background preloader

ISV

Facebook Twitter

Security Review

Security Review. All applications enrolled in the ISVForce or Force.com Embedded Partner Programs must go through a mandatory periodic security review. The Security Review has been developed to assess the security posture of partner offerings, to ensure that applications published on the AppExchange follow industry best practices for security, and to promote trust. Scope The scope of the security review depends on the composition of the offering. Most offerings contain one or more parts that are classified as Native, Composite (Web Applications), or Client/Mobile. Our approach is to test all parts of the offering to ensure that our mutual customers and their data are not put at risk. Security Review Process Quick Guide Here's a look at the Security Review Process steps: 1.

Review the free resources listed on our Secure Cloud Development site Check out our Security Review Webinar video for preparation tips. Introducing Private AppExchange: Your trusted corporate app store.

Package

Distribute my app. Remedyforce for Service Desk. AppExchange Partner Portal. Welcome to the AppExchange Partner Portal Wiki. From this page you can learn more about how to manage your AppExchange business through the Partner Portal. This section will outline the three types of leads that can be generated as an AppExchange Partner. All of these leads are great sources of potential revenue and should be easily accessed by your sales teams. Helpful tip: It’s important that all of your leads can be managed in the same Salesforce.com account. You should check that both Opt In leads and Managed package leads are being sent to the same org. Referral leads and Event Leads should be imported into the same account and sales channel. Documentation How to track leads in your Salesforce.com account Salesforce.com Employee Referrals Coming soon to the Partner Portal! AppExchange.com Leads These leads are generated directly from your AppExchange.com listing to your Salesforce.com org.

Opt-In Leads Managed Packages All “Get It Now” installs can be tracked using managed packages. OEM User License Comparison. Introduction The following tables compare object access, user permissions and features, and organization limits for the following licenses:OEM Embedded—A full Force.com license with contractual restrictions. Prohibits Create, Read, Update, and Delete on Leads, Opportunities, Products, Cases, Solutions, Campaigns, and Contracts.ISV Portal—An Authenticated Website license with basic data sharing options (manual sharing to user and participation in sharing groups is not permitted). User can only log in via Force.com Sites. Best used when projected user volumes will exceed 100,000.ISV Portal with Sharing—A Customer Portal Manage Custom license with full sharing capabilities. User can only log in via Force.com Sites.

Best used when projected user volumes are under 100,000 and granular security access is required. Portal licenses can’t be used to access any other application or functionality except for that of the application with which it was sold. Object Accessed User Permissions Storage Limits. Partner Program - Salesforce. Architect Core Resources. The Force.com Architect Core Resource Library is a collection of white papers, best practices, and other documents that help architects and ISVs maximize their success. Read these documents to learn how to extend existing infrastructure and security frameworks, design advanced Force.com applications, overcome common architectural challenges, and more.

Getting Started A Comprehensive Look at the Force.com Cloud-Computing Platform — Start with an in-depth technical overview of the Force.com platform and its constituent parts. The Force.com Multitenant Architecture — Force.com's foundation is a metadata-driven software architecture that enables multitenant applications.Learn how this makes the platform fast, scalable, and secure. Platform Administration Whitepaper: Secure, private, and trustworthy: enterprise cloud computing with Force.com — Force.com provides a number of security features, from infrastructure security through network, SSO, authentication and data sharing.

Platform Development. Twitter. ISVforce Guide. License Management and Support Guide. Partner Portal access.