How emcee controls assistant access to Salesforce.

Admins publish a bounded assistant surface. Users get named access to one assistant at a time. If that sounds narrower than most AI tools, that is the point.

This page is intentionally plain. We would rather be specific than sound impressive.

Bounded surface. Named-user runtime. Brutal honesty about what exists today.

The short version

1

Connect one org

A customer admin authorizes a Salesforce org.

2

Publish one assistant

The assistant gets a defined data surface and tool set.

3

Assign named users

Assistant access is granted deliberately, not implied.

4

Bind and log runtime

Each session resolves to tenant, org, user, and assistant.

emcee does not expose raw, open-ended Salesforce access.

If a question falls outside the published assistant surface, there is no general-purpose path around that surface. Preview, release review, session binding, and audit logging are part of the product model, not extras layered on later.

Runtime access screen
Real product screenshot used as proof.
Runtime seat access screenshot

What exists today

Bounded data surface

The admin chooses what an assistant can read object by object and field by field.

Named-user seat assignment

Users receive assistant access explicitly instead of inheriting broad workspace access.

Assistant-specific runtime binding

Runtime context is tied to one tenant, one org, one user, and one assistant.

Structured audit events

Assistant invocations record runtime metadata with tool, timing, status, and outcome.

What is partial or still missing

Capability Status Current posture
Invocation log per user Partial Runtime events exist. The polished customer-facing console does not yet.
Record / field provenance Partial Tool and action shape are captured today. Full customer-facing provenance is not.
Compliance export Not yet Planned for GA rather than rushed into early access.

Brutal honesty

  • No SOC 2, ISO 27001, or HIPAA certification today.
  • No formal third-party penetration test report today.
  • No public bug bounty programme.
  • Not on the Salesforce AppExchange and not through Salesforce Security Review today.
  • Runtime is hosted in europe-west1 today.
  • No customer-selectable regional processing controls today.

If you are reviewing emcee, ask the blunt questions.

We would rather answer a direct security or architecture question than hide behind a demo flow. If the current posture is too early for your process, say so. That is useful information.

Contact

Tell us what part of the review you are in: architecture, procurement, questionnaire, or data processing.