[{"data":1,"prerenderedAt":1404},["ShallowReactive",2],{"page-permissions-agent":3},{"_createdAt":4,"_id":5,"_rev":6,"_type":7,"_updatedAt":8,"modularContent":9,"pageTitle":1397,"seo":1398,"slug":1401,"totalModules":1403},"2026-02-04T17:36:03Z","54e5317b-8d6a-4a9f-943e-d2538eeea973","ryYBOHNU7dRSbOLKcrOxJK","page","2026-02-05T13:42:13Z",[10,1381,1391],{"_key":11,"_type":12,"cta":13,"image":1297,"showModule":20,"subtitle":1343,"title":1380},"9f486fc24038","heroPermissions",{"_type":14,"buttonSize":15,"buttonStyle":16,"endIcon":17,"external":18,"internal":21,"label":1273,"linkType":1274,"media":1275,"openModal":1282,"openModal2":1286,"openModal3":1289},"link","regular","primary","\u003Csvg width=\"14\" height=\"14\" viewBox=\"0 0 14 14\" fill=\"none\" xmlns=\"http://www.w3.org/2000/svg\"> \u003Cpath d=\"M4.08337 9.91634L9.91671 4.08301M9.91671 4.08301H4.08337M9.91671 4.08301V9.91634\" stroke=\"black\" stroke-width=\"1.16667\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/> \u003C/svg>",{"_type":19,"blank":20,"noOpener":20,"noReferrer":20},"externalLink",true,{"_createdAt":22,"_id":23,"_rev":24,"_type":25,"_updatedAt":26,"author":27,"category":38,"featuredImage":40,"modularContent":45,"postSubtitle":138,"postTitle":139,"publishDate":140,"richText":141,"seo":1265,"slug":1270},"2025-12-23T16:51:09Z","bf6b7b91-4738-451e-8041-f9f16da22712","0v8yoaqlw3x28AQsl11x5T","post","2026-03-23T09:53:23Z",{"authorImage":28,"authorJobTitle":36,"authorName":37},{"_type":29,"altText":30,"image":31},"img","Tess Geri",{"_type":32,"asset":33},"image",{"_ref":34,"_type":35},"image-cae6ab2ffd5d72c7ba13fdfb8f6807fa2a4665c7-800x800-jpg","reference","Product Marketing ","Tess Geri ",{"_ref":39,"_type":35},"da37461c-30ee-40d6-974e-8d3172e00d18",{"_type":29,"altText":41,"image":42},"permissions agent",{"_type":32,"asset":43},{"_ref":44,"_type":35},"image-d641885154552261c9757eed62f7cc1444138249-2400x1260-png",[46,86,130],{"_key":47,"_type":48,"showModule":20,"table":49},"5b8c3534ac57","customDataTable",{"columns":50,"rows":62},[51,55,59],{"_key":52,"title":53,"width":54},"0v8yoaqlw3x28AQsl11x9B","Activity ","50",{"_key":56,"title":57,"width":58},"0v8yoaqlw3x28AQsl11x9v","Before","25",{"_key":60,"title":61,"width":58},"0v8yoaqlw3x28AQsl11xAf","With Sweep",[63,69,75,80],{"_key":64,"cells":65},"0v8yoaqlw3x28AQsl11x6D",[66,67,68],"Profile inventory & user counts","2–3 hours","2 minutes",{"_key":70,"cells":71},"0v8yoaqlw3x28AQsl11x6x",[72,73,74],"High-risk permission analysis","3–4 hours","3 minutes",{"_key":76,"cells":77},"0v8yoaqlw3x28AQsl11x7h",[78,79,68],"Troubleshooting access issues","30–60 minutes",{"_key":81,"cells":82},"0v8yoaqlw3x28AQsl11x8R",[83,84,85],"Full security audit","2–3 days","~20 minutes",{"_key":87,"_type":88,"mobileTextAlign":89,"richText":90,"showModule":20,"textAlign":89},"60ed1428ff44","richTextFullWidth","left",[91,102,110],{"_key":92,"_type":93,"children":94,"markDefs":100,"style":101},"c6e0c7ce4105","block",[95],{"_key":96,"_type":97,"marks":98,"text":99},"01e4d660349b0","span",[],"Salesforce permissions don’t need to be mysterious to be powerful. The controls are already there — what’s been missing is a fast, reliable way to understand how they work together in practice.",[],"normal",{"_key":103,"_type":93,"children":104,"markDefs":109,"style":101},"e6f45daaba9e",[105],{"_key":106,"_type":97,"marks":107,"text":108},"2063bc860cdb0",[],"The Permissions Agent turns permissions from something admins reconstruct under pressure into something teams can reason about continuously. Questions get answered in minutes, audits become routine instead of disruptive, license costs become visible, and governance stays intentional as the org evolves.",[],{"_key":111,"_type":93,"children":112,"markDefs":126,"style":101},"394f6db2c4fa",[113,117,122],{"_key":114,"_type":97,"marks":115,"text":116},"717c9e82ae4e0",[],"If you want to see what this looks like in your own Salesforce org, ",{"_key":118,"_type":97,"marks":119,"text":121},"5494be0c24bc",[120],"8bb8fc4290f9","book a demo",{"_key":123,"_type":97,"marks":124,"text":125},"90a2783e5a20",[]," of the Permissions Agent and start asking questions about your security in plain English with answers you can trust.",[127],{"_key":120,"_ref":128,"_type":129},"994002ec-3fe9-4d35-8d9a-092784f01520","internalLink",{"_key":131,"_type":132,"cols":133,"offset":134,"rows":135,"showControls":136,"showModule":20,"showTotal":136,"title":137},"21a3c45b4cd0c9368441f22e74d6fda6","listedPosts",2,0,1,false,"Learn more","Deep-Dive Use Cases, From Troubleshooting to Compliance","The Real Cost of Salesforce Permissions? Opacity","2025-12-26",[142,151,168,177,185,193,201,209,217,225,233,241,257,266,274,282,290,298,306,314,330,338,346,354,363,371,379,387,395,403,411,426,434,442,450,458,466,474,482,490,498,506,514,522,538,546,554,562,570,578,586,594,602,610,618,626,633,641,649,657,665,673,681,696,704,712,720,728,735,742,750,758,766,774,782,790,798,806,814,822,830,838,846,861,869,877,885,893,901,909,917,924,932,940,948,956,964,972,980,987,994,1002,1010,1018,1026,1033,1041,1049,1057,1065,1073,1081,1088,1096,1104,1112,1120,1128,1147,1155,1162,1169,1177,1185,1193,1201,1209,1217,1225,1233,1241,1249,1257],{"_key":143,"_type":93,"children":144,"markDefs":149,"style":150},"8ca60894da7e",[145],{"_key":146,"_type":97,"marks":147,"text":148},"510f7b50c7330",[],"How Salesforce Admins Handle Permissions Today",[],"h2",{"_key":152,"_type":93,"children":153,"markDefs":167,"style":101},"3159a3afa77d",[154,158,163],{"_key":155,"_type":97,"marks":156,"text":157},"aeb835301cfa0",[],"Before diving into use cases, it’s worth grounding this effort in reality. Salesforce ",{"_key":159,"_type":97,"marks":160,"text":162},"aeb835301cfa1",[161],"em","does",{"_key":164,"_type":97,"marks":165,"text":166},"aeb835301cfa2",[]," provide all the necessary data to understand access — but it’s fragmented across:",[],{"_key":169,"_type":93,"children":170,"level":135,"listItem":175,"markDefs":176,"style":101},"60d14f0d524d",[171],{"_key":172,"_type":97,"marks":173,"text":174},"53f34ebb8b150",[],"Profiles","bullet",[],{"_key":178,"_type":93,"children":179,"level":135,"listItem":175,"markDefs":184,"style":101},"839a0f0ad29b",[180],{"_key":181,"_type":97,"marks":182,"text":183},"3c5590adb0d10",[],"Permission Sets",[],{"_key":186,"_type":93,"children":187,"level":135,"listItem":175,"markDefs":192,"style":101},"0f15f49c085b",[188],{"_key":189,"_type":97,"marks":190,"text":191},"cbc6d7cbcea50",[],"Permission Set Groups",[],{"_key":194,"_type":93,"children":195,"level":135,"listItem":175,"markDefs":200,"style":101},"588c091270a0",[196],{"_key":197,"_type":97,"marks":198,"text":199},"7c3b203d8f710",[],"Field-level security",[],{"_key":202,"_type":93,"children":203,"level":135,"listItem":175,"markDefs":208,"style":101},"139e90e122f6",[204],{"_key":205,"_type":97,"marks":206,"text":207},"5a0f5cf0d1920",[],"Object permissions",[],{"_key":210,"_type":93,"children":211,"level":135,"listItem":175,"markDefs":216,"style":101},"56de199b9c8c",[212],{"_key":213,"_type":97,"marks":214,"text":215},"dc4c5c08f2440",[],"Role hierarchy",[],{"_key":218,"_type":93,"children":219,"level":135,"listItem":175,"markDefs":224,"style":101},"27ad95c2df3e",[220],{"_key":221,"_type":97,"marks":222,"text":223},"9d2280f709570",[],"Sharing rules",[],{"_key":226,"_type":93,"children":227,"level":135,"listItem":175,"markDefs":232,"style":101},"bce1086304a5",[228],{"_key":229,"_type":97,"marks":230,"text":231},"3981c42e8aaa0",[],"Login history",[],{"_key":234,"_type":93,"children":235,"level":135,"listItem":175,"markDefs":240,"style":101},"9019fe353174",[236],{"_key":237,"_type":97,"marks":238,"text":239},"f15df8f5bb940",[],"Reports that only partially answer the question",[],{"_key":242,"_type":93,"children":243,"markDefs":256,"style":101},"d6c92c86811f",[244,248,252],{"_key":245,"_type":97,"marks":246,"text":247},"a343a79b63760",[],"Answering a single question like ",{"_key":249,"_type":97,"marks":250,"text":251},"a343a79b63761",[161],"“Why can’t this user edit this record?”",{"_key":253,"_type":97,"marks":254,"text":255},"a343a79b63762",[]," often means:",[],{"_key":258,"_type":93,"children":259,"level":135,"listItem":264,"markDefs":265,"style":101},"561da9a0e9b5",[260],{"_key":261,"_type":97,"marks":262,"text":263},"0637ceab89890",[],"Opening the user record","number",[],{"_key":267,"_type":93,"children":268,"level":135,"listItem":264,"markDefs":273,"style":101},"646bc8655586",[269],{"_key":270,"_type":97,"marks":271,"text":272},"6d4a2df43dc00",[],"Checking assigned profile",[],{"_key":275,"_type":93,"children":276,"level":135,"listItem":264,"markDefs":281,"style":101},"0aa90130fe03",[277],{"_key":278,"_type":97,"marks":279,"text":280},"27c76b60afd00",[],"Reviewing multiple permission sets",[],{"_key":283,"_type":93,"children":284,"level":135,"listItem":264,"markDefs":289,"style":101},"b0e4e7ac8ec5",[285],{"_key":286,"_type":97,"marks":287,"text":288},"65b724e24bcb0",[],"Verifying object permissions",[],{"_key":291,"_type":93,"children":292,"level":135,"listItem":264,"markDefs":297,"style":101},"1debc2ced08d",[293],{"_key":294,"_type":97,"marks":295,"text":296},"ec52771168d10",[],"Inspecting field-level security",[],{"_key":299,"_type":93,"children":300,"level":135,"listItem":264,"markDefs":305,"style":101},"789bb472f8eb",[301],{"_key":302,"_type":97,"marks":303,"text":304},"ca47cacfc6830",[],"Checking record ownership and sharing",[],{"_key":307,"_type":93,"children":308,"level":135,"listItem":264,"markDefs":313,"style":101},"50ad1dec4812",[309],{"_key":310,"_type":97,"marks":311,"text":312},"e39e4db298470",[],"Exporting data to Excel when it gets too complex",[],{"_key":315,"_type":93,"children":316,"markDefs":329,"style":101},"b34de82a7766",[317,321,325],{"_key":318,"_type":97,"marks":319,"text":320},"d492bfc20c710",[],"Admins know this process by heart and it’s exactly why permissions work consumes hours every week. The Permissions Agent doesn’t replace Salesforce’s model. It replaces the ",{"_key":322,"_type":97,"marks":323,"text":324},"d492bfc20c711",[161],"processes",{"_key":326,"_type":97,"marks":327,"text":328},"d492bfc20c712",[]," required to understand it.",[],{"_key":331,"_type":93,"children":332,"markDefs":337,"style":150},"d3697bad0847",[333],{"_key":334,"_type":97,"marks":335,"text":336},"327cf11d32000",[],"Use Case 1: Troubleshooting access issues (the daily interruption)",[],{"_key":339,"_type":93,"children":340,"markDefs":345,"style":101},"e871cf2e490a",[341],{"_key":342,"_type":97,"marks":343,"text":344},"531dda940f000",[],"A Slack message, a support ticket, or someone leaning over a desk: “Hey, I can’t edit this record.” Sometimes it’s a missing field. Sometimes, it’s a button that disappears overnight. Occasionally, it’s a deal that’s suddenly blocked for no obvious reason. But nothing looks broken, no deployments went out, no alerts fired. And yet, something changed.",[],{"_key":347,"_type":93,"children":348,"markDefs":353,"style":101},"dd26aa06ea20",[349],{"_key":350,"_type":97,"marks":351,"text":352},"977f008a5fd70",[],"For the Salesforce admin, this is familiar territory. You open the user record, check their profile, scan through permission sets. You compare what they have against someone it does work for. You trace object access, then field-level security, then sharing rules.",[],{"_key":355,"_type":93,"children":356,"markDefs":362,"style":101},"5547b918a37d",[357],{"_key":358,"_type":97,"marks":359,"text":361},"36fd4c9af6be0",[360],"strong","Native Salesforce workflow",[],{"_key":364,"_type":93,"children":365,"markDefs":370,"style":101},"3870003c6659",[366],{"_key":367,"_type":97,"marks":368,"text":369},"e0ba45a04b240",[],"Admins typically:",[],{"_key":372,"_type":93,"children":373,"level":135,"listItem":175,"markDefs":378,"style":101},"b1cfcc5231d2",[374],{"_key":375,"_type":97,"marks":376,"text":377},"44f49dab34540",[],"Jump between Setup pages",[],{"_key":380,"_type":93,"children":381,"level":135,"listItem":175,"markDefs":386,"style":101},"8b38a878a59b",[382],{"_key":383,"_type":97,"marks":384,"text":385},"3d948fcff0760",[],"Compare profiles manually",[],{"_key":388,"_type":93,"children":389,"level":135,"listItem":175,"markDefs":394,"style":101},"ea7d584ec2c8",[390],{"_key":391,"_type":97,"marks":392,"text":393},"6e22ae6877490",[],"Cross-reference permission sets",[],{"_key":396,"_type":93,"children":397,"level":135,"listItem":175,"markDefs":402,"style":101},"302d08f1dfaa",[398],{"_key":399,"_type":97,"marks":400,"text":401},"af355e3a6faa0",[],"Guess which layer is blocking access",[],{"_key":404,"_type":93,"children":405,"level":135,"listItem":175,"markDefs":410,"style":101},"dba077054fd8",[406],{"_key":407,"_type":97,"marks":408,"text":409},"16e4c493f96d0",[],"Reproduce the issue with “Login As”",[],{"_key":412,"_type":93,"children":413,"markDefs":425,"style":101},"817e8bd0a435",[414,418,421],{"_key":415,"_type":97,"marks":416,"text":417},"d98c4fec7abc0",[],"This can take ",{"_key":419,"_type":97,"marks":420,"text":79},"d98c4fec7abc1",[360],{"_key":422,"_type":97,"marks":423,"text":424},"d98c4fec7abc2",[]," for