1. Give me code free solution to validate duplicate check on combination of First & Last Name?
- Create a formula field to get the concatenation of First & Last Name
- Create a custom field to hold the value of formula field & Declare this field as unique
- Create Work flow rule & Field Update action on every record creation/update save the above mentioned formula field value into custom field
- So since the custom field we declared as Unique it will not allow any duplicate entry
2. Can we disable triggers in production ?
Triggers are not editable once deployed,
Alternate solution is Using Force.Com IDE / Change Sets,Inactive/Disable the trigger
and deploy to the production
and deploy to the production
Any other solution with out deployment?
Yes,It's design solution :
- Create configuration [Custom Setting / Custom Metadata Type] to maintain the flag for each trigger execution
- Execute the trigger logic based on the above flag selection
3. In which below scenario users will be able to edit each others records ?
In either of scenario the answer is "NO"
Profile - Object level permission
OWD - Record level permission
4. Is it possible to achieve Many to Many relation ship by using look up relationships?
Junction Object : This is a custom object with 2 Master - Detail relationships & is the key to making Many to Many relation ship.
To answer the question ,Yes it is possible.
The downside is ,Junction object will not be automatically deleted when one or both of the objects it is relating are deleted.
5. What is the difference between Indirect Lookup and External Lookup ?
Indirect Lookup Relationship
|
External Lookup Relationship
|
This type is basically when Standard/Custom
object as parent and an External object as child.
|
This type is basically when External object
as parent and external/standard/custom object as child.
|
Only objects that have a custom field
with the External ID and Unique attributes are available as parent
objects in indirect lookup relationships.
|
The External ID standard field as
parent field matching
|
Use Case :
When the external data doesn’t include Salesforce record IDs. Use the External Id as link between External & SFDC object. |
Use Case :
Use an external lookup relationship when the parent is an external object. |
Ex:
Account record (parent standard object) displays a related list of SAP sales orders (child external object) with matching customer IDs that aren’t Salesforce IDs. |
Ex:
External product catalog item (parent external object) displays a related list of support cases (child standard object) |
6.If the Workflow field update & Trigger on the same set of attribute and action,Will it fall under infinite loop ?
Not actually,
If the record was updated with workflow field updates,fires before and after triggers one more time (and only one more time),In addition to standard validations.Custom validation rules are not run again.
7.What is the difference between Process Builder and Lightning flow?
Workflow / Process Builder : Which always executes rules and actions behind the scenes.
Visual Flow / Lightning Flow : Which are applications that are user-triggered instead of event- triggered.
8.Give me different ways to invoke an apex call out from Queueable class?
- Create a future method with call out operation & Call the future method in Queueable execute method
- Implement the "Database.AllowCallouts" interface along with the "Queueable" interface to enable the call outs.Create a public static function that performs a call out and call that from Queueable execute method.
9. When is best to use Profiles instead of Permission Sets?
Profile for core level & Permission Sets used to give extended permissions
Profiles : Set access to Tabs,Apps,record types,Page layout assignment etc
Permission Set :To give access to only certain user in the profile
Note : Permission sets can only grant access,But can not deny access
To answer to the question,Profiles are best to control Field Level security.
10. What is the significance of Geo fields on an object ?
To create Geo fields there is a datatype "Geolocation" ,Which allows users to define locations.
Includes latitude and longitude components and can be used to calculate distance.
Note : Earlier SOSL was not allowed in Triggers but from Spring 11 on-words its allowed.
Canvas App Previewer used configure the app & view it.
Authentication Methods :
Actually both can be used as combination
OpenID : Authentication protocal
oAuth : Authorization framework
Note :
Refer Here For More Details
Includes latitude and longitude components and can be used to calculate distance.
11.Which are the possible ways to search within Salesforce ?
- Global Search
- Advanced Search
- Sidebar Search
- Lookup Search
12.Difference between SOQL & SOSL ,Which one is very effective at different point of time ?
SOQL
|
·
SOQL can query on all fields of any data
type on single multiple objects which are related.
·
SOQL cannot be queried against encrypted fields
·
DML operations are possible on search
result
EX:
SELECT Id, Name FROM Contact WHERE Name Like 'Deepika%'
|
SOSL
|
·
SOSL enables you to search text, email, and
phone fields for multiple objects simultaneously ,That objects can be
related/ non-related
·
SOSL can query against encrypted fields
·
DML operations are not possible on search
result
EX:
FIND {Deepika Matam} IN Name Fields RETURNING Contact(name, phone)
|
13.What are the authentication access types for a Force.Com Canvas Application ?
Force.com Canvas Framework :This allows you to take your existing web-based applications and expose/integrate them inside of Salesforce.
Salesforce becomes single screen to access your key applications using Force.com Canvas Framework.Canvas App Previewer used configure the app & view it.
Authentication Methods :
- Signed request
- OAuth 2.0
Canvas App level Authentication Can Be :
- No Authentication
- Username / Password
- SAML
- SSO
It is 2 sides authentication ,Together end user get's access
14.When would you use oAuth vs OpenID?
Actually both can be used as combination
OpenID : Authentication protocal
oAuth : Authorization framework
15.What are the different flows in oAuth,State few examples ?
The oAuth framework provides 4 different types of authorization flows
Flow Type
|
Example
|
Authorization
Code
|
LinkedIn to Twitter connect without providing Twitter
credentials
|
Implicit
grant
|
Mobile App à DueLingo
,When install 1st time there is an option to login though
google/facebook identity.
|
Resource
Owner Password Credentials
|
Facebook
/ LinkdIn Mobile Apps,
Facebook
app redirecting to same Facebook so can enter credentials in this app.
|
Client
Credentials Grant
|
The real
estate search engine, An anonymous user of this portal can make search for property.
|
Note :
1. Authorization
code & Implicit grant mostly same but Authorization Code is more secure than
this Implicit Grant.
2. Implicit
Grant doesn't involve any server side code or activity. It’s only between the
client and the third party API that the user wants to access.
3. The
Client Credentials Grant is a flow that doesn’t involve any end-user.
Refer Here For More Details
16.Can we search and sort based on a formula field on an object in Salesforce?
Global search won't search formula fields.
Sorting a report by formula field is not possible.
Note : Formula fields can be used SOQL Where clause
Salesforce FAQ Post1
Salesforce Advanced FAQ2
17. What are the important points to know about encrypted fields ?
- User profiles who have the “View Encrypted Data” configuration enabled will be able to view the field normally.
- Users who do not have the “View Encrypted Data” profile will see the mask.
- User profiles that have the “Modify All Data” permission will not be able to see the value of encrypted data fields.
- The field length is restricted to 175 characters in size.
- Encrypted Field cannot be type cast as Unique or External ID.
- An encrypted field cannot be configured with a default value.
- You can’t use encrypted fields in report filters and list views.
- You can’t use the encrypted fields in SOQL “where/order” clauses.
- Also we can not use encrypted field formula fields, workflow rules, workflow field updates, approval process entry criteria, and approval step criteria.
- If you clone a record that has encrypted custom fields, Salesforce will copy the data from the field ONLY if the user has the “view encrypted data” permission.
- You can access the data of encrypted field in apex, i.e value is always unmasked.
18. Record owner changes,What happens to the manually shared records?
Ex: X is the owner of Record 1 --Manually Sharing --> With Y
Salesforce Admin changes the Record 1 owner to Z.So what happens to
Changing the owner of a record automatically removes all shares from it.This is the standard behavior.
Salesforce FAQ Post1
Salesforce Advanced FAQ2
No comments:
Post a Comment