Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Identity-and-Access-Management-Architect PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

Identity-and-Access-Management-Architect PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 243
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

Identity-and-Access-Management-Architect Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

Identity-and-Access-Management-Architect Practice Exam Questions with Answers Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Certification

Question # 6

Northern Trail Outfitters (NTO) wants its customers to use phone numbers to log into their new digital portal, which was designed and built using Salesforce Experience Cloud. In order to access the portal, the user will need to do the following:

1. Enter a phone number and/or email address

2. Enter a verification code that is to be sent via email or text.

What is the recommended approach to fulfill this requirement?

A.

Create a Login Discovery page and provide a Login Discovery Handler Apex class.

B.

Create a custom login page with an Apex controller. The controller has logic to send and verify the identity.

C.

Create an authentication provider and implement a self-registration handler class.

D.

Create a custom login flow that uses an Apex controller to verify the phone numbers with the company's verification service.

Full Access
Question # 7

Universal Containers (UC) has a Desktop application to collect leads for marketing campaigns. UC wants to extend this application to integrate with Salesforce to create leads. Integration between thedesktop application and salesforce should be seamless. What Authorization flow should the Architect recommend?

A.

JWT Bearer Token flow

B.

Web Server Authentication Flow

C.

User Agent Flow

D.

Username and Password Flow

Full Access
Question # 8

A leadingfitness tracker company is getting ready to launch a customer community. The company wants its customers to login to the community and connect their fitness device to their profile. Customers should be able to obtain exercise details and fitness recommendation in the community.

Which should be used to satisfy this requirement?

A.

Named Credentials

B.

Login Flows

C.

OAuth Device Flow

D.

Single Sign-On Settings

Full Access
Question # 9

A Salesforce customer is implementing Sales Cloud and a custom pricing application for its call center agents. An Enterprise single sign-on solution is used to authenticate and sign-in users to all applications. The customer has the following requirements:

1. The development team has decided touse a Canvas app to expose the pricing application to agents.

2. Agents should be able to access the Canvas app without needing to log in to the pricing application.

Which two options should the identity architect consider to provide support for the Canvas app to initiate login for users?

Choose 2 answers

A.

Select "Enable as a Canvas Personal App" in the connected app settings.

B.

Enable OAuth settings in the connected app with required OAuth scopes for the pricing application.

C.

Configure the Canvas app as a connected app and set Admin-approved users as pre-authorized.

D.

Enable SAML in the connected app and Security Assertion Markup Language (SAML) Initiation Method as Service Provider Initiated.

Full Access
Question # 10

Universal containers (UC) uses an internal company portal for their employees to collaborate. UC decides to use salesforce ideas and provide the ability for employees to post ideas from the company portal. They use SAML-BASED SSO to get into the company portal and would like to leverage it to access salesforce. Most of the users don't exist in salesforce and they would like the user records created in salesforce communities the first time they try to access salesforce. What recommendation should an architect make to meet this requirement?

A.

Use on-the-fly provisioning

B.

Use just-in-time provisioning

C.

Use salesforce APIs to create users on the fly

D.

Use Identity connect to sync users

Full Access
Question # 11

A consumer products company uses Salesforce to maintain consumer information, including orders. The company implemented a portal solution using SalesforceExperience Cloud for its consumers where the consumers can log in using their credentials. The company is considering allowing users to login with their Facebook or Linkedln credentials.

Once enabled, what role will Salesforce play?

A.

Facebook and Linkedln will be the SPs.

B.

Salesforce will be the service provider (SP).

C.

Salesforce will be the identity provider (IdP).

D.

Facebook and Linkedln will act as the IdPs and SPs.

Full Access
Question # 12

Universal containers (UC) has implemented SAML -based single Sign-on for their salesforce application. UC is using PingFederate as the Identity provider. To access salesforce, Users usually navigate to a bookmarked link to my domain URL. What type of single Sign-on is this?

A.

Sp-Initiated

B.

IDP-initiated with deep linking

C.

IDP-initiated

D.

Web server flow.

Full Access
Question # 13

Universal containers (UC) wants to implement a partner community. As part of their implementation, UC would like to modify both the Forgot password and change password experience with custom branding for their partner community users. Which 2 actions should an architect recommend to UC? Choose 2 answers

A.

Build a community builder page for the change password experience and Custom Visualforce page for the Forgot password experience.

B.

Build acustom visualforce page for both the change password and Forgot password experiences.

C.

Build a custom visualforce page for the change password experience and a community builder page for the Forgot password experience.

D.

Build a community builder page for both the change password and Forgot password experiences.

Full Access
Question # 14

What is oneof the roles of an Identity Provider in a Single Sign-on setup using SAML?

A.

Validate token

B.

Create token

C.

Consume token

D.