a single user.",[],{"_key":427,"_type":93,"children":428,"markDefs":433,"style":101},"3bcf943dc713",[429],{"_key":430,"_type":97,"marks":431,"text":432},"b4eb2e66c4230",[],"What makes these issues so time-consuming isn’t complexity in isolation. It’s layering. Salesforce permissions are additive, inherited, and overridden in ways that only reveal themselves when viewed together. A single missing checkbox can be the result of half a dozen interacting decisions made months or years apart. By the time you find the answer, 45 minutes have passed. The fix is often small. The effort to understand it was not.",[],{"_key":435,"_type":93,"children":436,"markDefs":441,"style":101},"81cc0cefb954",[437],{"_key":438,"_type":97,"marks":439,"text":440},"0fddb178da8f0",[],"With the Permissions Agent, that investigation collapses into a question.",[],{"_key":443,"_type":93,"children":444,"markDefs":449,"style":101},"5ad342b84a5f",[445],{"_key":446,"_type":97,"marks":447,"text":448},"94bc92051cd80",[],"Instead of navigating Setup, exporting reports, or recreating access paths in your head, you ask: Why can’t this user edit this record? The agent evaluates the user’s effective permissions across profiles, permission sets, and field access, then explains where access is being blocked and why. What changes isn’t just speed — it’s certainty. You’re seeing the actual answer, grounded in Salesforce’s full permission model.",[],{"_key":451,"_type":93,"children":452,"markDefs":457,"style":101},"cd8a8ddcd3c4",[453],{"_key":454,"_type":97,"marks":455,"text":456},"7e3ab07676f60",[360],"With the Permissions Agent",[],{"_key":459,"_type":93,"children":460,"markDefs":465,"style":101},"92752c4f9f34",[461],{"_key":462,"_type":97,"marks":463,"text":464},"c21302668c850",[],"You ask:",[],{"_key":467,"_type":93,"children":468,"level":135,"listItem":175,"markDefs":473,"style":101},"e95d9d702a20",[469],{"_key":470,"_type":97,"marks":471,"text":472},"19d87c92e4fe0",[161],"“What permissions does John Smith have on Opportunity?”",[],{"_key":475,"_type":93,"children":476,"level":135,"listItem":175,"markDefs":481,"style":101},"31e5a292c80e",[477],{"_key":478,"_type":97,"marks":479,"text":480},"aaba3062c2630",[161],"“Can the Sales User profile edit the Amount field?”",[],{"_key":483,"_type":93,"children":484,"level":135,"listItem":175,"markDefs":489,"style":101},"0bd4d132329d",[485],{"_key":486,"_type":97,"marks":487,"text":488},"afbc7293a78c0",[161],"“What’s different between these two profiles?”",[],{"_key":491,"_type":93,"children":492,"markDefs":497,"style":101},"77fd190af356",[493],{"_key":494,"_type":97,"marks":495,"text":496},"cd410baae76a0",[],"The agent evaluates permissions explains:",[],{"_key":499,"_type":93,"children":500,"level":135,"listItem":175,"markDefs":505,"style":101},"ceadec84be12",[501],{"_key":502,"_type":97,"marks":503,"text":504},"ffef3737f6bc0",[],"Where access is granted",[],{"_key":507,"_type":93,"children":508,"level":135,"listItem":175,"markDefs":513,"style":101},"167c413f5955",[509],{"_key":510,"_type":97,"marks":511,"text":512},"08297579b7690",[],"Where it’s restricted",[],{"_key":515,"_type":93,"children":516,"level":135,"listItem":175,"markDefs":521,"style":101},"bde54d3f3fd6",[517],{"_key":518,"_type":97,"marks":519,"text":520},"c466a7089e020",[],"What’s overriding what",[],{"_key":523,"_type":93,"children":524,"markDefs":537,"style":101},"7c3f695691b1",[525,529,533],{"_key":526,"_type":97,"marks":527,"text":528},"6b9652a9d5560",[],"Access issues are resolved in ",{"_key":530,"_type":97,"marks":531,"text":532},"6b9652a9d5561",[360],"minutes",{"_key":534,"_type":97,"marks":535,"text":536},"6b9652a9d5562",[],", not an hour.",[],{"_key":539,"_type":93,"children":540,"markDefs":545,"style":101},"2980255582de",[541],{"_key":542,"_type":97,"marks":543,"text":544},"4cfb71a060ed0",[],"This is what troubleshooting access issues looks like when permissions are something you can reason about directly, instead of something you have to reconstruct under pressure.",[],{"_key":547,"_type":93,"children":548,"markDefs":553,"style":150},"3ecba3a2748d",[549],{"_key":550,"_type":97,"marks":551,"text":552},"07cc004eddba0",[],"Use Case 2: Security audits & compliance reviews",[],{"_key":555,"_type":93,"children":556,"markDefs":561,"style":101},"7ac7a1ed8b79",[557],{"_key":558,"_type":97,"marks":559,"text":560},"54342b8aa93a0",[],"Who actually has access to our data? On the surface, the question sounds straightforward. In Salesforce, it never is.",[],{"_key":563,"_type":93,"children":564,"markDefs":569,"style":101},"d173be75d460",[565],{"_key":566,"_type":97,"marks":567,"text":568},"7aa2bc87499b0",[],"This comes up during:",[],{"_key":571,"_type":93,"children":572,"level":135,"listItem":175,"markDefs":577,"style":101},"d665b29a1076",[573],{"_key":574,"_type":97,"marks":575,"text":576},"43fd810c1eb60",[],"SOX audits",[],{"_key":579,"_type":93,"children":580,"level":135,"listItem":175,"markDefs":585,"style":101},"5ab2ae901821",[581],{"_key":582,"_type":97,"marks":583,"text":584},"1cfad46880550",[],"SOC 2 reviews",[],{"_key":587,"_type":93,"children":588,"level":135,"listItem":175,"markDefs":593,"style":101},"831e5fd7a2f3",[589],{"_key":590,"_type":97,"marks":591,"text":592},"fa0abc04aefd0",[],"HIPAA readiness",[],{"_key":595,"_type":93,"children":596,"level":135,"listItem":175,"markDefs":601,"style":101},"9283829a3967",[597],{"_key":598,"_type":97,"marks":599,"text":600},"c4d66765cb800",[],"Internal security reviews",[],{"_key":603,"_type":93,"children":604,"level":135,"listItem":175,"markDefs":609,"style":101},"ce0154a3d593",[605],{"_key":606,"_type":97,"marks":607,"text":608},"a78c53a1eb9d0",[],"Leadership check-ins",[],{"_key":611,"_type":93,"children":612,"markDefs":617,"style":101},"2a2e63f28b99",[613],{"_key":614,"_type":97,"marks":615,"text":616},"44f9b57266920",[],"Permissions are spread across profiles, permission sets, role hierarchies, and historical exceptions that made sense at the time. Some users were granted elevated access for a migration. Others inherited it during a reorg. A few haven’t logged in for months, but still carry powerful permissions simply because no one has revisited them.",[],{"_key":619,"_type":93,"children":620,"markDefs":625,"style":101},"4a581872e874",[621],{"_key":622,"_type":97,"marks":623,"text":624},"22ddfd18fe620",[],"When an audit starts, admins shift from operating the system to explaining it.",[],{"_key":627,"_type":93,"children":628,"markDefs":632,"style":101},"9339d77d664e",[629],{"_key":630,"_type":97,"marks":631,"text":361},"19a6f6ed5be30",[360],[],{"_key":634,"_type":93,"children":635,"markDefs":640,"style":101},"b579c4ccbd04",[636],{"_key":637,"_type":97,"marks":638,"text":639},"16423e5f984a0",[],"Audits usually involve:",[],{"_key":642,"_type":93,"children":643,"level":135,"listItem":175,"markDefs":648,"style":101},"b2fe0e5aed68",[644],{"_key":645,"_type":97,"marks":646,"text":647},"f7f4ea84dc460",[],"Running multiple user and permission reports",[],{"_key":650,"_type":93,"children":651,"level":135,"listItem":175,"markDefs":656,"style":101},"aa0265886c94",[652],{"_key":653,"_type":97,"marks":654,"text":655},"24764c6b7e250",[],"Exporting to spreadsheets",[],{"_key":658,"_type":93,"children":659,"level":135,"listItem":175,"markDefs":664,"style":101},"ab477567d6cb",[660],{"_key":661,"_type":97,"marks":662,"text":663},"d115ef7feb550",[],"Manually identifying risky permissions",[],{"_key":666,"_type":93,"children":667,"level":135,"listItem":175,"markDefs":672,"style":101},"9524e35701d5",[668],{"_key":669,"_type":97,"marks":670,"text":671},"985b8473c75b0",[],"Reconciling login activity separately",[],{"_key":674,"_type":93,"children":675,"level":135,"listItem":175,"markDefs":680,"style":101},"2dd114e85df6",[676],{"_key":677,"_type":97,"marks":678,"text":679},"333249c0da9c0",[],"Repeating the process every quarter",[],{"_key":682,"_type":93,"children":683,"markDefs":695,"style":101},"0a84818b0148",[684,688,691],{"_key":685,"_type":97,"marks":686,"text":687},"31655dbcd1d80",[],"A full audit often takes ",{"_key":689,"_type":97,"marks":690,"text":84},"31655dbcd1d81",[360],{"_key":692,"_type":97,"marks":693,"text":694},"31655dbcd1d82",[],".",[],{"_key":697,"_type":93,"children":698,"markDefs":703,"style":101},"1ec0d6987310",[699],{"_key":700,"_type":97,"marks":701,"text":702},"7ccd4413c3f80",[],"They run user reports. Then permission reports. Then login history. They export everything to spreadsheets, cross-reference access manually, and try to build a coherent picture of risk from fragmented data. Each pass reveals another question: Does this admin still need ModifyAllData? Why does this inactive user still have a license? How many people can export customer data?",[],{"_key":705,"_type":93,"children":706,"markDefs":711,"style":101},"776c518afda5",[707],{"_key":708,"_type":97,"marks":709,"text":710},"3a012be20e600",[],"By the time the answers come together, days have passed. And even then, the findings are correct as of the moment the reports were pulled — not necessarily now.",[],{"_key":713,"_type":93,"children":714,"markDefs":719,"style":101},"ee661bbc9c63",[715],{"_key":716,"_type":97,"marks":717,"text":718},"7d35f64264790",[],"With the Permissions Agent, that process changes fundamentally.",[],{"_key":721,"_type":93,"children":722,"markDefs":727,"style":101},"a1545173e1ed",[723],{"_key":724,"_type":97,"marks":725,"text":726},"8b2be50c89ad0",[],"Instead of assembling evidence manually, teams ask direct questions: Who has ModifyAllData or ViewAllData? Which admins haven’t logged in recently? Who can export data? The agent evaluates effective permissions across the org and surfaces the results with context — not just names, but why access exists and where it comes from.",[],{"_key":729,"_type":93,"children":730,"markDefs":734,"style":101},"75721509c498",[731],{"_key":732,"_type":97,"marks":733,"text":456},"5a660f1ec3bd0",[360],[],{"_key":736,"_type":93,"children":737,"markDefs":741,"style":101},"2af864f73b28",[738],{"_key":739,"_type":97,"marks":740,"text":464},"88e5b5b05c770",[],[],{"_key":743,"_type":93,"children":744,"level":135,"listItem":175,"markDefs":749,"style":101},"16a6e5b5347c",[745],{"_key":746,"_type":97,"marks":747,"text":748},"2a0c48647ba10",[161],"“Who has ModifyAllData or ViewAllData?”",[],{"_key":751,"_type":93,"children":752,"level":135,"listItem":175,"markDefs":757,"style":101},"6cd8bf0471e4",[753],{"_key":754,"_type":97,"marks":755,"text":756},"7277d57054040",[161],"“Which admins haven’t logged in recently?”",[],{"_key":759,"_type":93,"children":760,"level":135,"listItem":175,"markDefs":765,"style":101},"9ebf5c61d86b",[761],{"_key":762,"_type":97,"marks":763,"text":764},"5b09e2aea6850",[161],"“Who can export data?”",[],{"_key":767,"_type":93,"children":768,"markDefs":773,"style":101},"e6849db314f7",[769],{"_key":770,"_type":97,"marks":771,"text":772},"429bcb5635ec0",[],"The agent surfaces:",[],{"_key":775,"_type":93,"children":776,"level":135,"listItem":175,"markDefs":781,"style":101},"4c09cbdd6f24",[777],{"_key":778,"_type":97,"marks":779,"text":780},"3338a3bd24280",[],"Over-provisioned users",[],{"_key":783,"_type":93,"children":784,"level":135,"listItem":175,"markDefs":789,"style":101},"b052f2aae6f8",[785],{"_key":786,"_type":97,"marks":787,"text":788},"cd4a2d9a69a90",[],"Dormant admins",[],{"_key":791,"_type":93,"children":792,"level":135,"listItem":175,"markDefs":797,"style":101},"03469e50c1b1",[793],{"_key":794,"_type":97,"marks":795,"text":796},"5e7f14cfec6b0",[],"Risky permissions clusters",[],{"_key":799,"_type":93,"children":800,"level":135,"listItem":175,"markDefs":805,"style":101},"e789ff2fd740",[801],{"_key":802,"_type":97,"marks":803,"text":804},"db160eb8d8fe0",[],"Clear counts and context",[],{"_key":807,"_type":93,"children":808,"markDefs":813,"style":101},"71ee84484e6f",[809],{"_key":810,"_type":97,"marks":811,"text":812},"1bb5b74c36840",[],"In a real 104-user org, the agent uncovered:",[],{"_key":815,"_type":93,"children":816,"level":135,"listItem":175,"markDefs":821,"style":101},"50bce35e9708",[817],{"_key":818,"_type":97,"marks":819,"text":820},"6a004e876e4c0",[],"18 System Administrators (recommended \u003C5)",[],{"_key":823,"_type":93,"children":824,"level":135,"listItem":175,"markDefs":829,"style":101},"dd5c261241fd",[825],{"_key":826,"_type":97,"marks":827,"text":828},"fce04e952bb00",[],"17 users with ModifyAllData",[],{"_key":831,"_type":93,"children":832,"level":135,"listItem":175,"markDefs":837,"style":101},"3a4177677dd4",[833],{"_key":834,"_type":97,"marks":835,"text":836},"89b78b081d150",[],"10+ inactive users with licenses",[],{"_key":839,"_type":93,"children":840,"level":135,"listItem":175,"markDefs":845,"style":101},"2bd6ff7c4579",[841],{"_key":842,"_type":97,"marks":843,"text":844},"20b23b2009a00",[],"Deprecated profiles still in use",[],{"_key":847,"_type":93,"children":848,"markDefs":860,"style":101},"f452f1fb7ca2",[849,853,856],{"_key":850,"_type":97,"marks":851,"text":852},"2f888b5161aa0",[],"A