-
Notifications
You must be signed in to change notification settings - Fork 19
User Permissions and Security Models
Interactions for Student Recruitment comes with the permission set “Create Interactions.” This permission set includes access to the app, objects and fields a user needs to create Interaction records in a standard way. The permission set also includes access to view (not edit or create) Interaction Mapping records. Feel free to edit this permission set, assign it to users on a case-by-case basis, or use it as a starting point for creating or adding to a user profile.
Follow these steps to access the permission set:
- Go to Setup > Users > Permission Sets
- Select Create Interactions
- Review or make updates and Save
Different universities have different needs when it comes to data security. The way this package uses the Opportunity object, for example, could pose security concerns for some universities because these records hold information concerning the potential student’s recruitment interests and, possibly, sensitive personal information. The departments within your university may be open to sharing their Opportunity data or they may want to keep it to themselves.
The Interaction Processor has full access to all records in Salesforce. This means if an Interaction is created by a user that matches a Contact they cannot see because of sharing settings, that Contact will still be updated. The out-of-the-box design assumes if a person has access to edit an Interaction field and that field is mapped to another field in the system, it has permission to write to it.
If this design does not meet your security requirements, you will need to update the way the Apex code is written to consider field-level security as well as sharing rules for the user who kicks off the Interaction Process. You may instead want to limit the users who have access to update Interactions, or at least remove their edit access to Interaction fields that are mapped to sensitive fields.
For more information on Security in Salesforce, see the Data Security Trailhead Module.