Salesforce Permissions

📘

Note

Only a System Administrator can configure permissions in Salesforce.

General Permissions

Navigate to Setup > Users > Permission Sets (or Profiles), and assign the following permissions:

  • Every permission listed in the General User section starting with the word "View" except for View Encrypted Data

  • Lightning Experience User

  • API Enabled

    📘

    Note

    The API Enable permission is required even if you're using Bulk API. Note that some organizations might require specific Bulk API permissions for large-scale data sets and operations.

  • Manage IP addresses

  • Manage Login Access Policies

  • Manage Password Policies

  • Manage Profiles and Permissions Sets

  • Manage Roles

  • Manage Sandboxes

  • Manage Sharing

  • View All Profiles

  • View All Users

  • Apex REST Services

  • Manage Users

  • Manage Connected Apps

  • Modify Metadata Through Metadata API Functions

  • Customize Application

  • Is Single Sign-On Enabled

  • Use Any API Client (might be required if you're not using an admin-approved, allow-listed app)

Special Permissions

Some data types require additional, specific permissions. Assign the following permissions if these data types are relevant to you:

  • View Event Log Files: required to fetch event monitoring data.
  • Query All Files: required to search and fetch all files (Content) across the organization, regardless of individual sharing.
  • View Setup and Configuration: required to fetch metadata or information about the organization structure.

Fetching Application Settings and Licenses

Additional permissions are required to fetch these asset types.

  • The Salesforce user created for Axonius must have the System Permission Level.

  • In Salesforce, configure the following:

    1. Go to Administration, expand the Users tab and select Permissions Sets.
    2. Disable Access Salesforce.com only through a Salesforce.com API.
    📘

    Note

    While to access Application Settings data you need to grant roles and/or permissions that include write capabilities, the adapter only actually reads from the application.