top of page

Methods to Manage Identities & Users Authentication in Salesforce

Salesforce Identity Logo

This guide provides an introductory overview of how Salesforce authorises user access to Orgs, enabling System Administrators to grant the right people the right access to the right resources, at the right time, whether on-premises, in other clouds, or on mobile devices.


Next, the guide examines the various Salesforce Identity features currently available, detailing their functionalities and benefits, providing best practices, troubleshooting tips, click paths, and examples for configuring them in an Org. The guide is divided in 5 Modules, summarising and reorganising Salesforce's "Manage Identity and Access" Trail to help new users navigate all the options available regarding security and access in Salesforce:


Identity Basics:

  • How Salesforce Identity helps administrators and can benefit a business due to its Convenience, Control, and Security.

  • Salesforce Identity features, such as Single Sign-On (unique set of credential for multiple resources), Connected Apps (authorised resources), Social Sign-on (access through Social Platform credentials),

  • Identity Standards and Protocols, such as SAML and its SSO flow, OAuth 2.0, OpenID Connect

  • Identity Provider & Service Provider


User Authentication:

  • MFA, combining credentials with codes or security keys, Touch or Face IDs

  • Lightning Login, password-free login after setting up MFA

  • My Domain, URL customisation within Salesforce

  • Federation ID & Troubleshoot SAML Requests


Identity for Customers from external platform/websites:

  • Org access for customers

  • Self-Registration Page

  • Authentication Provider (Social Sign-On)

  • From B2B to B2C with Customer Accounts


Identity for Mobile-Centric Customers:

  • Difference between Login Discovery and Passwordless Login

  • Difference between Identification and Verification


Additionally the guide provides an overview on the Identity Connect tool:

  • Benefits & Installation

  • Active Directory

  • Deployment Consideration


Resources:

bottom of page