AbstractToday, Business is of all sizes across all industries, even though they are regulated most are stored in Salesforce. These datas may be
accessed by thousands of Salesforce employee, chances that company data get misused. Previously salesforce user monitoring was impossible.
So, by creating an object and saving all users data at one place and plotting those data on map in order to get location. The objective of the
research work is to maintain authentication, validation and access control of users who have log into salesforce org. As a result the saved data
will be available to Salesforce org Admin and it will be helpful for Admin to take action against the Users like Blocking and warning him by
Email Alerts
Keywords-Security; Salesforce; Salesforce Security; Force.com; Salesforce Org Security; Irregular Activity Monitor; Login History;
Security Governance;
______________________________________________________*****_________________________________________________________
640
IJRITCC | June 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 6 640 642
_______________________________________________________________________________________________
User Login Activity Monitoring FinallySection IV concludes perform, what data the user can see, and what the user can do
with a discussion of critical outstanding issues with the data [8].
Secondly would also map users with location in order to
achieve the location of particular user from where he/she is
II. PROTECT SALESFORCE ORG
accessing org . Consider a scenario
The Salesforce security features help you empower your Think that you could have a button which can easily
users to do their jobs safely and efficiently. Salesforce limits shows who is accessing your Salesforce data, but
exposure of data to the users that act on it. Implement unfortunately such button is not enable in Salesforce Data.
security controls that you think are appropriate for the Insight your threats, put your data at risk. You have to
sensitivity of your data. We'll work together to protect your protect against,
data from unauthorized access from outside your company 1. Current Employee
and from inappropriate usage by your users [4]. 2. Former Employee
The organization is nothing but your Salesforce org. 3. An Employee whose Credential where
Salesforce says that organization wise security is the highest Compromise.
level of security that why the organization wise security is
the top of application level security. At the highest level, you Chances are your company has experienced incident
can secure access to your organization by maintaining a list where employee stock were misused, confidential data.
of authorized users, setting password policies, and limiting Customer, Prospect, Supplier, Financial, Investor and Patient
login access to certain hours and certain locations [9]. information can be downloaded without the detection. So, the
Security Infrastructure: Salesforce utilizes some tracking of data was impossible. So that the administration of
of the most advanced technology for Internet the organization can be familiar with user activity. The
security available today. When you access the objective behind developing this system is to maintain
application using a Salesforce-supported browser, Validation: Either User is valid or invalid
Transport Layer Security (TLS) technology protects Authorization: User Attempt to login whether he is
your information [5]. successful/failed.
Security Health Check: As an admin, you can use Access Control: If users is invalid or unauthorized
Health Check to identify and fix potential then his/hers access should be denied. As Shown
vulnerabilities in your security settings, all from a Below overview of implementation User Login
single page. A summary score shows how your org Activity Monitoring.
measures against the Salesforce recommended
baseline [6].
Auditing: Auditing provides information about use
of the system, which can be critical in diagnosing
potential or real security issues. The Salesforce
auditing features don't secure your organization by
themselves; someone in your organization should
do regular audits to detect potential abuse.
641
IJRITCC | June 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 6 640 642
_______________________________________________________________________________________________
[8] https://help.salesforce.com/articleView?id=users_mgmt_ov
erview.htm&r=https:%2F%2Fwww.google.co.in%2F&typ
e=0
[9] https://trailhead.salesforce.com/data_security/data_security
_overview
[10] https://en.wikipedia.org/wiki/Salesforce.com
IV. CONCLUSION
Salesforce is a very reputed industry in the field of cloud
technology but there are some conflicts like how to track user
activity and how to secure Salesforce org it main important
think in this time. Due to we are living in the era of digital
world hear every one wants to get connected with internet for
that information leakage is a biggest issue. So, by designing
this Login monitoring system Administrator will be able
defined which user are performing activities in the
organization. If any violation occurs than SA needs to take
action against that users.
REFERENCES
[1] https://trailhead.salesforce.com/modules/lex_implementati
on_basics/units/lex_implementation_basics_welcome
[2] https://www.youtube.com/watch?v=fphDP2Ddwok
[3] https://help.salesforce.com/articleView?id=overview_secur
ity.htm&type=0
[4] https://help.salesforce.com/articleView?id=overview_secur
ity.htm&type=0&language=en_US&release=206.20
[5] https://help.salesforce.com/articleView?id=security_overvi
ew_infrastructure.htm&type=0
[6] https://help.salesforce.com/articleView?id=security_health
_check.htm&type=0
[7] https://help.salesforce.com/articleView?id=security_overvi
ew_auditing.htm&type=0&language=en_US&release=206.
20
642
IJRITCC | June 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________