Revoke token

Full Access
Question # 15

Universal containers (UC) is setting up their customer Community self-registration process. They are uncomfortable with the idea of assigning new users to a default account record. What will happen when customers self-register in the community?

A.

The self-registration process will produce an error to the user.

B.

The self-registration page will ask user to select an account.

C.

The self-registration process will create a person Account record.

D.

The self-registration page will create a new account record.

Full Access
Question # 16

Northern Trail Outfitters (NTO) has a number of employees who do NOT need access Salesforce objects. Trie employees should sign in to a custom Benefits web app using their Salesforce credentials.

Which license should the identity architect recommend tofulfill this requirement?

A.

Identity Only License

B.

External Identity License

C.

Identity Verification Credits Add-on License

D.

Identity Connect License

Full Access
Question # 17

Universal containers uses an Employee portal for their employees to collaborate. employees access the portal from their company's internal website via SSO. It is set up to work with Active Directory. What is the role of Active Directory in this scenario?

A.

Identity store

B.

Authentication store

C.

Identity provider

D.

Service provider

Full Access
Question # 18

Universal Containers (UC) is building a customer community and will allow customers to authenticate using Facebook credentials. The First time the user authenticating using Facebook, UC would like acustomer account created automatically in their accounting system. The accounting system has a web service accessible to Salesforce for the creation of accounts. How can the Architect meet these requirements?

A.

Create a custom application on Heroku that manages the sign-on process from Facebook.

B.

Use JIT Provisioning to automatically create the account in the accounting system.

C.

Add an Apex callout in the registration handler of the authorization provider.

D.

Use OAuth JWT flow to pass the data fromSalesforce to the Accounting System.

Full Access
Question # 19

Universal Containers (UC) has a Customer Community that uses Facebook for of authentication. UC would like to ensure that changes in the Facebook profile are 65. reflected on the appropriate Customer Community user. How can this requirement be met?

A.

Use SAML Just-In-Time Provisioning between Facebook and Salesforce.

B.

Use information in the Signed Request that is received from Facebook.

C.

Develop a scheduled job that calls out to Facebook on a nightly basis.

D.

Use the update User () method on the Registration Handler class.

Full Access
Question # 20

A company with 15,000 employees is using Salesforce and would like to take the necessary steps to highlight or curb fraudulent activity.

Which tool should be used to track login data, such as the average number of logins, who logged in more than the average number of times and who logged in during non-business hours?

A.

Login Forensics

B.

Login Report

C.

Login Inspector

D.

Login History

Full Access
Question # 21

Universal Containers (UC) implemented SSO to a third-party system for their Salesforce users to access the App Launcher. UC enabled “User Provisioning” on the Connected App so that changes to user accounts can be synched between Salesforce and the third-party system. However, UC quickly notices that changes to user roles in Salesforce are not getting synched to the third-party system. What is the most likely reason for this behavior?

A.

User Provisioning for Connected Apps does not support role sync.

B.

B. Required operation(s) was not mapped in User Provisioning Settings.

C.

The Approval queue for User Provisioning Requests is unmonitored.

D.

Salesforce roles have more than three levels in the role hierarchy.

Full Access
Question # 22

Universal Containers (UC) is both a Salesforce and Google Apps customer. The UC IT team would like to manage the users for both systems in a single place to reduce administrative burden. Which two optimal ways can the IT team provision users and allow Single Sign-on between Salesforce and Google Apps ? Choose 2 answers

A.

Build a custom app running on Heroku as the Identity Provider that can sync user information between Salesforce and Google Apps.

B.

Use a third-party product as the Identity Provider for both Salesforce and Google Apps and manage the provisioning from there.

C.

Use Identity Connect as the Identity Provider for both Salesforce and Google Apps and manage the provisioning from there.

D.

UseSalesforce as the Identity Provider and Google Apps as a Service Provider and configure User Provisioning for Connected Apps.

Full Access
Question # 23

Which three are capabilities of SAML-based Federated authentication? Choose 3 answers

A.

Trust relationships between Identity Provider and Service Provider are required.

B.

SAML tokens can be in XML or JSON format and can be used interchangeably.

C.

Web applications with no passwords are more secure and stronger against attacks.

D.

Access tokens areused to access resources on the server once the user is authenticated.

E.

Centralized federation provides single point of access, control and auditing.

Full Access
Question # 24

IT security at Unversal Containers (UC) us concerned about recent phishing scams targeting its users and wants to add additional layers of login protection. What should an Architect recommend to address the issue?

A.

Use the Salesforce Authenticator mobile app with two-step verification

B.

Lock sessions to the IP address from which they originated.

C.

Increase Password complexity requirements in Salesforce.

D.

Implement Single Sign-on using a corporateIdentity store.

