SlideShare a Scribd company logo
Salesforce Security:
Fully Automated
Daniel McGaughey, Developer
Cristy Spino, IT Service Owner
Enterprise CRM
University of Pittsburgh
University of Pittsburgh
Just a little information about Pitt
Getting Started with Salesforce
NOV 2015 – JAN 2016
• ERM selection committee
• Project team conducted 25 critical requirements sessions on 4 campuses
• Met with over 200 staff
• Identified 136 unique requirements for an Enterprise CRM
FEB 2016 – JUL 2016
• RFI sent to 15 vendors, 7 submitted responses
• RFP included 2 vendors
• Completed reference checks
• Conducted onsite product demos
Office of the Chancellor initiative
Getting Started with Salesforce
AUG 2016 – DEC 2016
• Salesforce Recommendation
• Roadmap, Planning
• Recruiting and Service Discovery
• Project and budget approval
JAN 2017 – FEB 2018
• Build the team
• Select implementation partner
• Go Live with 2 Applications (Recruiting and Service Desk)
• Roadmap 20+ new projects
• Support / maintain projects
Office of the Chancellor initiative
Salesforce Environment
Current Environment
• 5 Enterprise CRM team members in central IT
• 1,500 Salesforce licenses
• ~440 current users
Applications
• Service Cloud
• Marketing Cloud
• Knowledge
• Visit Days for Recruiting Events
• Conga
• Task Ray
University of Pittsburgh
“How can we maintain security for
1,500 users and support our
applications with 5 team members?
What can we automate?
Lots of users, Lots of requests, 1 small but powerful team
Team Users Roadmap
• 1 instance
• Support 2 active
application in Production
• Kick off 3 new projects
• Recruiting for Regional
Campuses
• Advancement
• Economic Partnership
• Manage 20+ new
application requests
Director
Admin Admin Developer
IT Service
owner
Security and Provisioning
Business Cases
PHASE 1
To enhance security, prepare for enterprise and better utilize our Salesforce Administrators time
• During authentication auto assign and enforce security by utilizing Active Directory group
membership validate access and system privileges
• An audit log is updated when a user is created and when a user or their permissions are changed
PHASE 2
Fully automate access requests and license management
• Salesforce Service Request to request elevated access with workflow for approval and automatic AD group
management
• Automate license recovery for inactive users
• Annual security audit process
Two Phases
High Level Requirements
JIT:
• Users must log in using Pitt
Passport – the university’s SSO
solution
• Users are provisioned every
time they log in to the system
• System times out and logs out
with inactivity, forces user to log
in again
• If the user has not logged in for
an extended period (3 months)
of time the license is revoked
Security Request
• Security form creates a Security
Request Case
Security Request Form
• Form will default fields related
to the submitters or on behalf of
contact record
• Ability to request to add or
remove privileges
• Two levels of approval is
required, manager and security,
unless the manager is
submitting on behalf of a direct
report
• Request for restricted data
requires a third level of
approval from the data steward
Security Case Approver
• Case is created and routed
through the approval process
• Approvers have two options,
approve or reject. If reject they
must enter a comment
• Approvers are notified when a
security case requires attention.
Notifications are sequential,
manager, then security, then
the data steward
AD Group Update
• Once approval is received, the
user credentials are added to
the appropriate AD group
Just in Time Provisioning / Security Request
Just in Time (JIT)
Just in Time
JIT Steps
Step 1
• The program uses the AD Group membership
provided by the Shibboleth response and creates
the permissions that should be assigned to a
person when they are logging in
Step 2
• The program compares the calculated
assignments to the ones that are currently active
on the User record
• If no updates are needed, process ends
• If new or the removal of privileges are needed
proceed to step three
Step 3
• The program creates or updates the user record.
It removes all of the current permissions listed and
replaces with the new ones calculated in step two
Step 4
• The Security audit log is updated with the actions
taken
Current Automation
User Creation / Update
License Assignment
Active / Inactive
Profile
Name
Email Address
User Access Checkboxes
Marketing User
Knowledge User
Service Cloud User
Live Agent User
Membership
Public Groups
Queues
Permission Sets
All of these items are automated – saving significant manual effort:
Setup Screens
AD Group definition
Setup Screens
Items Associated with AD Group
Questions?
Salesforce Security: Fully Automated

More Related Content

PDF
Managing the Role Hierarchy at Enterprise Scale
PDF
Setting up Security in Your Salesforce Instance
PPTX
Salesforce Security Best Practices for Every Admin
PDF
Getting started with Salesforce security
PDF
Introduction to the Salesforce Security Model
PPTX
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
PDF
Secure Salesforce: CRUD / FLS / Sharing
PDF
Taking a Pragmatic Look at the Salesforce Security Model
Managing the Role Hierarchy at Enterprise Scale
Setting up Security in Your Salesforce Instance
Salesforce Security Best Practices for Every Admin
Getting started with Salesforce security
Introduction to the Salesforce Security Model
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Secure Salesforce: CRUD / FLS / Sharing
Taking a Pragmatic Look at the Salesforce Security Model

