Abstract:
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication architecture in an on-demand service environment including, for example, means for receiving a login request at a global Virtual Internet Protocol (VIP) address for the host organization from a client device; forwarding the login request received at the global VIP address to one of a plurality of datacenters within the host organization; determining the selected datacenter is a non-home-geo datacenter for a user associated with the login request received from the client device; establishing a back-end link from the non-home-geo datacenter to a home-geo datacenter for the user; forwarding the login request from the non-home-geo datacenter to the home-geo datacenter via the back-end link for authentication of the client device at the home-geo datacenter responsive to the login request received from the computing device; and returning a response to the client device from the non-home-geo datacenter upon successful authentication of the login request at the home-geo datacenter, wherein the response specifies a re-direct to the home-geo datacenter for the user. Other related embodiments are disclosed.
Abstract:
In accordance with embodiments, there are provided mechanisms and methods for authenticating and authorizing an external entity. These mechanisms and methods for authenticating and authorizing an external entity can enable improved data security, more efficient data transfer, improved data access channels, etc.
Abstract:
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication architecture in an on-demand service environment including, for example, means for receiving a login request at a global Virtual Internet Protocol (VIP) address for the host organization from a client device; forwarding the login request received at the global VIP address to one of a plurality of datacenters within the host organization; determining the selected datacenter is a non-home-geo datacenter for a user associated with the login request received from the client device; establishing a back-end link from the non-home-geo datacenter to a home-geo datacenter for the user; forwarding the login request from the non-home-geo datacenter to the home-geo datacenter via the back-end link for authentication of the client device at the home-geo datacenter responsive to the login request received from the computing device; and returning a response to the client device from the non-home-geo datacenter upon successful authentication of the login request at the home-geo datacenter, wherein the response specifies a re-direct to the home-geo datacenter for the user. Other related embodiments are disclosed.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for performing an asynchronous subscription process that enables a secondary organization to subscribe to receive data from a primary organization. A primary organization provides publish data indicating fields to which a secondary organization can subscribe. The secondary organization provides subscription data that indicates published fields to which the secondary organization has subscribed. In some implementations, a state of a connection between the primary organization and the secondary organization is maintained and updated to ensure that the publish data and subscription data cannot be modified until the subscription process is completed.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for temporarily suspending data synchronization between a primary organization and a secondary organization. The primary organization may suspend data synchronization in response to a manual command. Alternatively, the primary organization may suspend data synchronization automatically upon detection of communication failure(s) between the primary organization and the secondary organization.
Abstract:
In accordance with embodiments, there are provided mechanisms and methods for authenticating and authorizing an external entity. These mechanisms and methods for authenticating and authorizing an external entity can enable improved data security, more efficient data transfer, improved data access channels, etc.
Abstract:
Disclosed herein are system, method, and computer program product embodiments for capturing incoming communications from a sender across multiple channels, and determining whether to include those communications from the sender in an inbox using a waiting room. The waiting room lists unknown senders, and allows a user to add the senders to a blocklist, where the sender's communications are omitted from the user's inbox, or to a passlist, where a new CRM customer record is created for the sender. With the CRM customer record created, future communications from the sender are matched to the CRM customer record and permitted for inclusion in an inbox. This way, recipients can prioritize customers (or other high-value communications) within their inbox based on a corresponding existing CRM customer record, while simplifying the capture of those CRM customer records.
Abstract:
Systems and methods are described to validate user connections to one or more application servers within a multi-tenant application system. A domain-level cookie at the client identifies any active connections for that client. As the client requests a connection to a particular application, the cookie is provided to a validation server that determines if any previously-established sessions with the multi-tenant system exist, and/or if such sessions remain active. If an active session already exists, then the client can be redirected to a particular server to continue the previously-established session. If no valid prior sessions are available, then the client can be validated and a new connection to an appropriate server can be established, as appropriate.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for temporarily suspending data synchronization between a primary organization and a secondary organization. The primary organization may suspend data synchronization in response to a manual command. Alternatively, the primary organization may suspend data synchronization automatically upon detection of communication failure(s) between the primary organization and the secondary organization.
Abstract:
In accordance with embodiments, there are provided mechanisms and methods for authenticating and authorizing an external entity. These mechanisms and methods for authenticating and authorizing an external entity can enable improved data security, more efficient data transfer, improved data access channels, etc.