Declarative Webhooks is almost entirely native to Salesforce. For all components that are fully native, we inherit the Salesforce security you know and trust. Outbound callouts are fully native to the Salesforce platform. Inbound calls, while mostly native to Salesforce, use the Declarative Webhook Relay Server to handle the connections between the external system and Salesforce. There are some additional considerations here when it comes to security.
Whenever a user self-authorizes in the inbound call template page, the canvas app connects to the server and stores the following data:
We store this information in order to provide a connection to the org for incoming calls.
After the self-authorization, the server stores the Declarative Webhooks template id, creates a unique URL linked to that template, and displays it in the inbound call page.
When a call is made to the URL, the server will authenticate into Salesforce and relay the call data to the template. The call details are passed through. No call data is stored on the Relay Server. The only data that is stored for metrics and statistics is:
Declarative Webhooks Relay Server runs on Heroku. Heroku is a Salesforce product used for application hosting. For more information on Heroku security please see the following: https://www.heroku.com/policy/security
Yes, there is a way to use DW inbound calls without having a public URL or passing data through the relay server, but the external system must be capable of login into Salesforce using Salesforce REST API.
Declarative Webhooks is HIPAA compliant. In contrast to other middleware that may store and persist Protected Health Information (PHI) on external servers, Declarative Webhooks sets itself apart by prioritizing Salesforce-native functionality as much as possible.
Our approach involves SSL-secured requests over HTTPS during inbound calls from external servers into Salesforce. These requests are transmitted to relay servers, which then facilitate the transfer of information to Salesforce. No data, including PHI, is actually persisted or stored on Omnitoria’s servers. The transient nature of the information, coupled with the inability to access it externally from Salesforce or the originating system, aligns Declarative Webhooks with the HIPAA Conduit Exception Rule.
This rule is applicable to organizations that, although they might typically be considered business associates, are exempted due to their transient access to PHI. As conduits, these organizations, including Declarative Webhooks, only provide data transmission services. The storage of PHI by a conduit must be transient and not persistent, precisely mirroring the operational mechanism of Declarative Webhooks inbound relay servers.
© Omnitoria, All Rights Reserved.