Understanding Salesforce Org Access for BAs
As Business Analysts, we are tasked with gathering requirements, defining processes, and ensuring systems are configured to meet the needs of our businesses. When it comes to Salesforce, one critical area that BAs must have a solid grasp on is organization access and security.
Why Understanding Salesforce Org Access is Crucial for BAs
Organization access in Salesforce determines who can log into your company's Salesforce environment, from where, and when. Failing to properly configure and control access can leave your sensitive data vulnerable to security breaches or unauthorized changes.
As BAs, we need to understand the key access control mechanisms available so we can make informed recommendations during requirements gathering and design phases. The core access controls to consider include:
Profile-Level Access
Network Access
Activations
Understanding these controls is important so BAs can gather requirements around which profiles need which IP/schedule restrictions, whether location-based two-factor verification is needed, and how strictly corporate device policies should be enforced.
Beyond just access controls, the BA might need to understand the process of what happens "behind the scenes" when a user attempts to log into a Salesforce org - providing useful context for BAs to better understand the authentication flow. The sequence is as follows:
As Salesforce admins translate our requirements into actual configurations, we as BAs need to ensure we understand org access concepts thoroughly. Improper access controls can undermine governance, business policies, regulatory compliance, and overall security posture. Taking the time to learn this critical area will allow BAs to have more informed discussions and make better decisions when designing secure Salesforce solutions.
How to Leverage the Knowledge of Salesforce Org Access Control
A BA can leverage their understanding of Salesforce organization access controls during requirements elicitation as well as creating user stories, acceptance criteria, and UAT test scenarios. Here are some examples:
Requirements Elicitation:
User Stories:
"As a sales manager, I want my team to only be able to log into Salesforce from corporate IPs during business hours, so proprietary data isn't accessed remotely."
"As an IT admin, I need to restrict developer profile logins to my corporate network range to prevent unauthorized deployments to production."
Acceptance Criteria:
UAT Test Scenarios:
By understanding Salesforce org access controls, BAs can have more informed requirements gathering sessions and ensure key security needs are thoroughly documented. This knowledge allows the creation of meaningful user stories, unambiguous acceptance criteria, and comprehensive test cases validating the access rules are properly configured.