Full Access
Question # 25

An administrator created a connected app for a custom wet) application in Salesforce which needs to be visible as a tile in App Launcher The tile for the custom web application is missing in the app launcher for all users in Salesforce. The administrator requested assistance from an identity architect to resolve the issue.

Which two reasons are the source of the issue?

Choose 2 answers

A.

StartURL for the connected app is not set in Connected App settings.

B.

OAuth scope does not include "openid*.

C.

Session Policy is set as 'High Assurance Session required' for this connected app.

D.

The connected app is not set in the App menu as 'Visible in App Launcher".

Full Access
Question # 26

Universal containers (UC) have a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured as a connected App in salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properlysecure access to the app. Which two are recommendations to make the UC? Choose 2 answers

A.

Disallow the use of single Sign-on for any users of the mobile app.

B.

Require high assurance sessions in order to use the connected App

C.

Use Google Authenticator as an additional part of the logical processes.

D.

Set login IP ranges to the internal network for all of the app users profiles.

Full Access
Question # 27

Universal Containers (UC) would like to enable self-registration for their Salesforce Partner Community Users. UC wants to capture some custom data elements from the partner user, and based on these data elements, wants to assign the appropriate Profile and Account values.

Which two actions should the Architect recommend to UC1

Choose 2 answers

A.

Configure Registration for Communities to use a custom Visualforce Page.

B.

Modify the SelfRegistration trigger to assign Profile and Account.

C.

Modify the CommunitiesSelfRegController to assign the Profile and Account.

D.

Configure Registration for Communitiesto use a custom Apex Controller.

Full Access
Question # 28

Universal Containers allows employees to use a mobile device to access Salesforce for daily operations using a hybrid mobile app. This app uses Mobile software development kits (SDK), leverages refresh token to regenerate access token when required and is distributed as a private app.

The chief security officer is rolling out an org wide compliance policy to enforcere-verification of devices if an employee has not logged in from that device in the last week.

Which connected app setting should be leveraged to comply with this policy change?

A.

Scope - Deny refresh_token scope for this connected app.

B.

Refresh Token Policy - Expire the refresh token if it has not been used for 7 days.

C.

Session Policy - Set timeout value of the connected app to 7 days.

D.

Permitted User - Ask admins to maintain a list of users who are permitted based on last login date.

Full Access
Question # 29

Universal Containers (UC) wants to implement SAML SSO for their internal of Salesforce users using a third-party IdP. After some evaluation, UC decides NOT to 65« set up My Domain fortheir Salesforce org. How does that decision impact their SSO implementation?

A.

IdP-initiated SSO will NOT work.

B.

Neither SP- nor IdP-initiated SSO will work.

C.

Either SP- or IdP-initiated SSO will work.

D.

SP-initiated SSO will NOT work

Full Access
Question # 30

A financial services company uses Salesforce and has a compliance requirement to track information about devices from whichusers log in. Also, a Salesforce Security Administrator needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

A.

Use multi-factor authentication (MFA) to meet the compliance requirement totrack device information.

B.

Use the Activations feature to meet the compliance requirement to track device information.

C.

Use the Login History object to track information about devices from which users log in.

D.

Use Login Flows to capture device fromwhich users log in and store device and user information in a custom object.

Full Access
Question # 31

An Identity and Access Management (IAM) Architect is recommending Identity Connect to integrate Microsoft Active Directory (AD) with Salesforce for user provisioning, deprovisioning and single sign-on (SSO).

Which feature of Identity Connect is applicable for this scenario?

A.

When Identity Connect is in place, if a user is deprovisioned in an on-premise AD, the user's Salesforce session Is revoked Immediately.

B.

If the number of provisioned users exceeds Salesforce license allowances, identity Connect will start disabling the existingSalesforce users in First-in, First-out (FIFO) fashion.

C.

Identity Connect can be deployed as amanaged package on salesforce org, leveraging High Availability of Salesforce Platform out-of-the-box.

D.

When configured, Identity Connect acts as an identity provider to both Active Directory and Salesforce, thus providing SSO as a default feature.

Full Access
Question # 32

An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to authenticate to Salesforce and then make API calls against the REST API.

One of the requirements is that the solution needs to ensure the third party service providers connected app in Salesforce mini need for end user interaction and maximizes security.

Which OAuth flow should be used to fulfill the requirement?

A.

JWT Bearer Flow

B.

Web Server Flow

C.

User Agent Flow

D.

Username-Password Flow

Full Access
Question # 33

When designing a multi-branded Customer Identity and Access Management solution on the Salesforce Platform, how should an identity architect ensure a specific brand experience in Salesforce is presented?

A.

The Experience ID, which can be included in OAuth/Open ID flows and Security Assertion Markup Language (SAML) flows as a URL parameter.

