flxbl docs
slackGitHub
  • flxbl
  • sfp
  • sfops
  • Overview
  • Getting Started
    • Pre-Requisites
    • Install sfp
    • Configure Your Project
    • Build & Install an Artifact
    • Congratulations!
    • Docker Images
      • sfp-pro
  • CONCEPTS
    • Overview
    • SF CLI vs. SFP
    • Domains
    • Packages
    • Supported package types
      • Unlocked Packages
      • Org-Dependent Unlocked Packages
      • Source Packages
      • Diff Package
      • Data Packages
    • Artifacts
    • Package vs Artifacts
    • Identifying types of a package
    • Dependency management
    • Transitive Dependency Resolution
    • Destructive Changes
  • configuring a project
    • Project structure
    • Setup Salesforce Org
    • Creating a package
    • Defining a domain
    • Release Config
  • BUILDING ARTIFACTS
    • Overview
    • Determining whether an artifact need to be built
    • Building a domain
    • Building an artifact for package individually
    • Limiting artifacts to be built
    • Controlling aspects of the build command
      • Ignoring packages from being built
      • Building a collection of packages together
      • Selective ignoring of components from being built
      • Use of multiple config file in build command
    • Configuring installation behaviour of a package
      • Always deploy a package
      • Skip Install on Certain Orgs
      • Optimized Installation
      • Pre/Post Deployment Script
      • Reconciling Profiles
      • PermissionSet Assignment
      • Updating Picklist
      • Entitlement Deployment Helper
      • Field History & Feed Tracking
      • Aliasfy Packages
        • Aliasfy Packages - Merge Mode
      • State management for Flows
  • Installing an artifact
    • Overview
    • Controlling Aspects of Installation
    • Applying attributes of an artifact
    • BuiltIn Deployment Helpers
      • PermissionSet Group Awaiter
  • publishing and fetching artifacts
    • Publish Artifact
    • Fetching Artifacts
  • Releasing artifacts
    • Overview
    • Release Definitions
    • Generating a release definition
    • Generating a changelog
  • Validating a change
    • Overview
    • Different types of validation
    • Limiting Validation by Domain
    • Controlling validation attributes of a package
      • Skip Testing
      • Skip Coverage Validation
      • Test Synchronously
  • Analysing a Project
    • Overview
    • Duplicate Check
  • Environment Management
    • Pools
      • Scratch Org Pools
        • Defining a pool
        • Setting up your Salesforce Org for Scratch Org Pools
        • Pool Operations
          • Preparing pools
            • Handling dependencies
          • List Scratch Orgs in a pool
          • Fetch a scratch org
          • Delete Pools
      • Sandbox Pools
        • Sandbox Pool Initialization
        • Fetch a Sandbox from Pool
        • Monitor Sandbox Pools
    • Review Environments
      • Commands
        • Fetch a Review Environment
        • Check Review Environment Status
        • Extend a Review Environment
        • Transition Review Environment Status
        • Unassign a Review Environment
      • Considerations
    • Sandbox
      • Create Sandbox
      • Delete Sandbox
      • List Sandbox
      • Login to Sandbox
      • Update Sandbox
  • Development
    • Development Environment
    • Pull Changes from your org
    • Push Changes to your org
    • Dependency Management
      • Expand Dependencies
      • Shrink Dependencies
      • Explain Dependencies
  • Running sfp as a server
    • Introduction
    • sfp-pro-server: Architecture Overview (Alpha)
      • Task Processing System
      • Authentication & Security Architecture
      • Authentication System: Deep Dive
      • Database Architecture
      • Network Architecture and Integration System
      • Integration Architecture: Building Extensions
    • Installing SFP Server
    • Initializing SFP server
  • API Reference
    • Health
    • Authentication
    • Token
    • Salesforce
    • Team
    • Users
    • Tasks
    • Key Value
    • Repository
    • WebHooks
  • Metrics
    • Available Metrics
    • Custom Metrics
    • Configuring Collectors
      • Datadog
      • Splunk
      • New Relic
      • StatsD
  • Helpers
    • Managing Shared Resources
  • Command Guide
    • Core
      • Build
      • Quickbuild
      • Publish
      • Install
      • Release
    • Advanced
      • Validate
      • Artifacts
      • Changelog
      • Impact
      • Pool
      • Metrics
      • Repo
    • Utilities
      • Apex Tests
      • Flow
      • Dependency
      • Profile
  • FAQs
    • Common Errors
      • Org Shapes
      • Troubleshooting Unlocked Packages Build Failure Due to Code Coverage
    • Common Questions
      • Email Templates Deployment: Classic vs Lightning
      • Dealing with Long Build Times in Salesforce
      • Standard ValueSets and unlocked packages
      • Common Issues encountered with aliasfied packages
      • API Version
      • Understanding alwaysDeploy and skipIfAlreadyInstalled in Deployment Pipelines
    • sfp versioning and upgrade Process
  • References
  • Legal
    • Terms of Service for sfp
    • Terms of Service for 'sfp-pro' Software
  • LLMs.txt
Powered by GitBook
On this page
  1. Running sfp as a server
  2. sfp-pro-server: Architecture Overview (Alpha)

