Posts

Data Security in Salesforce — The Full Architecture Explained Deeply

The Full Architecture  Before touching any configuration, understand one fundamental principle: Salesforce security is layered and sequential. Access is not decided in one place. It is evaluated step by step. If access fails at any layer, the user stops there — even if other layers would allow access. Think of it like passing through four security checkpoints. These four levels are: Organization Level Object Level Field Level Record Level Each level answers a different question. Let’s go deeper. ──────────────────────── Organization-Level Security — “Can You Enter the System?” This is the outer boundary. It controls authentication and access to the org itself, not data visibility. Configured in: Setup → Password Policies Setup → Login Access Setup → Network Access What you control here: • Who is an active user • Password strength rules • Login hours • IP address restrictions • Multi-factor authentication Important clarification: This level do...

A Backend Developer's Guide to Databases using PostgreSQL

A Backend Developer's Guide to Databases: From Theory to Practice with PostgreSQL Welcome! If you're a backend developer, you know that databases are not just a part of the job; they're the bedrock of almost every application you'll build. Understanding how to interact with them efficiently is crucial. This guide will walk you through the essential concepts, from the fundamentals to designing and querying a real-world database using PostgreSQL. Why Do We Need Databases Anyway? At its core, a database is a system for persisting information . Persistence means storing data so it survives even after the program that created it stops running. Think about a simple to-do list app. You add tasks, check them off, and when you close and reopen the app, you expect everything to be exactly as you left it. Without persistence, you'd have to start from scratch every single time. That's the magic of a database: it remembers. The Heart of the Matter: Disk-Based vs. In-Memory I...