Keep the following points in mind while setting up security:
- First consider the user who has least possible visibility of the objects. Set up the organization wide defaults based on them.
- Then, prepare the matrix for the users who have access to other objects. Prepare their profiles and permission sets based on that.
- Finally, set up the role hierarchies to enable mutual sharing of the objects.
- The remaining odd records can be shared using sharing rules.
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.