Portal Architecture Patterns

Overview

Experience Cloud (formerly Community Cloud) portal architecture patterns support multiple user types (students/applicants, external partners/providers, citizens/clients) with different identity providers, security requirements, and access patterns. This document covers architectural patterns for designing and implementing multi-tenant portals.

Core Principle: Design portals to support multiple distinct user communities with different identity providers, security requirements, and access patterns. Use sharing sets, permission sets, and identity providers to isolate and secure each community.

Prerequisites

Required Knowledge:

Recommended Reading:

When to Use Portal Architecture

Use Portal Architecture When

Avoid Portal Architecture When

Portal Architecture Patterns

Pattern 1: Single Portal, Multiple User Types

Architecture: One Experience Cloud site with multiple user types managed via profiles and permission sets.

Use Case: Portal serves multiple user types (students, applicants, partners) with different access levels.

Implementation:

Benefits:

Challenges:

Pattern 2: Multiple Portals, Separate Communities

Architecture: Multiple Experience Cloud sites, one per user community.

Use Case: Distinct user communities (students, partners, citizens) with completely different access patterns.

Implementation:

Benefits:

Challenges:

Pattern 3: Hub-and-Spoke Portal Architecture

Architecture: Central hub portal with spoke portals for specific functions.

Use Case: Central portal (main experience) with specialized portals for specific functions (support, partner portal, etc.).

Implementation:

Benefits:

Challenges:

Identity Provider Patterns

Pattern 1: Salesforce Authentication

Use Case: Simple authentication using Salesforce user accounts.

Implementation:

Benefits:

Limitations:

Pattern 2: External Identity Provider (SAML/OAuth)

Use Case: Integrate with external identity providers (Azure AD, Okta, etc.).

Implementation:

Benefits:

Challenges:

Pattern 3: Multi-Identity Provider Architecture

Use Case: Different identity providers for different user communities.

Implementation:

Benefits:

Challenges:

Sharing Patterns

Sharing Set Pattern

Purpose: Control record access for portal users.

Implementation:

Best Practices:

Manual Sharing Pattern

Purpose: Grant access to specific records for specific users.

Implementation:

Use Cases:

Security Patterns

Permission Set Pattern

Purpose: Grant feature-specific access to portal users.

Implementation:

Best Practices:

Field-Level Security Pattern

Purpose: Control field-level access for portal users.

Implementation:

Best Practices:

Performance Patterns

Caching Pattern

Purpose: Improve portal performance with caching.

Implementation:

Best Practices:

Data Volume Pattern

Purpose: Handle large data volumes in portals.

Implementation:

Best Practices:

Q&A

Q: What is portal architecture in Salesforce?

A: Portal architecture refers to Experience Cloud (Community Cloud) architecture patterns for: (1) Multiple user communities (students, partners, citizens), (2) Different identity providers (Salesforce, SAML, OAuth), (3) Different security requirements (sharing sets, permission sets), (4) Different access patterns (self-service, partner access, public access). Portal architecture enables multi-tenant portal implementations.

Q: When should I use a single portal vs multiple portals?

A: Use single portal when: (1) Similar user types (similar access requirements), (2) Shared components (can share pages and components), (3) Simpler management (one site to manage). Use multiple portals when: (1) Distinct communities (completely different access patterns), (2) Complete isolation (need complete separation), (3) Different branding (different branding per community), (4) Independent scaling (need to scale communities independently).

Q: How do I implement multi-identity provider architecture?

A: Implement by: (1) Configure identity providers (SAML, OAuth for each provider), (2) Login handlers (custom login handlers to route users), (3) Attribute mapping (map attributes per provider), (4) User matching (match users across providers), (5) JIT provisioning (auto-create users on first login). Multi-identity provider architecture supports different identity systems for different user communities.

Q: How do sharing sets work in portals?

A: Sharing sets control record access for portal users: (1) Define sharing sets (specify which records portal users can access), (2) Record criteria (criteria for record access), (3) Field-level sharing (control field-level access), (4) Object-level sharing (control object-level access). Sharing sets provide portal-specific sharing control beyond org-wide defaults.

Q: What are best practices for portal security?

A: Best practices: (1) Use sharing sets (portal-specific sharing), (2) Permission sets (feature-based access), (3) Field-level security (restrict sensitive fields), (4) Regular audits (review access regularly), (5) Test with different user types (test security with different users), (6) Document security model (clear documentation). Portal security requires careful design and regular review.

Q: How do I handle performance in portals?

A: Handle performance by: (1) Platform Cache (cache frequently accessed data), (2) CDN (use CDN for static assets), (3) Pagination (paginate large datasets), (4) Filtering and search (provide filtering capabilities), (5) Lazy loading (lazy load components), (6) Data archiving (archive old data). Portal performance requires optimization at multiple levels.

Q: What are common portal architecture challenges?

A: Common challenges: (1) Complex sharing rules (multiple user types, complex sharing), (2) Identity provider integration (multiple identity providers), (3) Performance (large data volumes, many users), (4) User management (managing many portal users), (5) Customization (balancing customization with maintainability), (6) Testing (testing with different user types). Address challenges through careful architecture design and regular review.