Skip to main content
Version: 2

Check user permission

  • Category

    • Security

    • Permission

    • Validation

  • Flow Icon


The Check User Permission component in Plinqx is designed to validate whether the executing user has a specific custom permission assigned. This component is particularly useful for enforcing additional security and access controls within your flows, supplementing the permissions assigned at the API level.


  1. Custom Permission API Name:

    Input the API name of the custom permission you wish to check against the executing user.


  1. Assigned:

    A Boolean value indicating whether the custom permission is assigned (True) or not (False) to the executing user.

Example Scenario - Restricted Data Access

Scenario Overview:

In a Salesforce org, certain sensitive customer data can only be accessed by users with a specific custom permission. The org requires a flow that checks this permission before allowing users to view or edit this data.

Implementation with Check User Permission Component:

  1. Flow Setup for Data Access:

    • Create a Salesforce flow that is triggered when a user attempts to access the sensitive customer data.
  2. Adding Check User Permission Component:

    • Integrate the Check User Permission component at the beginning of the flow to validate the user's permissions.
  3. Configuring Input:

    • 'Custom Permission API Name' is set to the API name of the custom permission that allows access to sensitive data.
  4. Executing Permission Check:

    • The flow processes the user request and uses the component to check if the executing user has the required custom permission.
  5. Handling Check Results:

    • If 'Assigned' is True, the flow proceeds to grant access to the sensitive data.

    • If False, the flow restricts access and optionally triggers a notification or logs the access attempt.


By implementing the Check User Permission component, the Salesforce org ensures that only authorized users can access sensitive customer data. This approach enhances data security and compliance with organizational policies, maintaining strict access control based on custom permissions.