Integration User License Guide

License Details

License Availability

Included Licenses:

Additional Licenses:

Checking License Availability

Company Information Page:

License Allocation Strategy:

Edition Requirements

Supported Editions:

Not Supported:

Setup and Configuration

Step 1: Create Integration User

User Creation Process:

Naming Conventions:

Step 2: Assign Profile

Minimum Access Profile:

Profile Limitations:

Step 3: Assign Permission Set License

Permission Set License Assignment:

When PSL is Required:

Step 4: Configure Permission Sets

Permission Set Design:

Object Permissions:

Field Permissions:

System Permissions:

Permission Set Assignment:

Authentication Patterns

OAuth 2.0 Client Credentials Flow

Server-to-Server Authentication:

When to Use Client Credentials Flow:

When NOT to Use Client Credentials Flow:

OAuth Client Credentials Configuration

Connected App Setup:

Client Credentials Flow Process:

Token Management:

Named Credentials Configuration

Named Credentials for Integration Users:

Benefits of Named Credentials:

Named Credentials Setup:

Alternative Authentication Methods

Username-Password Flow (Not Recommended):

JWT Bearer Token Flow:

Permission Management

Principle of Least Privilege

Permission Strategy:

Permission Review Process:

Permission Set Design Patterns

Dedicated Permission Set per Integration:

Permission Set Structure:

Permission Set Naming Convention:

Object-Level Security

Object Access Considerations:

Sharing Model Impact:

Field-Level Security

Field Access Considerations:

Sensitive Data Handling:

Profile Limitations

API-Only Restriction:

Profile Customization:

Best Practices

Dedicated User per Integration

One User per External System:

Benefits:

Naming Convention:

Security and Audit Trail

Audit Trail Benefits:

Monitoring Integration Users:

Event Monitoring:

Permission Management Strategies

Regular Permission Audits:

Permission Documentation:

Permission Testing:

Regular Audit and Monitoring

Audit Schedule:

Monitoring Activities:

Compliance Considerations:

Integration Naming Conventions

User Naming:

Permission Set Naming:

Connected App Naming:

Security Considerations

API-Only Access Restrictions

UI Access Prevention:

API Access Methods:

Access Limitations:

Network Security Considerations

IP Restrictions:

VPN and Network Security:

Firewall and Network Controls:

Credential Rotation Practices

Credential Rotation Schedule:

Rotation Process:

Credential Storage:

Event Monitoring and API Usage Tracking

Event Monitoring Setup:

API Usage Tracking:

Security Monitoring:

Compliance and Audit Requirements

Audit Requirements:

Compliance Considerations:

Documentation Requirements:

Operational Considerations

Monitoring Integration User Activities

API Usage Monitoring:

Activity Monitoring Tools:

Monitoring Best Practices:

Troubleshooting Common Issues

Authentication Failures:

Permission Issues:

API Limit Issues:

Common Troubleshooting Steps:

License Management and Planning

License Utilization Tracking:

License Planning:

License Optimization:

Migration from Regular User Licenses

Migration Planning:

Migration Process:

Migration Considerations:

Integration Patterns

When to Use Integration User Licenses

Appropriate Use Cases:

Decision Criteria:

Integration with MuleSoft

MuleSoft Integration Pattern:

MuleSoft Configuration:

Related: Integration Platform Patterns - Patterns for MuleSoft and Dell Boomi integrations

Integration with Dell Boomi

Boomi Integration Pattern:

Boomi Configuration:

Related: Integration Platform Patterns - Patterns for MuleSoft and Dell Boomi integrations

REST API Integration Patterns

REST API Usage:

REST API Best Practices:

Related: ETL vs API vs Events - Decision framework for integration patterns

Bulk API Considerations

Bulk API Usage:

Bulk API Best Practices:

Related: SIS Sync Patterns - High-volume batch synchronization patterns

Summary

The Salesforce Integration User License provides a cost-effective and secure way to authenticate external systems with Salesforce. By following the setup, configuration, and best practices outlined in this guide, organizations can implement secure system-to-system integrations while optimizing license costs and maintaining strong security controls.

Key Takeaways:

Q&A

Q: What is the Salesforce Integration User License?

A: The Integration User License is a free API-only license designed for system-to-system integrations. It provides API access without UI access, costs $0 (5 free licenses included with Enterprise/Performance/Unlimited), and enables dedicated users per integration for better security and audit trails.

Q: When should I use Integration User Licenses vs regular user licenses?

A: Use Integration User Licenses for system-to-system integrations, scheduled batch processes, integration platforms (MuleSoft, Boomi), and API-only access scenarios. Use regular user licenses for users requiring Salesforce UI access, portal users, or mobile app access.

Q: How many Integration User Licenses do I get?

A: 5 free Integration User Licenses are included with Enterprise, Performance, and Unlimited editions. Professional Edition does not include them (requires upgrade). Additional licenses can be purchased at approximately $10 per user per month.

Q: What authentication methods can I use with Integration Users?

A: Use OAuth 2.0 Client Credentials Flow (recommended), JWT Bearer Token Flow (for enterprise with certificates), or Username-Password Flow (not recommended). OAuth 2.0 Client Credentials is the preferred method for secure, token-based authentication.

Q: Can Integration Users access the Salesforce UI?

A: No, Integration Users cannot access the Salesforce UI. They have API-only access. Login attempts to the UI will fail. All access must be through APIs (REST, SOAP, Bulk, Streaming, Metadata). The profile cannot be modified to enable UI access.

Q: How do I manage permissions for Integration Users?

A: Grant permissions through Permission Sets (the profile cannot be modified). Create dedicated Permission Sets per integration, grant only necessary object and field permissions, document permission rationale, and regularly audit permissions. Follow the principle of least privilege.

Q: Should I use one Integration User per system or share users?

A: Use one Integration User per external system. This enables clear audit trails per integration, simplifies permission management, improves security isolation, and makes troubleshooting easier. Sharing users across systems makes it difficult to track which system performed actions.

Q: How do I monitor Integration User activities?

A: Enable Event Monitoring for Integration Users, review API usage logs in Setup → Monitoring, track API call volumes and patterns, monitor for failed authentication attempts, review audit logs regularly, and set up dashboards for API usage. Monitor for security anomalies.

Edge Cases and Limitations

Edge Case 1: Integration User License Limits

Scenario: Organization requiring more than 5 Integration User Licenses, causing license constraints.

Consideration:

Edge Case 2: Permission Set Management at Scale

Scenario: Managing permissions for many Integration Users with different access requirements.

Consideration:

Edge Case 3: Integration User Authentication Failures

Scenario: OAuth token expiration or authentication failures causing integration disruptions.

Consideration:

Edge Case 4: Integration User Audit Trail Complexity

Scenario: Multiple Integration Users making it difficult to track which integration performed actions.

Consideration:

Edge Case 5: Migration from Connected App to Integration User

Scenario: Migrating existing integrations from Connected App authentication to Integration User Licenses.

Consideration:

Limitations

See Also:

Related Domains: