Exodus Salesforce Docs
Admin Guide

Users and Permissions

Profile, permission-set group, and role access model

Assignment Model

The repo uses Salesforce profiles plus functional permission-set groups. The README defines the baseline assignment pattern:

User typeBaseline assignment
Internal staffSales User profile plus functional groups.
ManagersSales User profile plus matching manager groups.
AdministratorsSystem Administrator profile plus relevant admin groups.
3PL integrationsAPI profile plus ThreePL_Integration.

Permission-Set Groups

Functional groups in source include:

AreaGroups
SalesSales_User_Group, Sales_Manager, Sales_Admin
Customer serviceCustomer_Service_User
FinanceFinance_User, Finance_Manager, Finance_Admin
OperationsOperations_User, Operations_Manager, Operations_Admin
PurchasingPurchasing_User, Purchasing_Manager, Purchasing_Admin
WarehouseWarehouse_User, Warehouse_Manager, Warehouse_Admin
CommissionsCommission_User, Commission_Manager_Group, Commission_Admin
3PLThreePL_Operations, ThreePL_Integration, ThreePL_Runtime_Integration
Public payment sitesPayments_Public_Checkout_Site_Guest_Access, Payments_Webhook_Site_Guest_Access

Admin Checks

Before adding a user to a group, confirm the job function and the least access that lets the user work. Do not use admin groups to fix normal sales or operations access issues.

Run local access checks before changing metadata:

npm run permissions:roles:report
npm run permissions:who-can -- --object Sales_Order__c --access read
npm run permissions:who-can -- --field Sales_Order__c.Status__c --access edit
npm run permissions:matrix:crud -- --scope groups --object Sales_Order__c

Production Drift

Use the org audit when validating a live QA or production org against source:

npm run permissions:org:audit -- --target-org vesper

Last updated on

On this page