Index
A
Access
Access control
Access grants
Account skews
Ackoff knowledge continuum
Agile methodology
Apex-managed sharing
Apex programming language
Apex runtime engine processing apex code
Apex sharing
API protocol types
AppExchange products
Application design
declarative development options
options
order of execution
programmatic options
Application design architecture
Application-level security
Application lifecycle management (ALM) tool
Architectural artifacts
Architecture, Salesforce
application design architecture
data architecture
development lifecycle management
IAM domain
limitations
mobile domain
salesforce integration domain
security architecture
Artifacts
data model
FUSIAOLA analysis
SeeFUSIAOLA analysis
integration and SSO/OAuth
lifecycle management
Mobile App, communities, and reporting/BI
project management and governance
release management and data management
role hierarchy
system landscape
SeeSystem landscape artifact
Asset token flow
Assumptions
Asynchronous communication
Auditing
Audit trails
Authentication
Authorization
flows
OAuth 2.0
OpenID Connect Framework
scopes
Authorization flows
asset token flow
device flow
JWT bearer flow
refresh token flow
SAML assertion flow
SAML bearer assertion flow
user-agent flow
username and password flow
web server flow
Automated testing
Availability
B
Backups
Batch Data Sync integration pattern
Big object
Apex
Branching strategy
Bulk API
Business function attribute
Business logic context
C
Calling mechanism
Cardinality
Center of excellence (COE)
Chatter free
Chatter licenses
external users
free user
only licenses
Child implicit sharing
Cloud service provider (CSP)
Code-driven development
Commercial off-the-shelf (COTS)
Community sharing, external users
external organization-wide defaults
external role hierarchy
share group
sharing sets
Complex data migration
Concurrent Versions System (CVS)
Confidentiality
Continuous Integration and Continuous Deployment (CI/CD) Strategy
environment hub
packages
Salesforce CLI
Salesforce DX
scratch org
Cordova-based hybrid apps
Criteria-based sharing (CBS) rules
Cross-site scripting (XSS) prevention
Customer and partner community licenses
Customer community plus
Customer Identity and Access Management (CIAM) solution
Custom indexes
Custom metadata
Custom objects
D
Data access
Data architecture
Data archiving
Data backup
Database statistics
Data cleaning
Data encryption and security option
Data extraction
Data governance committee
Data integration
Data lifecycle management
backup and archiving approach
data archiving
data backup
data migration
SeeData migration
Data loading
Data manipulation operations
Data migration
complex
data loading
data manipulation operations
ETL
extraction and cleaning process
process
tools
transformation and verification
Data model
Data model artifact
large data volumes
object relationship
objects, store and manage data
object types
opportunity and order management application
organization-wide sharing default settings
ownership of records
record types
Data modeling
cardinality
considerations
relationship
revisiting cardinality
techniques and considerations
storage considerations
top-down consideration, bottom-up requirements
choice and compromise
normalized
performance
Data object model
Data skews
Data transformation
Data verification process
Data virtualization integration pattern
Data Virtualization integration pattern
Decentralized multi-org strategy
Decision tree
Declarative development options
Denormalized data model
Deployment methods
Development lifecycle management
Device flow
DevOps
archetypes
benefits
investment in software tools
traditional software development approach
DevOps vs. DevSecOps
Division management
Divisions
Dominant interaction context
E
Encryption methods
Enterprise mobile environment
Enterprise Mobility Management (EMM)
Enterprise Service Bus (ESB)
Enterprise WSDL
Environment hub
Error handling and recovery
ESB tool
ETL (Extract-Transform-Load)
ETL middleware tools
ETL tool
Experience cloud licenses
Explicit grants
Extensible Markup Language (XML) file
External Apps licenses
External Identity licenses
External lookup relationship
External objects
External organization-wide defaults
External role hierarchy
Extract-Transform-Load (ETL)
F
Feature licenses
Field audit trail
Field history tracking
Field-level visibility
Fire and Forget integration pattern
Flat data model
Foreign key (FK)
Full sharing model
FUSIAOLA analysis
assumptions
authentication
features
business logic context
data context
interaction context
user stories
format
integrations
licenses
objects
systems
user
business function attribute
information role attribute
internal vs. external attribute
role hierarchy index attribute
FUSIAOLA artifact
G
Governance and monitoring
