Security / Admins / Releases

June 2026 Security Requirements: What to Expect and How to Prepare

By Tom Bassett

From June 2026, Salesforce will introduce a new wave of security controls designed to strengthen protection in response to the growing number of attacks targeting Salesforce environments and their customers.

Failure to prepare in advance could negatively impact your users. To minimize disruption and stay ahead, it’s important to take action early and ensure your organization is ready.

Disclaimer

This guide is intended to help Salesforce Administrators comply with the upcoming security requirements. As part of its preparation, certain assumptions have been made regarding how Salesforce will enforce these changes. The guide will be updated as further information becomes available.

All steps outlined assume standard use of the relevant features. If your organization has implemented customizations in these areas, additional preparation may be required.

Require Multi-Factor Authentication (MFA)

What Does This Impact?

From June 2026, Salesforce will require Multi-Factor Authentication (MFA) across both Sandbox and Production environments. This applies to all internal users, including those with a Salesforce or Salesforce Platform licence.

While MFA is already a requirement for Production orgs, it is not currently enforced at a technical level. However, failure to implement MFA constitutes a breach of contractual obligations, and administrators may receive notifications reminding them of this requirement.

For users logging in via Single Sign-On (SSO), if the SSO provider does not enforce a sufficiently strong authentication method (for example, biometric verification or a physical security key), additional MFA may be required.

At present, it is unclear whether the new requirement will be enforced in the same way.

This change will impact all internal users accessing both Sandbox and Production environments, so it is important to ensure MFA is fully implemented ahead of the deadline.

READ MORE: How to Prepare for Salesforce’s Mandatory MFA Changes in 2026

How Can I Prepare in a Sandbox?

In order to get ahead of this requirement, you can enable MFA in your Sandbox environments ahead of time. This will also give users time to enrol in methods ahead of the enforcement date.

To enable this, navigate to [MYDOMAIN]/lightning/setup/IdentityVerification/home

(eg. resourceful-otter-64nvnn-dev-ed.trailblaze.my.salesforce.com/lightning/setup/IdentityVerification/home).

From this page, enable “Require multi-factor authentication (MFA) for all direct UI logins to your Salesforce org” to ensure MFA for all human logins to that environment.

For the best user experience, also enable Show all verification method registration options instead of starting with built-in authenticators, so that users see a list of all available methods rather than the system defaulting to built-in authenticators. 

MFA Enrolment Screen in Salesforce which defaults to all methods
MFA Enrolment Screen in Salesforce

To monitor which users are enrolled for MFA, you can install the Multi-Factor Authentication Dashboard from Salesforce Labs for Admins Only via the below URL:

[MYDOMAIN]/packagingSetupUI/ipLanding.app?apvId=04to00000004DTQAA2

(eg. resourceful-otter-64nvnn-dev-ed.trailblaze.my.salesforce.com/packagingSetupUI/ipLanding.app?apvId=04to00000004DTQAA2).

While this package provides a good baseline, you will likely need to customize these reports. These reports will show who is enabled for MFA, not who isn’t. 

How Can I Prepare in Production?

MFA is likely already enforced in your Production environment. If not, you can follow the same steps to enforce this and work with your users to enrol a method.

READ MORE: Enabling Salesforce MFA: Top 5 Methods for Salesforce Admins

Ensure All System Administrator Users Adopt Phishing-Resistant MFA for Login

What Does This Impact?

This update is currently expected to impact users assigned the System Administrator profile, although Salesforce has not yet formally confirmed this in the enforcement notice.

System Administrators will be required to enrol in a phishing-resistant MFA method in order to comply with the new requirement.

Supported methods include:

  • Built-in authenticators (e.g. Windows Hello or Touch ID).
  • Physical security keys (e.g. YubiKey).

Salesforce has not yet confirmed whether this requirement will be enforced technically or managed contractually, as is currently the case with MFA in Production orgs.

System admins will need access to a device that supports one of these authentication methods, or organizations may need to procure physical security keys.

Source: Salesforce
READ MORE: Fast and Secure MFA: Unlock Salesforce With a Physical Key

How Can I Prepare in a Sandbox?

Built-in authenticators and Physical Security Devices are not enabled by default as MFA methods. 

