Skip to main content

Salesforce-BrowserCookie for Site Users

Salesforce: Set a Browser Cookie to Enable Debug Logging for Guest Users
Earlier it was very easy to create a debug log for Site Guest User. We just needed to request a debug log for the Site Guest User and the logs were generated without any hassle.

But after the Winter 17 release, you now also need to set a server cookie in the browser to enable debug logs for Site Guest Users. This means that debug logs will only be generated for those doing the debugging, not everyone accessing the site. This is true for sandboxes also.

Follow the below steps to generate a debug log from a Force.com Site Guest User:
1. Request a debug log the Site Guest User like we do for a Salesforce User.
2. Open the Force.com Site URL.
3. Press F12 or Ctrl+Shift+i to open the browser debugger.
4. Open the console of the debugger.
5. Write the below code in the console and press Enter:
document.cookie="debug_logs=debug_logs;domain=.force.com"



6. Do some action on the Force.com site and refresh the debug logs. You will see the new debug logs.


Comments

  1. Маван наки наки наки наки наки наки наки наки наки наки наки наки наки наки наки
    Маван наки наки наки наки наки наки silicone dab rig with titanium nail наки наки Наван. СТННН ТН ТН ТНН - СТН titanium wedding band ТН ТН - seiko titanium watch СТН babylisspro nano titanium hair dryer Т titanium fitness

    ReplyDelete

Post a Comment

Popular posts from this blog

Creating Remote Site Settings Dynamically

As remote site setting is essential for making callouts to external systems. We can create remote site through apex code: Steps: 1.       Add a metadataService class either through WSDL or you can use attached  file: metadataService.class 2.       Use below code: public void createRemoteSiteSetting (){     MetadataService.MetadataPort service = createService();     MetadataService.RemoteSiteSetting remoteSiteSettings = new MetadataService.RemoteSiteSetting();     remoteSiteSettings.fullName = ‘abc123';     remoteSiteSettings.url = 'http://www.clrdp727.com';     remoteSiteSettings.isActive=true;     remoteSiteSettings.disableProtocolSecurity=false;     service.createMetadata(new List<MetadataService.Metadata> { remoteSiteSettings }); } // This method returns the metadata service, using this we ...

Fetching the list of Classes along with their code coverage using API

Tooling API Fetching the list of Classes along with their code coverage using Tooling API We can find the list of classes along with their code coverages from external system. PFB code to fetch the list of classes along with their coverage details, Using  Tooling API. (Here rest call is made, same can be implemented by SOAP). ----------------------------------------------------------------------------------------------------------------------     HTTPRequest req = new HTTPRequest();     String myQuery=’ select+id,ApexClassOrTrigger.Name,NumLinesCovered,NumLinesUncovered+from+ApexCodeCoverageAggregate’;     req.setEndpoint('<Login Instance> /services/data/v39.0/tooling/query/?q= '+myQuery); // Login Instance Example:  https://demo727-dev-ed.my.salesforce.com     req.setMethod('GET');     req.setHeader('Authorization', 'Bearer ' +<Enter the Session Id>); // Example: U...

FETCHING ACCESS TOKEN FOR EINSTEIN PLATFORM SERVICES AUTHNTICATION USING JWT

FETCHING ACCESS TOKEN FOR EINSTEIN PLATFORM SERVICES AUTHNTICATION USING JWT JSON Web Token: JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA. Although JWTs can be encrypted to also provide secrecy between parties, we will focus on signed tokens. Signed tokens can verify the integrity of the claims contained within it, while encrypted tokens hide those claims from other parties. When tokens are signed using public/private key pairs, the signature also certifies that only the party holding the private key is the one that signed it. Utility of JWT: Authorization : This is the most common scenario for using JWT. Once the user is logged in, each subsequent request will include...