What's hot (20)

PPT
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
PPTX
Sharing and security in Salesforce
PPTX
Salesforce admin training 5
PDF
Sensibilisation à la Sécurité Salesforce
PDF
SAP Identity Management Overview
PDF
Introducing Salesforce Identity
PPTX
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
PDF
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
PDF
Single Sign-On and User Provisioning with Salesforce Identity
PPTX
Salesforce Security Review Tips and Tricks
DOCX
AM Side details
PDF
Identity and Entitlement Management Concepts
PPTX
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
PPTX
Salesforce admin training 2
PDF
Identity & Access Management for Securing DevOps
PDF
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
PDF
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...
PDF
Using Custom Permissions to Simplify Security
PPTX
Privileged Access Management (PAM)
PPTX
Universal digital - Vedran's slides for mock review board
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Sharing and security in Salesforce
Salesforce admin training 5
Sensibilisation à la Sécurité Salesforce
SAP Identity Management Overview
Introducing Salesforce Identity
Paris Salesforce Developer Group - 16 09 2014 - Summer '14
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Single Sign-On and User Provisioning with Salesforce Identity
Salesforce Security Review Tips and Tricks
AM Side details
Identity and Entitlement Management Concepts
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Salesforce admin training 2
Identity & Access Management for Securing DevOps
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Identity: Connect and Collaborate Anywhere, Securely with Single S...
Using Custom Permissions to Simplify Security
Privileged Access Management (PAM)
Universal digital - Vedran's slides for mock review board
Ad

Similar to Salesforce Security: Fully Automated (20)

PDF
Identity management delegation and automation
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PDF
Security testing
PDF
Identity & Access Management by K. K. Mookhey
PPTX
Security architecture best practices for saas applications
PPTX
SANS Institute Product Review of Oracle Identity Manager
PPT
Path Maker Security Presentation
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PPSX
IGI - Solution presentation-DP
PPS
Application Security Review 5 Dec 09 Final
PDF
Overview of Identity and Access Management Product Line
PDF
Hitachi ID Identity Manager
PPTX
Security Architecture Best Practices for SaaS Applications
PPTX
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
PPTX
Automation: Embracing the Future of SecOps
PDF
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
PPTX
Implementing security and controls in people soft best practices - may 2017
PDF
ING webcast platform
PDF
I Series User Management
Identity management delegation and automation
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
Security testing
Identity & Access Management by K. K. Mookhey
Security architecture best practices for saas applications
SANS Institute Product Review of Oracle Identity Manager
Path Maker Security Presentation
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
IGI - Solution presentation-DP
Application Security Review 5 Dec 09 Final
Overview of Identity and Access Management Product Line
Hitachi ID Identity Manager
Security Architecture Best Practices for SaaS Applications
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Automation: Embracing the Future of SecOps
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Implementing security and controls in people soft best practices - may 2017
ING webcast platform
I Series User Management
Ad

More from Salesforce.org (20)

PDF
Introduction to the Higher Education Advisory Council 2020
PDF
Amelia at Georgetown University
PDF
Amelia at Georgetown University
PDF
Amelia at Georgetown University
PDF
Amelia at Georgetown University
PDF
Amelia at Georgetown University
PDF
Amelia at Georgetown University
PDF
Amelia at Georgetown University
PDF
Amelia at Georgetown University
PDF
Amelia at Georgetown University
PDF
Amelia at Georgetown University
PDF
Warchild Holland
PDF
Daniella Part 2
PDF
Daniella Part 1
PDF
Haifa at UOC
PPTX
Intro to the Higher Ed Advisory Council 2018-19
PDF
Super Session- A Day in the Life of a Nonprofit Fundraiser
PDF
Df18 Fundraising Made Easy
PDF
Making Moves Magic- A Moves Management 101 for Nonprofit Cloud
PDF
Living Large: Enterprise Organizations on Nonprofit Cloud
Introduction to the Higher Education Advisory Council 2020
Amelia at Georgetown University
Amelia at Georgetown University
Amelia at Georgetown University
Amelia at Georgetown University
Amelia at Georgetown University
Amelia at Georgetown University
Amelia at Georgetown University
Amelia at Georgetown University
Amelia at Georgetown University
Amelia at Georgetown University
Warchild Holland
Daniella Part 2
Daniella Part 1
Haifa at UOC
Intro to the Higher Ed Advisory Council 2018-19
Super Session- A Day in the Life of a Nonprofit Fundraiser
Df18 Fundraising Made Easy
Making Moves Magic- A Moves Management 101 for Nonprofit Cloud
Living Large: Enterprise Organizations on Nonprofit Cloud

