This model helps keep permission assignment safe, auditable, and scalable.
High-risk permissions to tightly control
- Tenant Administrator
- Log In As User
- Generate API Tokens
- Manage SSO Enforcement
- All Delete permissions
- All Activate/Deactivate permissions
- Reindex Search Index
Assignment policy
- Start with role/profile baseline.
- Add only required permissions for the user’s workflow.
- Use “View All” permissions only when org-wide visibility is required.
- Document business justification for every high-risk grant.
Review cadence
- Monthly: review new high-risk grants.
- Quarterly: full profile/user access recertification.
- Event-driven: immediate review after org changes, audits, incidents, or SSO/domain changes.
Common mistakes to avoid
- Giving Delete or Activate/Deactivate permissions to broad user groups.
- Granting Tenant Administrator as a convenience role.
- Using one-off user-level grants instead of profile-based governance.
- Not separating setup admins from operational users.
Dependency note
Some permissions (for example View All* entries) depend on a base view permission via all_record_permission. Assign both to avoid partial access states.