Authentication & Security Architecture

Last updated 3 months ago

The authentication system in sfp pro server addresses several complex challenges in Salesforce DevOps security. At its core, the system must secure not only user access but also manage machine-to-machine authentication for CI/CD systems, handle Salesforce credentials securely, and maintain complete isolation between different organizations.

Authentication Layers

The system implements authentication through multiple coordinated layers, each handling specific aspects of security:

User Authentication Flow

Let's examine how authentication works for different types of users and systems:

  1. Interactive User Authentication (FLXBL-Managed Instances):

    This flow leverages FLXBL's registered OAuth applications, simplifying the setup for organizations. When a user authenticates:

    • The CLI initiates the OAuth process

    • FLXBL's global authentication service handles the OAuth callback

    • The user's identity is verified and passed to their instance

    • The instance creates and manages the user's session

  2. CI/CD System Authentication:

    CI/CD systems use application tokens that provide limited, scoped access:

    • Tokens are bound to specific instance and tenant

    • Each token has defined permission boundaries

    • Access is logged and auditable

    • Tokens can be revoked at any time

  3. Self-Hosted Instance Authentication: In self-hosted environments, organizations manage their own OAuth applications:

Credential Security Architecture

One of the most critical aspects of the system is how it handles various credentials, particularly Salesforce organization credentials:

The system implements several key security principles:

  1. Just-in-Time Secret Access: Credentials are only loaded when needed:

    • Workers fetch secrets at task start

    • Secrets remain only in memory

    • Credentials are cleared after task completion

    • No disk storage of sensitive data

  2. Secure Secret Storage: All credentials are stored securely:

    • Encrypted at rest using tenant-specific keys

    • Accessible only through secure secret managers

    • Support for multiple secret management solutions

    • Regular secret rotation

  3. Access Control: The system implements fine-grained access control:

    • Role-based access to credentials

    • Audit logging of all credential access

    • Restricted access to production credentials

    • Automated credential rotation support

Role and Permission Management

Each instance maintains its own role and permission system:

The permission system ensures:

  • Clear separation of duties

  • Principle of least privilege

  • Granular access control

  • Audit trail of all actions

Security Considerations

The authentication system addresses several key security requirements:

  1. Tenant Isolation: Complete separation between organizations:

    • Independent authentication states

    • Separate credential storage

    • Isolated session management

    • No cross-tenant data access

  2. Secure Communication: All communication is encrypted:

    • TLS for all API calls

    • Secure WebSocket connections

    • Encrypted credential transmission

    • Protected OAuth flows

  3. Audit and Compliance: Comprehensive audit trails:

    • Authentication attempts logged

    • Credential access recorded

    • Session activity tracked

    • Security events monitored

  4. Failure Handling: Secure failure modes:

    • Failed authentication logging

    • Credential access monitoring

    • Session timeout enforcement

    • Automated threat detection\