Identity and Access Odyssey

Building a secure system to protect the data starts with the first steps of Authentication & Authorization, identifying how valid users are able to find, reach and access the system. There are many ways to control this access and it can include more than just Salesforce. There are multiple mechanisms to choose from, and it is the Architect’s job to understand them and make the best choice.

Security: Authentication and Authorization Summary (3.1)

Security: Authentication Options with Profiles (3.2)

Security & Identity: Single Sign-On Concepts (3.3)

Security & Identity: SSO & SAML Configuration & Flow (3.4)

Security & Identity: Salesforce to Salesforce SSO (3.5)

Security & Identity: Deep Dive into SAML Authentication (3.6)

Salesforce SAML JIT for Automated User Data Updates (3.7)

Security & Identity: Implementing Google Social Sign-On in Salesforce (3.8)

Security & Identity Simplified: When to Use SSO & OAuth (3.9)

Tap into Salesforce Security: Navigating OAuth Flows with a Beer Garden Analogy (3.10)

A Step-By-Step Guide to Setting Up a Salesforce Connected App for Easy OAuth Integration (3.11)

Hop into OAuth: Web Server Flow Explained with a Beer Garden Analogy (3.12)

Oauth Web Server Flow: Details and Demo (3.13)

Understanding OAuth: From User Agent Flow to PKCE (Proof Key for Code Exchange) Evolution (3.14)

Understanding Salesforce OAuth Device Flow: Explanation and Demo (3.15)

Salesforce OAuth JWT Bearer Flow Explained (3.16)

Salesforce OAuth Refresh Token Flow Explained (3.17)

Salesforce OAuth SAML Bearer Assertion and SAML Assertion Flows (3.18)

Related Videos

You may also like some of these other video series that I’ve put together.