• Setting object access
  • Setting record access
  • Creating a role hierarchy
  • Record access exceptions
  • Managing field level security
  • Design and configure a data access model