center of excellence (COE)
data governance committee
steering committee
Grant access, hierarchies
Granting method
Graphical User Interface (GUI)
Group membership grant
Group membership object
H
Hierarchical lookup
Hierarchical relationship
High-performing mobile applications
High-Volume Portal (HVP)
HTML5 app development
Hub-and-spoke integration
Hybrid application
Hybrid methodology
I
IaaS-based solution development
Idempotent integration method
Identity and access management (IAM) architecture
access
authentication
authorization
SeeAuthorization
logouts and redirects
provisioning
session management
single sign-on
SeeSingle sign-on
two-factor authentication
user account management
user deprovisioning
Identity and access management lifecycle
access
authentication
authorization
deprovisioning
logouts and redirects
provisioning
session management
single sign-on
stages, flight experience
user account management
Identity provider (IDP)–initiated SAML SSO flow
Implicit grant
Implicit sharing
Independent Multi-org Strategy
Independent Software Vendor (ISV)
Indirect lookup relationship
Informatica
Information processors
Information role attribute
Infrastructure as a service (IaaS) model
Infrastructure layer
Infrastructure-level security
Inherited grant
Integration broker
Integration capabilities
Integration external service options
Integration levels
Integration options
Integration patterns
approach categories
batch data sync
calling mechanism
data virtualization
error handling and recovery
fire and forget
idempotent design considerations
remote call-in
request and reply
in Salesforce
security consideration
source, target, and direction
state management
timing
UI update
uses cases, and justification
Integrations
Integration strategy
API protocol types
design requirements
layers
levels
middleware
SeeMiddleware
on-premise application, and cloud-based business applications
scalable architecture
use cases
Integration tools
Integrity
Interaction context
Internet of Things (IoT)
architecture patterns
implementation
Salesforce connection
Intrusion detection system (IDS)
J, K
Jitterbit
JWT bearer flow
L
Large data volume (LDV)
data skew
object size
record ownership
record relationships
resolving
Licenses
feature licenses
org-level licenses
permission set licenses
platform vs. CRM licenses
security
user
SeeUser licenses
Lifecycle management artifacts
Lightning component layer
Lightning page component
Lightning pages
Lightning platform
Lightning platform technology stack
apex code runtime engine layer
identity and access management
infrastructure layer
metadata and shared services layer
Lightning web components (LWC)
Limitations
Login-based licenses
Logout
Lookup
Lookup relationship
Lookup skews
M
Manual sharing
Many-to-many relationships
Marketing cloud connect
Master-Child Multi-org Strategy
Master data management (MDM)
Master-detail relationships
Message-Oriented Middleware (MOM)
Metadata
Metadata-driven framework
Middleware
ESB components
ETL tools
options with uses cases
point-to-point integration model
Mix and match integration
Mobile app features
application design considerations
desktop features
mobile page layout and lightning support
UI navigation changes
voice commands
Mobile application design
data security
deployment
development costs
development skills
device features, access
factors
performance factors
battery drain and power consumption requirements
data plan usage
errors, bugs, and updates
information capture process and times
memory usage required
server-side response time
startup time and task load times
speed to market
user experience
Mobile Application Management (MAM)
Mobile applications
Mobile architecture
device features
devices
lifecycle of information
Mobile Content Management MCM)
Mobile data and device considerations
Mobile data management
Mobile development
Salesforce mobile SDK
Mobile development
center
Cordova-based hybrid apps
HTML5 and JavaScript mobile apps
native apps
react native
Mobile Device Management (MDM)
Mobile devices
application development
Mobile domain
Mobile features
access to applications and data
application access (authentication and authorization)
application use
mobile security
Mobile management solutions
Mobile usage
MuleSoft
Multi-org strategy
Multi-tenant architecture
N
Native app development
Native applications
O
OAuth 2.0 authorization framework
Object-level access
Object relationship
external lookup relationship
hierarchical relationship
indirect lookup relationship
lookup relationship
many-to-many relationships
master-detail relationship
Object size
Off-platform solution
On-premise solution development
OpenID Connect framework
Order of execution
Organization-wide default (OWD)
Organization-wide sharing default settings
