,

Chapter 7. Protecting Your Data

In this chapter ...


Data is the core of your information stack, and, more importantly, the repository of the business value of all of your systems. The value provided by your data justifies the very existence of your company’s entire IT investment—including you!

You have to be sure that your data is safe and sound, protected from unauthorized access from outside your company, as well as safeguarded from inappropriate usage by your user community.

The Force Platform is built with security as the foundation for the entire platform. This foundation includes both protection for your data and applications, and the ability to implement your own security scheme, which must be able to flexibly reflect the structure and needs of your organization. The security features of the Force Platform provide both strength and flexibility.

In this chapter, you will learn how the platform itself is protected with built-in security guards and controls. More importantly for your task as a developer, you will come to understand how you can implement access limitations for your own data and applications to meet the specific requirements of your organization.

Important

If you have been following the examples in the previous chapter, your Force Platform organization should be ready for the exercises in this chapter. If you have not done the exercises, or want to start with a fresh version of the sample Recruiting application, please refer to the instructions in the Code Share project for this book. You can find information on how to access that project in Chapter 1: Welcome to the Force Platform.


..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.239.82