Skip to main content

Understand Who Has Access to What and Why in Your Salesforce Org

Learn how to audit and understand user permissions in your Salesforce Org identify dangerous access, reduce exposure, and build a foundation for better access governance.

The Problem: Unclear Access in Your Salesforce Org

"I don't really know who has access to what in my Salesforce Org, or why they have it."

This is one of the most common and most dangerous situations in Salesforce administration. Over time, access grows organically with no clear rationale or documentation, leading to:

  • Users holding dangerous system-level permissions

  • Sensitive data being overexposed

  • Overlapping permission sets creating unintended access

  • Manual, stressful audits

Getting Started: Connect & Sync Your Salesforce Org

Before you can analyse access, make sure your Salesforce Org is connected and synced.

Feature: Salesforce Sync (Salesforce Connect)
Support Guide: Connect and Sync Your Salesforce Org

💡 Important: The metadata dictionary is only as accurate as the latest sync. Always confirm sync status before analysing metadata.

Step 1: Understand Your Overall Level of Exposure

Start by surfacing the uncomfortable truths — dangerous permissions or excessive overlap that put your Org at risk.

Step 2: Plan Your Permission Management with Elements

Once you understand your exposure, use Elements to plan how to address it.

What You'll Discover

Working through these steps will shift your perspective from "Access is probably fine" to a clear, evidence-based understanding:

  • Which users hold dangerous system-level permissions you didn't know about

  • Whether your Org effectively allows anyone to do anything

  • Which users have access to sensitive data that doesn't match their role

  • How to use this insight to manage access more effectively going forward

Decisions You Can Now Make

With this visibility in place, you'll be able to:

  • Justify to management why investment in access management is needed

  • Quantify how vulnerable key processes are to bad data input

  • Remove or restrict dangerous permissions from non-essential users

  • Consolidate redundant permission sets into a cleaner structure

  • Redesign your access model around role-based or capability-based principles

Did this answer your question?