Org-based development” (OBD) approach
Org-based development vs. source-driven development
Org-level licenses
Org strategy considerations
Owner field
Ownership-based record-level visibility and sharing capabilities
Ownership-based sharing architecture
Ownership-based sharing (OBS) rules
Ownership of records
Ownership skew
P
PaaS-based solution development
Packages
Parent implicit sharing
Partner community
Partner WSDL
Permission set
Permission set groups
Permission set licenses
Personal groups
Phishing and Malware
Platform as a service (PaaS)
Platform encryption
Platform-level security
Platform security
application-level security
data encryption and security option
external user experiences and salesforce portals
infrastructure-level security
Salesforce shield
SeeShield, Salesforce
standard audit and event monitoring tools
field history tracking
monitor configuration and setup changes
transaction monitoring and policies
user login monitoring
Point-to-point integration model
Potential optimal solutions
Process integration
Programmatic options, application
Provisioning methods
Public group considerations
Public read-only
Public read/write
Q
Quantitative descriptions
R
React Native app development
Record access calculations
Record-level access
Record locking
Record ownership
Record relationships
Record types
Recovery/archive
Redirects
Refresh token flow
Regulatory compliance and adherence
Release management
Remote Call-In integration pattern
Request and Reply integration pattern
REST API
Role hierarchy
Role hierarchy artifact
Role hierarchy index attribute
S
SaaS-based solution development
Salesforce
capabilities
cloud solutions
companies
licenses
SeeLicenses
Salesforce App, limitations
Salesforce CLI
Salesforce community licenses
Salesforce DX
Salesforce integration domain
Salesforce licenses
Salesforce lightning platform technology stack
Salesforce Mobile SDK
Salesforce organization strategy
Salesforce platform licenses
Salesforce roles and responsibilities
SAML assertion flow
SAML bearer assertion flow
Sandbox management
Sandbox types
Scratch org
Security architecture
attributes and features
availability
confidentiality
integrity
platform-level security
platform security
SeePlatform security
potential optimal solutions
sharing
SeeSharing architecture
Security Assertion Markup Language (SAML)
Security features
Security-focused framework
Security health check
Security infrastructure
Security levels
Security protocols
Security strategy, pillars
Service provider (SP)–initiated SAML SSO flow
Session types
Share group
Sharing architecture
criteria-based sharing rule
division management
manual sharing
OWDs
ownership-based sharing rule
permission set
potential optimal solutions
profiles
programmatic sharing
record ownership
role hierarchy
teams
territory management
Sharing performance
Sharing rule object
Sharing rules
Sharing sets
Shield, Salesforce
event monitoring
field audit trail
platform encryption
Single logout (SLO)
Single-org vs. multi-org strategy
Single sign-on (SSO)
authentication flows
identity provider (IDP)–initiated SAML
methods
Security Assertion Markup Language (SAML)
service provider (SP)–initiated SAML flow
Skinny tables
SOAP API
Software as a service (SaaS)
Software development kit (SDK)
Solution development options
Source Code Versioning Management (SCVM) tool
Source code versioning tools
Source-driven development (SDD) approach
SSO/OAuth artifact
Standard objects
Steering committee
Streaming API
Subversion (SVN)
Synchronous communication
System-initiated logout
System landscape
System landscape artifact
AppExchange products
integration strategy
interact with salesforce
salesforce community licenses
Salesforce licenses
salesforce organization strategy
User authentication/authorization tools
T
Team Foundation Server (TFS)
Technology solutions, building
IaaS
on-premise solution
options
PaaS
SaaS
Territory management
Testing strategy
Testing types
Tokenization
Traditional software development approach
Transaction security
Transport Layer Security (TLS)
Two-factor authentication (2FA)
U
UI Update integration pattern
Unified Endpoint Management (UEM)
Unlocked package
Usage-based entitlements
Usage-based licensing
User account management
User-agent flow
User attribute chart
User authorization tools
User deprovisioning
User-initiated logout
User licenses
chatter
SeeChatter licenses
customer and partner community licenses
external apps licenses
external identity licenses
platform licenses
Salesforce licenses
User login monitoring
V
Virtual and mobile security
Virtual integration
Visibility
Visual SourceSafe (VSS)
W, X, Y, Z
Waterfall methodology
Web application
Web server flow
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.135.197.201