- 29 Feb 2024
- 6 Minutes to read
- Print
- DarkLight
- PDF
Tier1 Security Engine Configuration Console
- Updated on 29 Feb 2024
- 6 Minutes to read
- Print
- DarkLight
- PDF
SECURITY CONFIGURATION CONSOLE
Tier1 Security Engine provides a centralized user interface that enables direct access to configure and view security settings. This UI is called Security Configuration Console (SCC), and is accessible from within the Configuration Manager application. SCC is ideally suited to speed up and streamline implementation and troubleshooting.
SCC looks as follows:
The SCC UI includes the following functional areas:
Menu (on the left) — a list of links to the object/process-specific console screens:
Manage Users & Employees
Manage User Role Hierarchy
Manage Objects
Manage Enhanced Security
Manage Batch Configuration
Manage Activity Security
Audit Security
Check Compliance
Disabled Triggers
Monitor Processes
Test Access to Records
Wall Crosser
The main screen (on the right) — displays an object/process-specific screen corresponding to the selected menu option
1. MANAGE USERS & EMPLOYEES
In the Manage Users & Employees screen, you can initiate management activities for:
User
Employee
Sharing team
Internal contact
Proceed as follows:
On the menu pane, click Manage Users & Employees.
The Manage Users & Employees screen displays.
In the search field, start typing a user name or an employee name.
Select the required entity from the pick list that appears.
The screen displays the User Record, Employee Record, Sharing Membership Record, and Internal Contact sections, each of which shows the current values of a number of attributes for the selected user or employee. The user/employee/contact names, as well as the sharing membership IDs, are rendered as hyperlinks.
Click a name/ID hyperlink in the relevant section to display the corresponding Salesforce security module in a separate browser window or tab.
View or edit the required information.
Close the Salesforce window or tab to return to SCC.
2. MANAGE USER ROLE HIERARCHY
In the Manage User Role Hierarchy Screen, you can see the representation of the User Roles. This data is from Organization Structure and Organization Membership Objects. The User Roles can be added with Users from this console.
3. MANAGE OBJECTS
In the Manage Objects screen, you can navigate to and view sharing reasons and sharing settings for objects secured in your org. For example:
Account
Contact
Deal
Call report
Interest
Activity security
Proceed as follows:
On the menu pane, click Manage Objects.
The Manage Objects screen displays.
Select the required object's tab.
The screen displays two grids:
Sharing Settings – lists the Default Internal Access and Default External Access for the selected object
Sharing Reasons – lists sharing reasons available for the selected object per related user
To modify a sharing reason or a sharing setting:
Click the Configure button under the corresponding grid.
Make the changes in the relevant Salesforce security module that opens in a separate browser window or tab.
Close the Salesforce window or tab to return to SCC.
4. MANAGE ENHANCED SECURITY
The Manage Enhanced Security screen features a tab for each object that is secured in your org (e.g., call report, deal, etc.). Each object-specific tab which includes a summary view of the related users, their access type, visibility, and other attributes.
Proceed as follows:
On the menu pane, click Manage Enhanced Security.
The Manage Enhanced Security screen displaysClick the required object's tab.
To modify the object security settings of the selected object:
Click Configure in the corresponding section.
Make the necessary changes in the AFR page that opens in a separate browser window or tab.
Close the AFR window or tab to return to SCC.
To export the contents of the summary (topmost) section to a CSV file, click Export to CSV.
5. MANAGE BATCH CONFIGURATION
The Manage Batch Configuration screen features a tab for each batch that is configured in your org (e.g., Coverage Sharing Batch, Historical Record Sharing Batch, etc.). Each batch-specific tab shows the configured attributes for the specific batch.
To modify the batch configuration:
Click Configure in the section.
Make the necessary changes in the AFR page that opens in a separate browser window or tab.
Close the AFR window or tab to return to SCC.
To export the contents of the summary section to a CSV file, click Export to CSV.
6. MANAGE ACTIVITY SECURITY
The Manage Activity Security screen identifies whether activity security is currently enabled. It also shows the configured attributes to create Activity Security.
To modify the Activity Security configuration:
Click Configure in the section.
Make the necessary changes in the AFR page that opens in a separate browser window or tab.
Close the AFR window or tab to return to SCC.
To export the contents of the summary section to a CSV file, click Export to CSV.
7. AUDIT SECURITY
In the Audit Security screen, you can generate a report on security-related actions (addition or removal of shares to/from record) for a specified date range.
Proceed as follows:
On the menu pane, click Audit Security.
The Audit Security screen displays.
Enter Start Date and End Date for the required date range. The application retrieves the requested data and displays it in a table.
8. CHECK COMPLIANCE
In the Check Compliance screen, you can generate a report on attempted compliance breaches and compliance batch logs for a specified time period. The following actions are considered compliance breaches:
An attempt to change an account's Owner from a "private" user to a "public" one
An attempt to share a secured object, such as call report, with a user from the "opposite" side of the ethical wall (i.e., a Private record with a Public user or vice versa)
Proceed as follows:
On the menu pane, click Check Compliance.
The Check Compliance screen displays. Its upper section shows the date selection controls.
The lower section of the screen shows a table of the objects and related users currently configured to support security compliance.
Enter Start Date and End Date for the required date range.
The application retrieves the requested data and displays it in two tables.To generate and view a more granular compliance log:
Click Go to Salesforce.
Perform the required activities in the Salesforce reporting module that opens in a new browser window or tab.
Close the Salesforce window or tab to return to SCC.
To export the data shown in the tables to a CSV file, click Export to CSV.
To change the configuration of objects and/or related users that support security compliance:
Click Configure in the Compliance Objects section of the screen.
Make the required changes in the Salesforce (AFR) page that opens in a new browser window or tab.
Close the Salesforce window or tab to return to SCC.
9. DISABLED TRIGGERS
The Disabled Triggers screen shows the triggers names and identifies whether trigger is currently disabled.
10. MONITOR PROCESSES
From the Monitor Processes screen, you can access details of:
Batch processes
Debug logs
Proceed as follows:
On the menu pane, click Monitor Processes.
The Monitor Processes screen displays.
Click View in Salesforce in the relevant section.
View the required process/log in the relevant Salesforce module that opens in a separate browser window or tab.
Close the Salesforce window or tab to return to SCC.
11. TEST ACCESS TO RECORDS
In the Test Access to Records screen, you can test access to a specific record, optionally by a specific user.
Proceed as follows:
On the menu pane, click Test Access to Records.
The Test Access to Records screen displays.
In the Record ID field, enter an ID of the record whose accessibility you want to test.
Click Run Test.
The application retrieves the record's access summary and displays it in a table.
To filter the access summary to a specific user, enter that user's name in the User field.
12. WALL CROSSER
The Wall Crosser screen shows the information of the Wall Crosser, Requester and the time period.
Proceed as follows:
On the menu pane, click Wall Crosser.
The Wall Crosser screen displays.
Enter Start Date and End Date for the required date range.
The application retrieves the requested data and displays it in a table.
You can filter the access summary to a specific user or status.
To generate and view a more granular Wall Crosser information:
Click Go to Salesforce.
Perform the required activities in the Salesforce reporting module that opens in a new browser window or tab.
Close the Salesforce window or tab to return to SCC.
To export the data shown in the tables to a CSV file, click Export to CSV.