Abstract:
In accordance with embodiments, there are provided mechanisms and methods for debugging an assertion. These mechanisms and methods for debugging an assertion can enable improved interpretation and analysis of data validation results, more efficient development associated with data validation, etc.
Abstract:
A method for aggregating and generating contact engagement data for contacts in a customer relationship management (CRM) system includes receiving a plurality of communications via a plurality of communication channels, extracting message objects from each communication, the message objects including a sender address, a recipient address, a message body, and a corresponding communication channel for each communication. A contact based on at least one of the message objects for each communication is identified. A subset of the message objects corresponding to communications associated with the contact among the plurality of communications is aggregated to obtain aggregated message data. A visual representation of the aggregated message data is generated for display, the visual representation comprising a temporal distribution of the subset of the message objects corresponding to the communications associated with the contact and the corresponding communication channels for each of the communications associated with the contact.
Abstract:
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication architecture in an on-demand service environment including, for example, means for receiving a login request at a global Virtual Internet Protocol (VIP) address for the host organization from a client device; forwarding the login request received at the global VIP address to one of a plurality of datacenters within the host organization; determining the selected datacenter is a non-home-geo datacenter for a user associated with the login request received from the client device; establishing a back-end link from the non-home-geo datacenter to a home-geo datacenter for the user; forwarding the login request from the non-home-geo datacenter to the home-geo datacenter via the back-end link for authentication of the client device at the home-geo datacenter responsive to the login request received from the computing device; and returning a response to the client device from the non-home-geo datacenter upon successful authentication of the login request at the home-geo datacenter, wherein the response specifies a re-direct to the home-geo datacenter for the user. Other related embodiments are disclosed.
Abstract:
System, method, and/or computer program product embodiments for automatic removal of sensitive data items from records are disclosed. In one or more embodiments, a record with a sensitive field (for storing a sensitive data item) is linked to a self-removal data policy that includes a condition set. When the condition set is true, the sensitive data item is automatically removed from the record without deleting the record and without removing other data items stored in other fields of the record. Conditions may be associated with a time period following the upload or storage of the sensitive date item, the occurrence of an event that requires the sensitive date item, a read or approval of the sensitive data item, etc. A user may modify a condition in the condition set to make the condition more stringent or less stringent.
Abstract:
A method of provisioning organization users in a multi-tenant database system includes receiving a request via a single sign-on protocol from an organization user to create a new multi-tenant database user account for access to the multi-tenant database system. The method retrieves rules that specify how to derive user permissions for access to the multi-tenant database system from stored user attributes of the organization user. The method continues with applying the rules to the stored user attributes to determine permissions for the users to access particular objects in the multi-tenant database system, and creating the new user account with the determined user permissions for access to the multi-tenant database system.
Abstract:
Disclosed herein are system, method, and computer program product embodiments for capturing incoming communications from a sender across multiple channels, and determining whether to include those communications from the sender in an inbox using a waiting room. The waiting room lists unknown senders, and allows a user to add the senders to a blocklist, where the sender's communications are omitted from the user's inbox, or to a passlist, where a new CRM customer record is created for the sender. With the CRM customer record created, future communications from the sender are matched to the CRM customer record and permitted for inclusion in an inbox. This way, recipients can prioritize customers (or other high-value communications) within their inbox based on a corresponding existing CRM customer record, while simplifying the capture of those CRM customer records.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for performing an asynchronous subscription process that enables a secondary organization to subscribe to receive data from a primary organization. A primary organization provides publish data indicating fields to which a secondary organization can subscribe. The secondary organization provides subscription data that indicates published fields to which the secondary organization has subscribed. In some implementations, a state of a connection between the primary organization and the secondary organization is maintained and updated to ensure that the publish data and subscription data cannot be modified until the subscription process is completed.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for performing an asynchronous subscription process that enables a secondary organization to subscribe to receive data from a primary organization. A primary organization provides publish data indicating fields to which a secondary organization can subscribe. The secondary organization provides subscription data that indicates published fields to which the secondary organization has subscribed. In some implementations, a state of a connection between the primary organization and the secondary organization is maintained and updated to ensure that the publish data and subscription data cannot be modified until the subscription process is completed.
Abstract:
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication architecture in an on-demand service environment including, for example, means for receiving a login request at a global Virtual Internet Protocol (VIP) address for the host organization from a client device; forwarding the login request; determining the selected datacenter is a home-geo or a non-home-geo datacenter; establishing a back-end link; forwarding the login request from the non-home-geo datacenter to the home-geo datacenter via the back-end link for authentication; and returning a response to the client device from the non-home-geo datacenter upon successful authentication of the login request at the home-geo datacenter. Other related embodiments are disclosed.