Create a resource set
Before you begin
Ensure that you’re signed in as a super admin.
Start this task
In the Admin Console, go to Security > Administrators.
Go to the Resources tab. The Resources tab displays a list of previously created resource sets and their descriptions. You can also edit the resource set from this page.
Click Create new resource set. The Create new resource set page opens.
In the Resource set name field, enter the name of the resource set. Choose a name that’s self-explanatory about the resources it includes.
Optional. In the Resource set description field, enter a short description of the resource set.
In the Add Resources section, enter the following values:
Add users from the following groups
Enter group names to add all users from those groups.
Select the Constrain to all check box if you want the resource to be constrained to all users in the organization.
Remember, when you constrain these resources to a role, the user permissions of the role will impact the resources and the admin can manage the users within the groups selected here. See About role permissions.
Enter group names to constrain the resource to admins.
Select the Constrain to all check box if you want the resource to be constrained to all groups in the organization.
When used in an admin assignment that has group permissions in the role, this constrains what groups the delegated admin has group permissions on. See About role permissions.
Enter application names to constrain the resource to admins.
You can add apps and app instances as a resource. The resource will apply to all application and profile source permissions. See Best practices for creating a custom role assignment.
Select the Constrain to all check box if you want the resource to be constrained to all applications in the organization.
You can select the app type (such as all Salesforce apps) or specific app instances.
Add authorization servers Enter authorization names to constrain the resource to admins.
Select the Constrain to all check box if you want the resource to be constrained to all authorization servers in the organization.
Admins can only create new authorization servers if their role is scoped to all authorization servers.
Click Save resource set. You can see the resource set you just created on the Resources tab.
You can use Okta-sourced, AD-sourced, and LDAP-sourced groups as resources. However, the following permissions aren't applicable to AD-sourced and LDAP-sourced groups:
Manage users' authenticator operations
Edit users' profile attributes
Manage group membership