In order to enable these methods ahead of time, navigate to [MYDOMAIN]/lightning/setup/IdentityVerification/home

(e.g. resourceful-otter-64nvnn-dev-ed.trailblaze.my.salesforce.com/lightning/setup/IdentityVerification/home).

From this page, enable Let users verify their identity with a built-in authenticator such as Touch ID or Windows Hello, and Let users verify their identity with a physical security key (U2F or WebAuthn).

Built-In Authenticator Connection

Enabling the feature doesn’t ensure compliance, as users still need to enrol in a supported method. You can monitor enforcement by using the Multi-Factor Authentication Dashboard from Salesforce Labs, which is mentioned above.

How Can I Prepare in Production?

To enable this in a Production environment, enable the same settings as in your Sandboxes. Enabling these methods is expected to have no user impact aside from allowing users to enrol in these methods going forward.

You can monitor compliance using the Multi-Factor Authentication Dashboard from Salesforce Labs.  

Restrict Login IP Addresses in Profiles

What Does This Impact?

Based on the current information available, this change will only impact you if any of your profiles have Login IP Ranges configured.

At present, Salesforce evaluates Login IP Ranges at the point of user login. If the user’s IP address falls within the permitted range, access is granted. If not, access is denied.

System Admin Profile Login IP Ranges

However, if a user’s IP address changes during an active session, Salesforce does not currently re-evaluate whether the session remains within the allowed ranges. Going forward, Salesforce will introduce the ability to enforce this check during an active session when a specific setting is enabled.

At this stage, it is unclear whether Salesforce will enable this setting by default across all orgs, or whether System Administrators will need to manually enable it within their environments.

READ MORE: Securing Your Org Through Salesforce IP Ranges: Your Complete Guide

How Can I Prepare in a Sandbox?

Within Salesforce Setup, under Session Settings, you’ll find Enforce login IP ranges on every request.

Enforce login IP ranges on every request setting which is enabled

To enable this ahead of enforcement, simply select this option and click Save at the bottom of the page.

Once enabled, you can test the behavior by simulating a user whose profile has Login IP Ranges and changing their IP address during an active session. This will confirm that access is handled as expected (or not). For the sake of completeness, you can test this against a range of users and SSO (if in use) to ensure existing processes remain unimpacted. 

How Can I Prepare in Production?

Once you have tested this in your sandboxes, complete the same steps to enable this in Production.

Enable a Transaction Security Policy (TSP) That Restricts Large Data Exports

What Does This Impact?

If you are using Salesforce Shield or Event Monitoring, this update applies to you. If not, this update is expected to have no impact.

A Transaction Security Policy (TSP) will be introduced when a user exports a report if you do not have one set up already. This means Users will be prompted for their MFA method before they can export data from reports going forward.

Custom Transaction Security Policy on Report Event, this shows action as Report Export, Entities as Account and Rows Processed as greater than 200
Custom Transaction Security Policy on Report Event
READ MORE: How to Use Salesforce Event Monitoring to Detect Suspicious Activity

How Can I Prepare in Sandbox and Production Environments?

You can either set up your own TSP if you do not have this already, or you can simply wait for Salesforce to auto-add this for you.

The current notice from Salesforce does not state whether this will be added to Sandboxes, Production orgs, or both.

Avoid Connecting from Anonymizing Proxies and High-Risk IP Addresses

What Does This Impact?

Salesforce already monitors and blocks high-risk connections such as those from anonymizing VPNs or other high-risk IP Addresses. 

How Can I Prepare in a Sandbox and Production?

Salesforce will continue to monitor and block these connections, although they do not state whether this applies to both Sandbox and Production environments.

Summary

Against a threat landscape that is constantly evolving and an increase in successful attacks against Salesforce, I doubt this will be the last of fast-tracked security updates that Salesforce pushes out over the next few months.

As more information about these updates becomes available, we will publish updates so you can prepare ahead of the current June enforcement date from Salesforce.

Other Resources

The Author

Tom Bassett

Tom is a Senior Solution Architect at Vera Solutions helping Nonprofits with Impact and Grant Management. He empowers others as an expert author, community leader, speaker, and podcast host.

Leave a Reply