Summary

In this chapter, you learned the design considerations that you need to consider on Force.com applications, which accommodates multiple users and the security framework of the Force.com platform. You learned about a Force.com user license that is needed for each and every user. In the main section of the chapter, we understood about the Force.com platform security framework. Under the Force.com security framework, you learned Organization security, User security, Network-based security, Session security, Administrative security, Component-based security, and Record-based security. Now we have completed the most important chapter in this book.

In next chapter, we will cover implementing business logic in the Force.com platform.

Get Learning Force.com Application Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.