| What is it? | Salesforce is rolling out mandatory security changes across email verification, MFA enforcement, phishing-resistant authentication, IP restrictions, and data export controls — with deadlines starting now through June 2026. |
| Key Deadlines | Email domain verification: April 6–17 (production). MFA + phishing-resistant MFA + IP restrictions + Transaction Security Policies: June 2026. |
| What Happens If You Don't Act | Unverified domains = silently dropped emails. Missing MFA = login failures. No IP restrictions = blocked access. No TSP = auto-enabled policies you didn't configure. |
| Who's Affected | Every Salesforce customer. Period. |
| Bottom Line | Five simultaneous security mandates with real consequences. Prepare now or scramble later. |
Starting with Spring '26, Salesforce is converting security recommendations into enforced requirements with hard deadlines. AI-powered phishing has made credential theft cheaper and more scalable. As one Salesforce security team member noted: "This is the first time Salesforce has enforced a change outside of its regular release schedule."
Every domain used to send outbound email must be verified. Unverified domains = silently dropped emails — no bounce, no error for automations. Just silence.
Affected: Email Composer, Apex email, Flow-triggered emails, Workflow alerts, Process automations
Not affected: Marketing Cloud, Einstein Activity Capture, Inbox, free consumer domains (gmail.com, outlook.com)
| Date | What Happens |
|---|---|
| March 9, 2026 | Verification required for all new orgs and new sending domains |
| March 24–April 3 | Domain verification enforced in all sandboxes |
| April 6–17, 2026 | Domain verification enforced in all production orgs |
| April 27–May 15 | Temporary allowlisted domains must be fully verified in production |
550 5.7.1 Delivery not authorized, message discardedyourcompany-sf-a) and alternate selectorexample.com does NOT cover mail.example.com. Each domain and subdomain needs its own key.Salesforce will technically enforce MFA for all employee license users. New: sensitive post-login actions will trigger step-up authentication — additional verification even after login.
Standard MFA isn't enough for admin accounts. Salesforce requires phishing-resistant MFA:
Organizations must restrict login IP addresses on profiles. Users from unauthorized IPs are denied access.
For Shield/Event Monitoring customers: A TSP on ReportEvent is required that triggers step-up authentication for report downloads.
| Change | Impact | Action |
|---|---|---|
| Connected Apps → External Client Apps | New Connected Apps creation disabled | Inventory and plan migration to External Client Apps |
| Triple DES Retirement in SAML | Legacy encryption causes auth failures | Update to SHA-256/AES in all SAML configurations |
| Accelerated Certificate Rotation | Shorter cert lifecycles increase rotation frequency | Implement automated cert tracking and alerting |
| My Trust Center (Beta) | Real-time org security visibility | Assign ownership, integrate with incident response |
| Experience Cloud File Scanning | Virus/malware scanning on uploads/downloads | Test high-volume file workflows for performance |
550 5.7.1 errorsVantage Point helps with security audits, DKIM configuration, MFA deployment, IP architecture, TSP design, and integration security reviews — all from senior consultants who've guided 150+ clients through Salesforce security transitions.
Five mandatory changes: email domain verification (April 2026), MFA for all users (June 2026), phishing-resistant MFA for admins (June 2026), login IP restrictions (June 2026), and Transaction Security Policies for data exports (June 2026, Shield/Event Monitoring customers).
Emails from unverified domains are silently dropped — no bounce notification for automations. Manual sends show a blocking error, but Flow and Apex emails fail without any notification. Check logs for 550 5.7.1 Delivery not authorized.
Cryptographic verification methods that can't be intercepted: built-in authenticators (TouchID, FaceID, Windows Hello), hardware security keys (YubiKey), and FIDO2/WebAuthn. Standard TOTP apps and push notifications don't qualify.
Yes. MFA must be enforced at the SSO provider level. Since February 2026, Salesforce also requires Device Activation for SSO logins — a separate step confirming the device is authorized.
Yes — for Shield/Event Monitoring customers only. If you don't create a qualifying TSP by June 2026, Salesforce adds a default one that may not match your operational needs. Better to configure your own.
By default, IP checks only apply at login. Enable "Enforce login IP ranges on every request" for continuous validation. Remote workers may need VPN access to connect from approved IP ranges.
Start with email domain verification — those deadlines are most imminent (April 6–17 for production). Set up DKIM keys, then begin MFA gap analysis and admin account inventory for phishing-resistant MFA deployment.