security audit completed in ",{"_key":854,"_type":97,"marks":855,"text":85},"2f888b5161aa1",[360],{"_key":857,"_type":97,"marks":858,"text":859},"2f888b5161aa2",[],", not days — with findings that are immediately actionable.",[],{"_key":862,"_type":93,"children":863,"markDefs":868,"style":101},"54500ae15e9f",[864],{"_key":865,"_type":97,"marks":866,"text":867},"5b40d44f54590",[],"What stood out wasn’t the presence of these issues. It was how quickly they became visible.",[],{"_key":870,"_type":93,"children":871,"markDefs":876,"style":101},"0d84c88ef430",[872],{"_key":873,"_type":97,"marks":874,"text":875},"1b2c0ad4bbac0",[],"The same analysis that typically requires two to three days of focused work was completed in about twenty minutes. The results weren’t just faster — they were immediately actionable.",[],{"_key":878,"_type":93,"children":879,"markDefs":884,"style":101},"26999884317f",[880],{"_key":881,"_type":97,"marks":882,"text":883},"c12d6f425ff30",[],"This is what security reviews look like when permissions are something you can inspect directly, rather than reconstruct under pressure. Audits become a continuous practice instead of a quarterly fire drill. Leadership questions are answered with clarity instead of caveats. And admins spend less time defending spreadsheets, and more time reducing real risk.",[],{"_key":886,"_type":93,"children":887,"markDefs":892,"style":150},"587e9c288c8f",[888],{"_key":889,"_type":97,"marks":890,"text":891},"4a02327d5f830",[],"Use Case 3: License optimization (the quiet cost leak)",[],{"_key":894,"_type":93,"children":895,"markDefs":900,"style":101},"eb65dc78ec76",[896],{"_key":897,"_type":97,"marks":898,"text":899},"aefa7a43869e0",[],"Why are our Salesforce costs so high? Are we actually using all these licenses?",[],{"_key":902,"_type":93,"children":903,"markDefs":908,"style":101},"7e11dfcb1727",[904],{"_key":905,"_type":97,"marks":906,"text":907},"37ef9d512dc50",[],"New teams get onboarded, a temporary contractor is given full access, an employee changes roles but keeps their old license. Over time, Salesforce becomes more expensive because teams lack visibility into who is actually using what.",[],{"_key":910,"_type":93,"children":911,"markDefs":916,"style":101},"ab1dde699a3e",[912],{"_key":913,"_type":97,"marks":914,"text":915},"6d934ae11ad10",[],"Answering that inside Salesforce is harder than it should be. License assignment lives in one place, login history in another, activity is scattered across reports that don’t tell a complete story on their own. To understand whether a license is justified, admins have to manually correlate access, usage, and role context often by exporting data and working through spreadsheets that age the moment they’re created. As a result, license reviews are delayed or skipped altogether.",[],{"_key":918,"_type":93,"children":919,"markDefs":923,"style":101},"9cc964b9f3c6",[920],{"_key":921,"_type":97,"marks":922,"text":361},"83a91d41689b0",[360],[],{"_key":925,"_type":93,"children":926,"markDefs":931,"style":101},"e3d1a309f52d",[927],{"_key":928,"_type":97,"marks":929,"text":930},"160ac0c0b90b0",[],"Admins often:",[],{"_key":933,"_type":93,"children":934,"level":135,"listItem":175,"markDefs":939,"style":101},"9ae3fa3076d3",[935],{"_key":936,"_type":97,"marks":937,"text":938},"ad64adc26e6a0",[],"Pull login history reports",[],{"_key":941,"_type":93,"children":942,"level":135,"listItem":175,"markDefs":947,"style":101},"60dfb338367f",[943],{"_key":944,"_type":97,"marks":945,"text":946},"a99f8b9a833a0",[],"Cross-reference license assignments",[],{"_key":949,"_type":93,"children":950,"level":135,"listItem":175,"markDefs":955,"style":101},"d89ac6ede34d",[951],{"_key":952,"_type":97,"marks":953,"text":954},"37e60dad2fea0",[],"Manually assess activity levels",[],{"_key":957,"_type":93,"children":958,"level":135,"listItem":175,"markDefs":963,"style":101},"7bd66b9ff788",[959],{"_key":960,"_type":97,"marks":961,"text":962},"013886af628e0",[],"Repeat this process ad hoc",[],{"_key":965,"_type":93,"children":966,"markDefs":971,"style":101},"e779c1d1b2a3",[967],{"_key":968,"_type":97,"marks":969,"text":970},"87adfdc36b3a0",[],"With the Permissions Agent, that hesitation disappears.",[],{"_key":973,"_type":93,"children":974,"markDefs":979,"style":101},"3e5f22bb0cac",[975],{"_key":976,"_type":97,"marks":977,"text":978},"0dc8238da2ad0",[],"Instead of piecing together signals manually, teams ask straightforward questions: Which users have never logged in? Who hasn’t been active recently but still holds a license? Which users have expensive licenses with minimal usage? The agent evaluates license assignments alongside login activity and effective access, surfacing patterns that are otherwise easy to miss.",[],{"_key":981,"_type":93,"children":982,"markDefs":986,"style":101},"023af3eae8ec",[983],{"_key":984,"_type":97,"marks":985,"text":456},"7980b4586f1c0",[360],[],{"_key":988,"_type":93,"children":989,"markDefs":993,"style":101},"666938530a1f",[990],{"_key":991,"_type":97,"marks":992,"text":464},"715837077b750",[],[],{"_key":995,"_type":93,"children":996,"level":135,"listItem":175,"markDefs":1001,"style":101},"2253ab4760a8",[997],{"_key":998,"_type":97,"marks":999,"text":1000},"a6f0d8c303690",[161],"“Which users have never logged in?”",[],{"_key":1003,"_type":93,"children":1004,"level":135,"listItem":175,"markDefs":1009,"style":101},"5872d10cf75c",[1005],{"_key":1006,"_type":97,"marks":1007,"text":1008},"e8cd7b561f390",[161],"“Show me license utilization.”",[],{"_key":1011,"_type":93,"children":1012,"level":135,"listItem":175,"markDefs":1017,"style":101},"5e392267e361",[1013],{"_key":1014,"_type":97,"marks":1015,"text":1016},"3f0db1da16010",[161],"“Who has expensive licenses but low activity?”",[],{"_key":1019,"_type":93,"children":1020,"markDefs":1025,"style":101},"9230f03ffdfd",[1021],{"_key":1022,"_type":97,"marks":1023,"text":1024},"04ea137733e30",[],"The agent correlates:",[],{"_key":1027,"_type":93,"children":1028,"level":135,"listItem":175,"markDefs":1032,"style":101},"9b4555cc5d12",[1029],{"_key":1030,"_type":97,"marks":1031,"text":231},"5282765d49da0",[],[],{"_key":1034,"_type":93,"children":1035,"level":135,"listItem":175,"markDefs":1040,"style":101},"f56f2a09d8a9",[1036],{"_key":1037,"_type":97,"marks":1038,"text":1039},"428d78a2ff6d0",[],"License type",[],{"_key":1042,"_type":93,"children":1043,"level":135,"listItem":175,"markDefs":1048,"style":101},"f53dd670e03c",[1044],{"_key":1045,"_type":97,"marks":1046,"text":1047},"40e324cc80400",[],"User