Salesforce administrator interview Questions – Security
1. What is a Sharing Rule?
Sharing rules in Salesforce represent the permissions and exceptions to your organization. By using sharing rules we can grant access to edit, read, read/write permissions to user. Sharing Rules are of two types. They are
- Manual Sharing.
- Automatic Sharing.
2. What is Manual Sharing?
Manual sharing is the process of sharing records manually.
3. What is permission set?
Permission sets in salesforce.com are the combination of different settings and permission sets given to user to access records and files.
Note :- Manual sharing is available for only Organization wide default settings are private to the object.
4. Difference between profiles and permission sets?
Permission Sets : In this Permission sets we define the access level of the user. Generally we determine what a user can do in the applications. These are used to grant additional permission to a user.
Profiles : In Object level Security, Profiles are assigned to the user by system administrator. A profile can be assigned to many users where as a user can have only one Profile.
5. How can you define Field Dependency?
In Field dependency, we have to fields controlling filed and dependent field. When a selection is made the controlling field controls dependent picklist values.
Ex:- When a country is selected in dependent picklist then the states are available to that country. Here country is controlling field and State is dependent field.
6. How many field dependencies we can use in Visual Force page?
We can use up to 10 field dependencies in visualforce pages.
7. Tell me about Field-Level Security?
In field level security, we control the user what to see, edit, delete of a particular field in the object.
8. Briefly describe about Field-Level Security?
In field level security, we control the user what to see, edit, delete of a particular field in the object. In some situation like if we want to grant access control over Object to a user but the user should not be able to access some particular fields in that objects then we go for Field Level Security.
Field Level Security can be controlled by Profiles and Permission sets.
= > Profiles.
- Page Layouts.
- IP Ranges.
- Login Hours.
- Client Access.
= > Permission sets.
- App Permissions.
- Record Types.
- Tab Settings.
- Assigned Apps.
- Object Permissions.
- Field Level Security.
- Apex Classes
- Visual Force Pages
9. What are Login Hours and Login IP Ranges?
- Login hours are set in an organization to restrict the user’s who tries to login before or after login hours.
To set login hours in an organization go to Setup=>Administration=>Manage users=>Profiles.
- IP ranges are used to restrict any login attempt is done from unknown IP addresses. Usually organizations maintain login IP ranges.
To set Login IP ranges in salesforce go to Setup=>Administration Setup=>Manage Users=> Profiles.
10. What is a User Record?
User records consist key information about the user.
11. What is a Record Owner?
Record Ownership : The User or Queue who controls and have the right to access a record.
Generally there are two types of Owners. They are
12. What are Organization Wide Defaults?
- Organization wide Defaults define the baseline level of access to data records for all users in an Organization.
- Organization wide Defaults are used to restrict access to data(Records).
- Organization wide Defaults(OWD) can be defined for Standard Objects and Custom Objects.
13. What is a Role and Role Hierarchy?
Salesforce uses role hierarchy to automatically to grant access to users by default. We can not edit Grant Access using Hierarchies for standard objects and can edit Grant Access using Hierarchies check box for Standard objects.
14. What is Access at the Role Level?
Access at the role level depends upon the organization wide defaults.
15. What are the different types of Sharing Rules in Salesforce and explain them?
- Account sharing Rule.
- Contact Sharing Rule.
- Case Sharing Rule.
- Opportunity sharing Rule.
- Lead Sharing Rule.
- Custom Object sharing Rule.
16. In how many ways can we share a record?
Records can be shared in 5 types they are
- Role Hierarchy.
- Organization Wide Defaults.
- Manual Sharing.
- Criteria Based Sharing Rules.
- Apex Sharing.
17. Best Practices of Creating Contact Sharing Rules?
Organization wide default settings are used to set red, write, read/write permissions
18. How can i provide record level access to user’s in an organisation? then what should i use from Salesforce security model?
Get more details on record level security :- Record level security in salesforce.
19. If i want Object level accesses then what should i use from Salesforce security model?
Get more details on object level access. Object Level Security in Salesforce.
21. What are governor limits?
Governor Limits in Salesforce.com are the run time limits enforced by the apex runtime engine to write scalable and efficient code.
Read more on Governor Limits :- Governor limits in Salesfore
22. Is it possible to bypass Grant Login access using Hierarchies in case of standard objects?
23. Can we use sharing rules to restrict data access?
No, sharing rules cannot restrict data access.
24. Is it possible to create sharing rules for detail object?
No, we can create sharing rules for details objects because they don’t have owner field.