Applying the Proper Security Model to Support Your Solutions

  • Philip Weinmeister


Although one chapter is not nearly enough to cover all of its facets, I would be remiss to completely omit security considerations in this book. The world of security is vast and involves a number of features and intricacies. However, I believe that I can break down the key security elements, as they relate to development without code, in a meaningful, understandable way to help you as you build declarative solutions on the platform.


User Profile Security Requirement Security Model Sharing Rule Specific Record 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Philip Weinmeister 2015

Authors and Affiliations

  • Philip Weinmeister
    • 1
  1. 1.GAUnited States

Personalised recommendations