UNPKG

sf-agent-framework

Version:

AI Agent Orchestration Framework for Salesforce Development - Two-phase architecture with 70% context reduction

65 lines (50 loc) 2.17 kB
# Access Model Design ## Purpose Design and implement comprehensive access control models for Salesforce implementations, ensuring security while maintaining usability. ## Instructions 1. **Analyze Access Requirements** - Document user personas and their data access needs - Identify sensitive data elements requiring protection - Map organizational hierarchy and reporting structure - Define data visibility requirements by role 2. **Design Access Control Structure** - Create role hierarchy aligned with org structure - Design profile configurations for each user type - Plan permission sets for modular access control - Define sharing rules and criteria-based sharing 3. **Implement Security Layers** - Configure Organization-Wide Defaults (OWD) - Set up role hierarchy with proper inheritance - Create profiles with appropriate object/field permissions - Design permission sets for flexible access management 4. **Data Security Configuration** - Implement field-level security for sensitive data - Configure record-level security through sharing - Set up manual sharing where needed - Design teams for collaborative access 5. **Validation and Testing** - Test access model with different user scenarios - Verify positive and negative test cases - Document security matrix for review - Perform security health check ## Input Requirements - Organization structure and hierarchy - User roles and responsibilities matrix - Data classification and sensitivity levels - Compliance and regulatory requirements - Business process documentation ## Output Format - Access Model Design Document - Security Matrix (Profiles, Permission Sets, Roles) - Implementation Guide with step-by-step instructions - Test scenarios and validation checklist - Security audit report ## Best Practices - Follow principle of least privilege - Use permission sets over profile customization - Leverage permission set groups for complex scenarios - Document all security decisions and rationale - Plan for scalability and future growth - Consider performance impact of sharing rules - Implement regular security reviews