/h2>\n\n\n\n<p>Here\u2019s a basic admin task from a salesforce online course:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Scenario: Restrict access to the \u201cSalary\u201d field in the Employee object for non-HR users.<\/h3>\n\n\n\n<p><strong>Steps:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to Setup \u2192 Profiles<\/li>\n\n\n\n<li>Select the Profile of a non-HR user<\/li>\n\n\n\n<li>Under Field-Level Security, locate \u201cSalary\u201d<\/li>\n\n\n\n<li>Uncheck \u201cVisible\u201d<\/li>\n\n\n\n<li>Save changes<\/li>\n\n\n\n<li>Test the changes by logging in as the user<\/li>\n<\/ol>\n\n\n\n<p>This simple task highlights how Salesforce Security Controls are configured on the platform.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>15. Visual Summary: Salesforce Security Hierarchy<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>pgsqlCopyEdit<code>+-------------------------------+\n|     Organization-Level        |\n|-------------------------------|\n|     Object-Level Security     |\n|-------------------------------|\n|     Field-Level Security      |\n|-------------------------------|\n|     Record-Level Security     |\n|-------------------------------|\n|     Sharing &amp; Roles           |\n|-------------------------------|\n|     Folders &amp; Templates       |\n+-------------------------------+\n<\/code><\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion: Security Is Not a Feature It\u2019s a Responsibility<\/strong><\/h2>\n\n\n\n<p>Understanding Salesforce Security Controls isn\u2019t just about passing a certification. It\u2019s about protecting data, ensuring compliance, and maintaining business continuity. Whether you&#8217;re just starting out in a salesforce administrator course online or upskilling through a salesforce training course, mastering these controls is essential.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Takeaways<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Salesforce Security Controls operate on multiple layers: org, object, field, and record.<\/li>\n\n\n\n<li>Profiles and Permission Sets form the core of user access.<\/li>\n\n\n\n<li>Sharing rules and role hierarchies refine data access.<\/li>\n\n\n\n<li>Folder security and integration permissions are equally critical.<\/li>\n\n\n\n<li>Real-world examples help apply theoretical knowledge practically.<\/li>\n<\/ul>\n\n\n\n<p>Want to learn Salesforce hands-on with expert guidance?<br>Join H2K Infosys today for in-depth Salesforce admin training and unlock your pathway to certification and career success.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: Why Security Is the Core of Salesforce Success Imagine granting your sales team full access to sensitive customer data without restrictions. Now imagine an intern mistakenly deleting client records. Without proper security, such scenarios are not only possible but common. That\u2019s where Salesforce Security Controls come in. With Salesforce powering customer relationships for over [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":26660,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1422],"tags":[1838],"class_list":["post-26653","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-salesforce-tutorial","tag-salesforce"],"_links":{"self":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/posts\/26653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/comments?post=26653"}],"version-history":[{"count":0,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/posts\/26653\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/media\/26660"}],"wp:attachment":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/media?parent=26653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/categories?post=26653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/tags?post=26653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}