access level",[],{"_key":1050,"_type":93,"children":1051,"markDefs":1056,"style":101},"ad1d3b12367a",[1052],{"_key":1053,"_type":97,"marks":1054,"text":1055},"081f61b35b710",[],"License optimization stops being a once-a-year exercise driven by renewal pressure. It becomes an ongoing practice grounded in visibility.",[],{"_key":1058,"_type":93,"children":1059,"markDefs":1064,"style":150},"494e70860bc7",[1060],{"_key":1061,"_type":97,"marks":1062,"text":1063},"c18b1a86a9a90",[],"Use Case 4: Governance & org hygiene",[],{"_key":1066,"_type":93,"children":1067,"markDefs":1072,"style":101},"0b2b36868580",[1068],{"_key":1069,"_type":97,"marks":1070,"text":1071},"17ece9bd16380",[],"Salesforce orgs age over years of growth, acquisitions, and shifting teams. Eventually, no one is quite sure which access models are still valid.",[],{"_key":1074,"_type":93,"children":1075,"markDefs":1080,"style":101},"2353049da08c",[1076],{"_key":1077,"_type":97,"marks":1078,"text":1079},"af9f84a5d5560",[],"Governance issues live in inconsistencies like users without roles, profiles labeled “Do Not Use” that still have active assignments, and a growing number of System Administrators added over time to unblock work, but never reduced once the urgency passed. In Salesforce, identifying this drift is possible, but slow.",[],{"_key":1082,"_type":93,"children":1083,"markDefs":1087,"style":101},"fba2a4c80ccd",[1084],{"_key":1085,"_type":97,"marks":1086,"text":361},"1b36a8a08b6d0",[360],[],{"_key":1089,"_type":93,"children":1090,"markDefs":1095,"style":101},"d8ab5060f295",[1091],{"_key":1092,"_type":97,"marks":1093,"text":1094},"b50a304366770",[],"Governance reviews require:",[],{"_key":1097,"_type":93,"children":1098,"level":135,"listItem":175,"markDefs":1103,"style":101},"8d35d59e18ff",[1099],{"_key":1100,"_type":97,"marks":1101,"text":1102},"2809f9f5ed5a0",[],"Manually checking roles",[],{"_key":1105,"_type":93,"children":1106,"level":135,"listItem":175,"markDefs":1111,"style":101},"8cce6b3dbe14",[1107],{"_key":1108,"_type":97,"marks":1109,"text":1110},"479a1cbc85d50",[],"Hunting for unused profiles",[],{"_key":1113,"_type":93,"children":1114,"level":135,"listItem":175,"markDefs":1119,"style":101},"bb8c870bd31d",[1115],{"_key":1116,"_type":97,"marks":1117,"text":1118},"921dbff2887d0",[],"Counting admins by hand",[],{"_key":1121,"_type":93,"children":1122,"level":135,"listItem":175,"markDefs":1127,"style":101},"45ab9ec958c7",[1123],{"_key":1124,"_type":97,"marks":1125,"text":1126},"0db415d09c3c0",[],"Relying on naming conventions that may no longer apply",[],{"_key":1129,"_type":93,"children":1130,"markDefs":1144,"style":101},"e22120fe1f6a",[1131,1135,1140],{"_key":1132,"_type":97,"marks":1133,"text":1134},"1bc44893e1800",[],"As a result, ",{"_key":1136,"_type":97,"marks":1137,"text":1139},"0fff708fedeb",[1138],"797803db3d15","governance reviews tend to be reactive",{"_key":1141,"_type":97,"marks":1142,"text":1143},"496d8c4b550d",[],". They happen during audits, reorganizations, or incidents but not as part of normal operations.",[1145],{"_key":1138,"_ref":1146,"_type":129},"aa08201e-8009-4516-9157-9c3acdd0afa1",{"_key":1148,"_type":93,"children":1149,"markDefs":1154,"style":101},"cd6e608e648b",[1150],{"_key":1151,"_type":97,"marks":1152,"text":1153},"0ff42bc5b9b70",[],"The Permissions Agent changes this dynamic by making governance questions explicit and answerable.",[],{"_key":1156,"_type":93,"children":1157,"markDefs":1161,"style":101},"005b2c5d91a7",[1158],{"_key":1159,"_type":97,"marks":1160,"text":456},"6aecfb477f320",[360],[],{"_key":1163,"_type":93,"children":1164,"markDefs":1168,"style":101},"1bb4eaa5ccee",[1165],{"_key":1166,"_type":97,"marks":1167,"text":464},"94350ef450ba0",[],[],{"_key":1170,"_type":93,"children":1171,"level":135,"listItem":175,"markDefs":1176,"style":101},"9255dcac960a",[1172],{"_key":1173,"_type":97,"marks":1174,"text":1175},"da045901e1fb0",[161],"“Which users don’t have a role assigned?”",[],{"_key":1178,"_type":93,"children":1179,"level":135,"listItem":175,"markDefs":1184,"style":101},"34371cc1d657",[1180],{"_key":1181,"_type":97,"marks":1182,"text":1183},"031c6c592a7e0",[161],"“Are there any profiles marked ‘Do Not Use’ that still have users?”",[],{"_key":1186,"_type":93,"children":1187,"level":135,"listItem":175,"markDefs":1192,"style":101},"38dbe95f2829",[1188],{"_key":1189,"_type":97,"marks":1190,"text":1191},"5a495d75eca30",[161],"“How many System Administrators do we have?”",[],{"_key":1194,"_type":93,"children":1195,"markDefs":1200,"style":101},"956735f4b1d4",[1196],{"_key":1197,"_type":97,"marks":1198,"text":1199},"8e0cc0a6387c0",[],"The agent makes drift visible:",[],{"_key":1202,"_type":93,"children":1203,"level":135,"listItem":175,"markDefs":1208,"style":101},"6fadf9867f20",[1204],{"_key":1205,"_type":97,"marks":1206,"text":1207},"3fbafab228d50",[],"Orphaned users",[],{"_key":1210,"_type":93,"children":1211,"level":135,"listItem":175,"markDefs":1216,"style":101},"2008aa1ef556",[1212],{"_key":1213,"_type":97,"marks":1214,"text":1215},"0ed23138ebe80",[],"Legacy profiles",[],{"_key":1218,"_type":93,"children":1219,"level":135,"listItem":175,"markDefs":1224,"style":101},"82d5645f5603",[1220],{"_key":1221,"_type":97,"marks":1222,"text":1223},"b0cd6bd802ab0",[],"Admin sprawl",[],{"_key":1226,"_type":93,"children":1227,"level":135,"listItem":175,"markDefs":1232,"style":101},"6799cc8159ba",[1228],{"_key":1229,"_type":97,"marks":1230,"text":1231},"bb62738ab4e70",[],"Broken governance assumptions",[],{"_key":1234,"_type":93,"children":1235,"markDefs":1240,"style":101},"aa0ce82d72fc",[1236],{"_key":1237,"_type":97,"marks":1238,"text":1239},"1f21757bb4cc0",[],"Governance stops being about tribal knowledge and becomes something observable. Admins can understand the impact of changes and clean up access with confidence instead of caution.",[],{"_key":1242,"_type":93,"children":1243,"markDefs":1248,"style":150},"9e64bdec2b44",[1244],{"_key":1245,"_type":97,"marks":1246,"text":1247},"cfcaa7f938f00",[],"The shift: From setup screens to conversations",[],{"_key":1250,"_type":93,"children":1251,"markDefs":1256,"style":101},"9137e30e0b7b",[1252],{"_key":1253,"_type":97,"marks":1254,"text":1255},"b506a54e17c40",[],"Across common permissions tasks, teams using the Permissions Agent see a 97% reduction in time spent on permissions analysis:",[],{"_key":1258,"_type":93,"children":1259,"markDefs":1264,"style":101},"f0ce241b82be",[1260],{"_key":1261,"_type":97,"marks":1262,"text":1263},"ac2f73a45e520",[],"",[],{"_type":1266,"description":1267,"shareImage":1268,"title":139},"seo","The Permissions Agent turns permissions from something admins reconstruct under pressure into something teams can reason about continuously. Questions get answered in minutes, audits become routine instead of disruptive, license costs become visible, and governance stays intentional as the org evolves. Across common permissions tasks, teams using the Permissions Agent see a 97% reduction in time spent on permissions analysis.",{"_type":32,"asset":1269},{"_ref":44,"_type":35},{"_type":1271,"current":1272},"slug","salesforce-permissions-agent-use-cases","Book a demo","openModal3",{"_type":1276,"mediaType":1277,"useCodeToEmbed":136,"vid":1278},"media","video",{"_type":1279,"addPlaceholderImage":136,"config":1280,"img":1281,"transparent":136,"video":1281,"videoTransparentOne":1281,"videoTransparentTwo":1281},"vid",{"autoplay":136,"controls":136,"loop":136,"muted":136},null,{"_type":1283,"hubspotForm":1284},"openModal",{"_type":1285,"showModule":20},"hubspotForm",{"_type":1287,"hubspotForm":1288},"openModal2",{"_type":1285,"showModule":20},{"_type":1274,"bottomText":1290,"hubspotForm":1291,"subtitle":1294,"svg":1295,"title":1296},"Your information is safe with us. No spam, just a demo.",{"_type":1285,"formId":1292,"portalId":1293,"showModule":20},"e89403cc-5852-4528-8a54-54eb0f5477a0","22395100","Discover how Sweep can make Salesforce work better for you and your team.","\u003Csvg width=\"152\" height=\"83\" viewBox=\"0 0 152 83\" fill=\"none\" xmlns=\"http://www.w3.org/2000/svg\"> \u003Cpath d=\"M67.2781 12.9575C70.6341 9.44836 75.3041 7.28288 80.4683 7.28288C87.3366 7.28288 93.3203 11.1181 96.5073 16.8188C99.2781 15.5795 102.348 14.8881 105.574 14.8881C117.958 14.8881 128 25.0372 128 37.5734C128 50.1097 117.958 60.2588 105.574 60.2588C104.065 60.2588 102.582 60.1022 101.151 59.8152C98.3415 64.8376 92.9951 68.2293 86.8423 68.2293C84.2667 68.2293 81.8341 67.6292 79.6748 66.5726C76.826 73.2907 70.1919 78 62.465 78C54.7382 78 47.5447 72.8863 44.9171 65.7246C43.7593 65.9725 42.5756 66.1029 41.3528 66.1029C31.7659 66.1029 24 58.2237 24 48.5182C24 42.0088 27.4862 36.3211 32.6764 33.2816C31.6098 30.8161 31.0114 28.0897 31.0114 25.2328C31.0114 14.0663 40.052 5 51.213 5C57.7691 5 63.5837 8.11776 67.2781 12.9575Z\" fill=\"#8FCCFF\" stroke=\"#2C1A4F\" stroke-width=\"1.5\" stroke-linejoin=\"round\"/> \u003Cpath fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M126.823 17.8878C126.688 18.2322 126.2 18.2322 126.064 17.8878C124.692 14.4201 121.944 11.673 118.475 10.3045C118.13 10.1688 118.13 9.68192 118.474 9.54614C121.938 8.17765 124.679 5.43054 126.04 1.9629C126.175 1.61849 126.663 1.61849 126.799 1.9629C128.171 5.43054 130.919 8.17765 134.388 9.54614C134.732 9.68192 134.733 10.1688 134.389 10.3045C130.924 11.673 128.184 14.4201 126.823 17.8878ZM138.985 23.7847C139.137 23.8447 139.137 24.0608 138.985 24.1212C137.448 24.7291 136.23 25.9473 135.624 27.4847C135.564 27.6372 135.348 27.6376 135.288 27.4852C134.681 25.9496 133.464 24.7351 131.927 24.1318C131.774 24.0719 131.774 23.8558 131.927 23.7954C133.464 23.1875 134.681 21.9693 135.288 20.4319C135.348 20.2794 135.564 20.279 135.624 20.4314C136.23 21.967 137.448 23.1815 138.985 23.7847ZM147.899 14.3095C148.114 14.2245 148.114 13.9202 147.899 13.8359C145.735 12.9865 144.021 11.2766 143.167 9.1147C143.083 8.90019 142.779 8.90065 142.694 9.11542C141.84 11.2799 140.126 12.995 137.962 13.8508C137.747 13.9359 137.747 14.2401 137.962 14.3245C140.126 15.1739 141.84 16.8837 142.694 19.0457C142.779 19.2602 143.083 19.2597 143.167 19.0449C144.021 16.8804 145.735 15.1654 147.899 14.3095Z\" fill=\"white\"/> \u003Cpath d=\"M126.064 17.8878L125.366 18.1637H125.366L126.064 17.8878ZM126.823 17.8878L127.521 18.1618L126.823 17.8878ZM118.475 10.3045L118.75 9.60687H118.75L118.475 10.3045ZM118.474 9.54614L118.198 8.84858H118.198L118.474 9.54614ZM126.04 1.9629L125.342 1.68885L125.342 1.68885L126.04 1.9629ZM126.799 1.9629L127.496 1.68703V1.68703L126.799 1.9629ZM134.388 9.54614L134.663 8.84847L134.663 8.84847L134.388 9.54614ZM134.389 10.3045L134.665 11.0021L134.389 10.3045ZM138.985 24.1212L139.261 24.8186L139.261 24.8186L138.985 24.1212ZM138.985 23.7847L139.259 23.0866L139.259 23.0866L138.985 23.7847ZM135.624 27.4847L136.322 27.7599L136.322 27.7599L135.624 27.4847ZM135.288 27.4852L135.985 27.2097L135.985 27.2097L135.288 27.4852ZM131.927 24.1318L131.653 24.83L131.653 24.83L131.927 24.1318ZM131.927 23.7954L131.651 23.098L131.927 23.7954ZM135.288 20.4319L134.59 20.1567L134.59 20.1567L135.288 20.4319ZM135.624 20.4314L134.926 20.7069L134.926 20.7069L135.624 20.4314ZM147.899 13.8359L148.173 13.1377H148.173L147.899 13.8359ZM147.899 14.3095L148.175 15.0069L147.899 14.3095ZM143.167 9.1147L142.47 9.39022L143.167 9.1147ZM142.694 9.11542L143.392 9.39065L142.694 9.11542ZM137.962 13.8508L137.686 13.1534L137.962 13.8508ZM137.962 14.3245L137.688 15.0226L137.688 15.0226L137.962 14.3245ZM142.694 19.0457L143.392 18.7701L142.694 19.0457ZM143.167 19.0449L143.865 19.3202L143.865 19.3202L143.167 19.0449ZM125.366 18.1637C125.752 19.1378 127.136 19.1433 127.521 18.1618L126.125 17.6137C126.24 17.3211 126.648 17.3266 126.761 17.6119L125.366 18.1637ZM118.199 11.0022C121.475 12.2945 124.071 14.8889 125.366 18.1637L126.761 17.6119C125.313 13.9514 122.412 11.0515 118.75 9.60687L118.199 11.0022ZM118.198 8.84858C117.218 9.2356 117.226 10.6181 118.199 11.0022L118.75 9.60687C119.035 9.71946 119.041 10.1282 118.749 10.2437L118.198 8.84858ZM125.342 1.68885C124.056 4.96291 121.469 7.55657 118.198 8.84858L118.749 10.2437C122.407 8.79874 125.301 5.89817 126.738 2.23695L125.342 1.68885ZM127.496 1.68703C127.111 0.712866 125.727 0.707412 125.342 1.68885L126.738 2.23695C126.623 2.52956 126.214 2.5241 126.101 2.23877L127.496 1.68703ZM134.663 8.84847C131.387 7.55617 128.792 4.96182 127.496 1.68703L126.101 2.23877C127.549 5.89926 130.451 8.79914 134.113 10.2438L134.663 8.84847ZM134.665 11.0021C135.645 10.6151 135.637 9.23262 134.663 8.84847L134.113 10.2438C133.827 10.1312 133.821 9.72244 134.114 9.60698L134.665 11.0021ZM127.521 18.1618C128.806 14.8878 131.394 12.2941 134.665 11.0021L134.114 9.60698C130.455 11.0519 127.562 13.9525 126.125 17.6137L127.521 18.1618ZM139.261 24.8186C140.043 24.5091 140.049 23.3966 139.259 23.0866L138.711 24.4829C138.226 24.2927 138.232 23.6125 138.709 23.4238L139.261 24.8186ZM136.322 27.7599C136.852 26.4156 137.917 25.3502 139.261 24.8186L138.709 23.4238C136.979 24.108 135.609 25.4789 134.926 27.2094L136.322 27.7599ZM134.59 27.7607C134.902 28.5492 136.013 28.542 136.322 27.7599L134.926 27.2094C135.114 26.7324 135.794 26.7259 135.985 27.2097L134.59 27.7607ZM131.653 24.83C132.996 25.3573 134.06 26.4187 134.59 27.7607L135.985 27.2097C135.302 25.4805 133.931 24.113 132.201 23.4337L131.653 24.83ZM131.651 23.098C130.869 23.4075 130.863 24.52 131.653 24.83L132.201 23.4337C132.685 23.6238 132.68 24.3041 132.203 24.4928L131.651 23.098ZM134.59 20.1567C134.06 21.501 132.995 22.5663 131.651 23.098L132.203 24.4928C133.932 23.8086 135.303 22.4377 135.985 20.7071L134.59 20.1567ZM136.321 20.1559C136.01 19.3674 134.899 19.3746 134.59 20.1567L135.985 20.7071C135.797 21.1841 135.117 21.1906 134.926 20.7069L136.321 20.1559ZM139.259 23.0866C137.916 22.5593 136.852 21.4978 136.321 20.1559L134.926 20.7069C135.609 22.4361 136.98 23.8036 138.711 24.4829L139.259 23.0866ZM147.625 14.534C147.203 14.3683 147.208 13.7762 147.623 13.6121L148.175 15.0069C149.02 14.6728 149.025 13.4721 148.173 13.1377L147.625 14.534ZM142.47 9.39022C143.4 11.7458 145.268 13.6087 147.625 14.534L148.173 13.1377C146.203 12.3643 144.642 10.8075 143.865 8.83919L142.47 9.39022ZM143.392 9.39065C143.228 9.80546 142.636 9.8118 142.47 9.39022L143.865 8.83919C143.529 7.98859 142.329 7.99584 141.996 8.84018L143.392 9.39065ZM138.238 14.5483C140.595 13.6161 142.462 11.7483 143.392 9.39065L141.996 8.84018C141.219 10.8116 139.657 12.3738 137.686 13.1534L138.238 14.5483ZM138.236 13.6264C138.658 13.7921 138.653 14.3842 138.238 14.5483L137.686 13.1534C136.842 13.4875 136.836 14.6882 137.688 15.0226L138.236 13.6264ZM143.392 18.7701C142.461 16.4146 140.594 14.5517 138.236 13.6264L137.688 15.0226C139.658 15.796 141.219 17.3529 141.996 19.3212L143.392 18.7701ZM142.47 18.7697C142.633 18.3549 143.225 18.3486 143.392 18.7701L141.996 19.3212C142.332 20.1718 143.532 20.1645 143.865 19.3202L142.47 18.7697ZM147.623 13.6121C145.267 14.5443 143.4 16.4121 142.47 18.7697L143.865 19.3202C144.643 17.3488 146.204 15.7865 148.175 15.0069L147.623 13.6121Z\" fill=\"#2C1A4F\"/> \u003C/svg>","Schedule a Personalized Demo",{"_type":29,"altText":1298,"dpr":135,"image":1299},"permissions table",{"_type":32,"asset":1300},{"_createdAt":1301,"_id":1302,"_rev":1303,"_type":1304,"_updatedAt":1301,"assetId":1305,"extension":1306,"metadata":1307,"mimeType":1337,"originalFilename":1338,"path":1339,"sha1hash":1305,"size":1340,"uploadId":1341,"url":1342},"2026-02-04T19:02:25Z","image-bc1336f0bd65a220656d3d5b7eb0281a199c4024-1000x337-svg","zauLsYIXJFOxrJAMF535s9","sanity.imageAsset","bc1336f0bd65a220656d3d5b7eb0281a199c4024","svg",{"_type":1308,"blurHash":1309,"dimensions":1310,"hasAlpha":20,"isOpaque":136,"lqip":1315,"palette":1316,"thumbHash":1336},"sanity.imageMetadata","D8P?:j%M00xu00_4WDM{a#M{",{"_type":1311,"aspectRatio":1312,"height":1313,"width":1314},"sanity.imageDimensions",2.9673590504451037,337,1000,"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAHCAYAAAAIy204AAAACXBIWXMAAAsTAAALEwEAmpwYAAABG0lEQVR4nGWRQU4DMQxFuywS4kRInIFueyjYcY62iF3FGXoIyCAhkBDtjO3//VEyUyiwsBI/Jc+JPZN09vyWV0+vcff+0T+Y+ZrkCuD60GOz3/f3fd9vAKwlrWq4+9rMWpCs7FbSZXXNJJ3vh1x8Hvg4GF4iogugACzu6Myic/cuEAVkIVkiUMzrObZc0jYiFtU1y8wLIJcAdyTlERrC5IAiIDPX4Kbeh5GBMgsNBnmkmKnM3GXmsrqasCbkqdAVhADK3WWTMHBkIfNoBZBUvftPOFURCAXjWFkgBUB+yjCyVjT5+4X135KuSW5bfxDF4WO/xAKgRFR22sP4ZkFUtq2O1kNJ82lCN3VibcJEW6kxH9nP/i+rdyfH/AvlqgNPZ70PTAAAAABJRU5ErkJggg==",{"_type":1317,"darkMuted":1318,"darkVibrant":1323,"dominant":1325,"lightMuted":1329,"lightVibrant":1330,"muted":1332,"vibrant":1334},"sanity.imagePalette",{"_type":1319,"background":1320,"foreground":1321,"population":1322,"title":1321},"sanity.imagePaletteSwatch","#444444","#fff",0.01,{"_type":1319,"background":1324,"foreground":1321,"population":134,"title":1321},"#2c245c",{"_type":1319,"background":1326,"foreground":1327,"population":1328,"title":1321},"#b6c3c9","#000",0.62,{"_type":1319,"background":1326,"foreground":1327,"population":1328,"title":1321},{"_type":1319,"background":1331,"foreground":1327,"population":134,"title":1321},"#94b4ec",{"_type":1319,"background":1333,"foreground":1321,"population":134,"title":1321},"#6c849c",{"_type":1319,"background":1335,"foreground":1321,"population":134,"title":1321},"#3c64ec","/veBAoAr9WZEZ2mGYEg98wgYiIeEiEg=","image/svg+xml","permissions-table.svg","images/9eu1m6zu/production/bc1336f0bd65a220656d3d5b7eb0281a199c4024-1000x337.svg",193544,"hREcFBZUBhYztGx1fQ1am6fPLqVgerdi","https://cdn.sanity.io/images/9eu1m6zu/production/bc1336f0bd65a220656d3d5b7eb0281a199c4024-1000x337.svg",[1344,1368],{"_key":1345,"_type":93,"children":1346,"markDefs":1367,"style":101},"ad80452a37c0",[1347,1351,1355,1359,1363],{"_key":1348,"_type":97,"marks":1349,"text":1350},"6439dac81f720",[],"Customers see up to a ",{"_key":1352,"_type":97,"marks":1353,"text":1354},"6439dac81f721",[360],"97%",{"_key":1356,"_type":97,"marks":1357,"text":1358},"6439dac81f722",[]," reduction in time spent on Salesforce permissions analysis, turning ",{"_key":1360,"_type":97,"marks":1361,"text":1362},"6439dac81f723",[360],"2–3",{"_key":1364,"_type":97,"marks":1365,"text":1366},"6439dac81f724",[]," hour permission audits into 2-minute answers.",[],{"_key":1369,"_type":93,"children":1370,"markDefs":1379,"style":101},"8e28ff4c87bd",[1371,1375],{"_key":1372,"_type":97,"marks":1373,"text":1374},"6dd0dad7b1bd0",[360],"Turn audits and access reviews into a single, continuous conversation.",{"_key":1376,"_type":97,"marks":1377,"text":1378},"dc84bdf14c7c0",[],"\n",[],"Permission access, revealed.",{"_key":1382,"_type":1383,"desktop":1384,"desktopLarge":1387,"fillColor":1388,"mobile":1389,"showModule":20,"tablet":1390},"ca7793bccfe0","spacer",{"max":1385,"min":1386,"show":20},100,60,{"max":1385,"min":1386,"show":20},"#FFFFFF",{"max":1385,"min":1386,"show":20},{"max":1385,"min":1386,"show":20},{"_key":1392,"_type":1383,"desktop":1393,"desktopLarge":1394,"fillColor":1388,"mobile":1395,"showModule":20,"tablet":1396},"abd63fc4acb78d6157afafd4893ec9c9",{"max":1385,"min":1386,"show":20},{"max":1385,"min":1386,"show":20},{"max":1385,"min":1386,"show":20},{"max":1385,"min":1386,"show":20},"Announcement Permissions ",{"_type":1266,"description":1399,"noindex":20,"shareImage":1281,"title":1400},"What's new at Sweep: from product releases to platform updates for teams building AI-ready environments. See the latest features and integrations from the team that brought you Metadata Agents. (edited)","What’s New at Sweep | Product Updates & Platform Releases",{"_type":1271,"current":1402},"permissions-agent",3,1776354718484]