Manage Data Access
Steedos provides a flexible, layered data sharing design that lets admins control user access to data. Managing data access enhances security by exposing only data that’s relevant to users. Use permission sets, permission set groups, and profiles to control the objects and fields users can access. Use sharing rules to specify the individual records that users can view and edit.
📄️ Control Who Sees What
Steedos data sharing lets you expose specific data sets to individuals and groups of users. Permission sets, permission set groups, and profiles provide object-level and field-level security by controlling access. Record-level sharing settings, user roles, and sharing rules control the individual records that users can view and edit.
📄️ Profiles
Profiles define how users access objects and data, and what they can do within the application. When you create users, you assign a profile to each one.
📄️ Permission Sets
A permission set is a collection of settings and permissions that give users access to various tools and functions. Permission sets extend users’ functional access without changing their profiles and are the recommended way to manage your users’ permissions.
📄️ Object Permissions
Object permissions specify the base-level access users have to create, read, edit, and delete records for each object. You can manage object permissions in permission sets and profiles.
📄️ Field Permissions
Field permissions specify the access level for each field in an object.
📄️ Application Permissions
Steedos supports application authorization based on permission sets, which can be used to restrict users under a certain permission set/profile to only see certain applications.
📄️ Divisions
Divisions let you segment your organization's data into logical sections, making searches, reports, and list views more meaningful to users. Divisions are useful for organizations with extremely large amounts of data.
📄️ Restriction Rules
Restriction rules let you enhance your security by allowing certain users to access only specified records. They prevent users from accessing records that can contain sensitive data or information that isn’t essential to their work. Restriction rules filter the records that a user has access to so that they can access only the records that match the criteria you specify.
📄️ Sharing Rules
Use sharing rules to extend sharing access to users in public groups, roles, or territories. Sharing rules give particular users greater access by making automatic exceptions to your org-wide sharing settings.
📄️ Trigger managed permissions
While Steedos provides various built-in solutions to easily achieve precise field and record level permission control as described above, some permission requirements in unique project scenarios may not be met by these methods alone. Therefore, the Steedos permission engine also incorporates beforeFind triggers, which allow personalized and more advanced permission issues to be addressed through code.