|Tool Version||Summer '17|
|Tool Web Site||http://www.salesforce.com/|
|Supported Methodology||[Relational Database] Data Store (Physical Data Model) via REST API|
Import tool: Salesforce Database Summer '17 (http://www.salesforce.com/)
Import interface: [Relational Database] Data Store (Physical Data Model) via REST API from Salesforce (SFDC) Database
Import bridge: 'SalesForceObjects' 11.0.0
This bridge authenticates the consumer and retrieves available physical metadata (e.g., Tables).
It uses the username-password authentication flow that assumes the consumer already has the user's credentials.
When you do not have username-password authentication parameter values but have an access token and your Salesforce instance URL you can specify them using the Miscellaneous parameter (see its description for details). In this case, you still need to fill all mandatory parameters with some text that will be ignored.
In the event that users will be submitting Salesforce Documents, certain security settings must be configured to allow this access on Standard Objects and Custom Objects.
To configure permissions:
- Within Salesforce, click on Setup and then click on Manage Users
- Under the Manage Users tree click on Profiles
- Once the Profiles appear on the right, select which Profile you want to edit and click on the Edit link next to the corresponding profile
Standard Objects: Ensure that the "Documents" section has the Read permissions selected.
Custom Objects: Ensure that the Read permissions selected for each custom objects.
|Instance/My Domain URL||The Salesforce login endpoint URL.
By default (when the value is empty) it is https://login.salesforce.com.
You can use your company' instance URL (such as https://na30.salesforce.com) or My Domain URL (such as https://myCompanyName.my.salesforce.com/).
|User||The username of the user that the connected app is imitating.||STRING||Mandatory|
|Password||The password of the user that the connected app is imitating.
The security token is an automatically generated key that must be added to the end of the password to log in to Salesforce from an untrusted network.Concatenate the password and token when passing the request for authentication.
|Consumer Key||The Consumer Key from the connected app definition.
The connected app’s consumer key, which you can find on the connected app’s Manage Connected Apps page or from the connected app’s definition.
|Consumer Secret||The Consumer Secret from the connected app definition.
The connected app’s consumer secret, which you can find on the connected app’s Manage Connected Apps page or from the connected app’s definition.
|Objects||List of object names, like 'object1, object2'.
An empty list means that all available objects.
You can specify object names as a wieldcard pattern: 'topic?' , '*topic*' or 'topic_?,*topic*'.
|Miscellaneous||Specify miscellaneous options identified with a -letter and value.
For example, -m 4G
-m the maximum Java memory size whole number (e.g. -m 4G or -m 2500M ).
-v set environment variable(s) (e.g. -v var1=value -v var2="value with spaces").
-access_token the Salesforce access token
It is a 'long' case-sensitive alphanumeric key that is used to temporary (minutes or hours) access Salesforce. When an access token expires, attempts to use it fail. In Salesforce terms, the access token is a session ID (SID), much like a session cookie on other systems. It must be protected against misuse.
-instance_url your Salesforce insatance URL (e.g. -instance_url https://na73.salesforce.com)
Mapping information is not available