Recently uploaded (20)

PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Pre independence Education in Inndia.pdf
PDF
Business Ethics Teaching Materials for college
PDF
01-Introduction-to-Information-Management.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
STATICS OF THE RIGID BODIES Hibbelers.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Basic Mud Logging Guide for educational purpose
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Microbial diseases, their pathogenesis and prophylaxis
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pre independence Education in Inndia.pdf
Business Ethics Teaching Materials for college
01-Introduction-to-Information-Management.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
2.FourierTransform-ShortQuestionswithAnswers.pdf

Salesforce Security: Fully Automated

  • 1. Salesforce Security: Fully Automated Daniel McGaughey, Developer Cristy Spino, IT Service Owner Enterprise CRM University of Pittsburgh
  • 2. University of Pittsburgh Just a little information about Pitt
  • 3. Getting Started with Salesforce NOV 2015 – JAN 2016 • ERM selection committee • Project team conducted 25 critical requirements sessions on 4 campuses • Met with over 200 staff • Identified 136 unique requirements for an Enterprise CRM FEB 2016 – JUL 2016 • RFI sent to 15 vendors, 7 submitted responses • RFP included 2 vendors • Completed reference checks • Conducted onsite product demos Office of the Chancellor initiative
  • 4. Getting Started with Salesforce AUG 2016 – DEC 2016 • Salesforce Recommendation • Roadmap, Planning • Recruiting and Service Discovery • Project and budget approval JAN 2017 – FEB 2018 • Build the team • Select implementation partner • Go Live with 2 Applications (Recruiting and Service Desk) • Roadmap 20+ new projects • Support / maintain projects Office of the Chancellor initiative
  • 5. Salesforce Environment Current Environment • 5 Enterprise CRM team members in central IT • 1,500 Salesforce licenses • ~440 current users Applications • Service Cloud • Marketing Cloud • Knowledge • Visit Days for Recruiting Events • Conga • Task Ray University of Pittsburgh
  • 6. “How can we maintain security for 1,500 users and support our applications with 5 team members? What can we automate?
  • 7. Lots of users, Lots of requests, 1 small but powerful team Team Users Roadmap • 1 instance • Support 2 active application in Production • Kick off 3 new projects • Recruiting for Regional Campuses • Advancement • Economic Partnership • Manage 20+ new application requests Director Admin Admin Developer IT Service owner
  • 9. Business Cases PHASE 1 To enhance security, prepare for enterprise and better utilize our Salesforce Administrators time • During authentication auto assign and enforce security by utilizing Active Directory group membership validate access and system privileges • An audit log is updated when a user is created and when a user or their permissions are changed PHASE 2 Fully automate access requests and license management • Salesforce Service Request to request elevated access with workflow for approval and automatic AD group management • Automate license recovery for inactive users • Annual security audit process Two Phases
  • 10. High Level Requirements JIT: • Users must log in using Pitt Passport – the university’s SSO solution • Users are provisioned every time they log in to the system • System times out and logs out with inactivity, forces user to log in again • If the user has not logged in for an extended period (3 months) of time the license is revoked Security Request • Security form creates a Security Request Case Security Request Form • Form will default fields related to the submitters or on behalf of contact record • Ability to request to add or remove privileges • Two levels of approval is required, manager and security, unless the manager is submitting on behalf of a direct report • Request for restricted data requires a third level of approval from the data steward Security Case Approver • Case is created and routed through the approval process • Approvers have two options, approve or reject. If reject they must enter a comment • Approvers are notified when a security case requires attention. Notifications are sequential, manager, then security, then the data steward AD Group Update • Once approval is received, the user credentials are added to the appropriate AD group Just in Time Provisioning / Security Request
  • 11. Just in Time (JIT)
  • 13. JIT Steps Step 1 • The program uses the AD Group membership provided by the Shibboleth response and creates the permissions that should be assigned to a person when they are logging in Step 2 • The program compares the calculated assignments to the ones that are currently active on the User record • If no updates are needed, process ends • If new or the removal of privileges are needed proceed to step three Step 3 • The program creates or updates the user record. It removes all of the current permissions listed and replaces with the new ones calculated in step two Step 4 • The Security audit log is updated with the actions taken
  • 14. Current Automation User Creation / Update License Assignment Active / Inactive Profile Name Email Address User Access Checkboxes Marketing User Knowledge User Service Cloud User Live Agent User Membership Public Groups Queues Permission Sets All of these items are automated – saving significant manual effort: