in Technology by
What is the use of writing sharing rules? Can you use sharing rules to restrict data access?

1 Answer

0 votes
by

Sharing rules are written to give edit access (public read and write) or public read only access to certain individuals in Salesforce org. A classic example is when:- only your managers or superiors need to be given extra credentials to your records in objects as compared to your peers.

By default, all users in your organization will have organization-wide-default sharing settings of either Public Read Only or Private.

To give access to more records, which users do not own, we write sharing rules.

Example: Sharing rules are used to extend sharing access to users in public groups or roles. Hence, sharing rules are not as strict as organization-wide default settings. They allow greater access for those users.

As far as the second part of the question is concerned, the answer is no. We cannot use sharing rules to restrict data access. It is only used for allowing greater access to records.

Related questions

0 votes
    Through sharing rules, which type of record access can be granted by the administrator? 1. Read/Write/Transfer 2. Read/Write and Read-only 3. Write the only 4. Delete...
asked Jun 27, 2021 in Technology by JackTerrance
0 votes
    Through sharing rules, which type of record access can be granted by the administrator? 1. Read/Write/Transfer 2. Read/Write and Read-only 3. Write the only 4. Delete...
asked Jun 27, 2021 in Technology by JackTerrance
0 votes
    You can restrict the entry of data into a field by defining a for it a calculated values b volatile rule c. validation rule Select the correct answer from above options...
asked Dec 25, 2021 in Education by JackTerrance
0 votes
    Though Microsoft Teams is integrated with SharePoint (for file-sharing), can people still have access to a Team without being allowed to collaborate on documents?...
asked Mar 10, 2021 in Technology by JackTerrance
0 votes
    Prior to the invention of time-sharing, the prevalent method of computer access was ____________ (a) batch processing ( ... ) all of the mentioned Please answer the above question....
asked Oct 9, 2022 in Education by JackTerrance
0 votes
    Prior to the invention of time-sharing, the prevalent method of computer access was ____________ (a) batch processing ( ... ) all of the mentioned Please answer the above question....
asked Oct 2, 2022 in Education by JackTerrance
0 votes
    Apigee allows you to restrict the number of results returned from BaaS using the parameter _____. limit max number threshold...
asked Sep 3, 2021 in Technology by JackTerrance
0 votes
    We can use the following three rules to find logically implied functional dependencies. This collection of ... Theory topic in chapter Normalization of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    Can you explain certain rules which you follow in doing link building?...
asked Mar 5, 2021 in Technology by Editorial Staff
0 votes
    How many active assignment rules can you have in a lead/ case?...
asked Nov 11, 2020 in Technology by JackTerrance
0 votes
    The general idea of field _________ is to set rules or constraints on what data can be entered in data field. Select the correct answer from above options...
asked Nov 26, 2021 in Education by JackTerrance
0 votes
    The general idea of field _________ is to set rules or constraints on what data can be entered in data field. Select the correct answer from above options...
asked Nov 25, 2021 in Education by JackTerrance
0 votes
    Cost saving is possible in networking due to: (a)Data sharing (b) Software sharing (c) Both i and ii (d)None of these Select the correct answer from above options...
asked Dec 31, 2021 in Education by JackTerrance
0 votes
    .Duplication of data is known as …………. 1 point Data inconsistency Data Redundancy Data Sharing Data Security Select the correct answer from above options...
asked Dec 17, 2021 in Education by JackTerrance
0 votes
    According to roles in the sharing hierarchy, ______ can view and edit the record. 1. Nobody can edit the record 2. Only ... the specified role 4. There is no record to be edited...
asked Jun 27, 2021 in Technology by JackTerrance
...