B.

Provide a brand picker that the end user can use to select its sub-brand when they arrive on salesforce.

C.

Add a custom parameter to the service provider's OAuth/SAML call and implement logic on its login page to apply branding based on the parameters value.

D.

The Audience ID, which can be set in a shared cookie.

Full Access
Question # 34

Universal containers (UC) does my domain enable in the context of a SAML SSO configuration? Choose 2 answers

A.

Resource deep linking

B.

App launcher

C.

SSO from salesforce1 mobile app.

D.

Login forensics

Full Access
Question # 35

A large consumer company is planning to create a community and will requ.re login through the customers social identity. The following requirements must be met:

1. The customer should be able to login with any of their social identities, however salesforce should only haveone user per customer.

2. Once the customer has been identified with a social identity, they should not be required to authonze Salesforce.

3. The customers personal details from the social sign on need to be captured when the customer logs intoSalesforce using their social Identity.

3. If the customer modifies their personal details in the social site, the changes should be updated in Salesforce .

Which two options allow the Identity Architect to fulfill the requirements?

Choose 2 answers

A.

UseLogin Flows to call an authentication registration handler to provision the user before logging the user into the community.

B.

Use authentication providers for social sign-on and use the custom registration handler to insert or update personal details.

C.

C. Redirect the user to a custom page that allows the user to select an existing social identity for login.

D.

Use the custom registration handler to link social identities to Salesforce identities.

Full Access
Question # 36

Universal Containers is budding a web application that will connect with the Salesforce API using JWT OAuth Flow.

Which two settings need to be configured in the connect app to support this requirement?

Choose 2 answers

A.

The Use Digital Signature option in the connected app.

B.

The "web" OAuth scope in theconnected app,

C.

The "api" OAuth scope in the connected app.

D.

The "edair_api" OAuth scope m the connected app.

Full Access
Question # 37

architect is troubleshooting some SAML-based SSO errors during testing. The Architect confirmed that all of the Salesforce SSO settings are correct. Which two issues outside of the Salesforce SSO settings are most likely contributing to the SSO errors the Architect is encountering? Choose 2 Answers

A.

The Identity Provider is also used to SSO into five other applications.

B.

The clock on the Identity Provider server is twenty minutes behind Salesforce.

C.

The Issuer Certificate from the Identity Provider expired two weeks ago.

D.

The default language for the Identity Provider and Salesforce are Different.

Full Access
Question # 38

Universal Containers want users to be able to log in to the Salesforce mobile app with their Active Directory password. Employees are unable to use mobile VPN.

Which two options should an identity architect recommend to meet therequirement?

Choose 2 answers

A.

Active Directory Password Sync Plugin

B.

Configure Cloud Provider Load Balancer

C.

Salesforce Trigger & Field on Contact Object

D.

Salesforce Identity Connect

Full Access
Question # 39

Universal Containers (UC) is planning to deploy a custom mobile app that will allow users to get e-signatures from its customers on their mobile devices. The mobile app connects to Salesforce to upload the e-signature as a file attachment and uses OAuth protocol for both authentication and authorization. What is the most recommended and secure OAuth scope setting that an Architect should recommend?

A.

Id

B.

Web

C.

Api

D.

Custom_permissions

Full Access
Question # 40

A client is planning to rollout multi-factor authentication (MFA) to its internal employees and wants tounderstand which authentication and verification methods meet the Salesforce criteria for secure authentication.

Which three functions meet the Salesforce criteria for secure mfa?

Choose 3 answers

A.

username and password + SMS passcode

B.

Username and password + secunty key

C.

Third-party single sign-on with Mobile Authenticator app

D.

Certificate-based Authentication

E.

Lightning Login

Full Access
Question # 41

Universal Containers (UC) is looking to purchase a third-party applicationas an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose2 answers

A.

The Identity Provider can authenticate multiple applications.

B.

The Identity Provider can authenticate multiple social media accounts.

C.

The Identity provider can store credentials for multiple applications.

D.

The Identity Provider can centralize enterprise password policy.

Full Access
Question # 42

Universal Containers wants to secure its Salesforce APIs by using an existing Security Assertion Markup Language (SAML) configuration supports the company's single sign-on process to Salesforce,

Which Salesforce OAuth authorization flow should be used?

A.

OAuth 2.0 SAML Bearer AssertionFlow

B.

A SAML Assertion Row

C.

OAuth 2.0 User-Agent Flow

D.

OAuth 2.0 JWT Bearer Flow

Full Access
Question # 43

A technology enterprise is planning to implement single sign-on login for users. When users log in to the Salesforce User object custom field, data should be populated fornew and existing users.

Which two steps should an identity architect recommend?

Choose 2 answers

A.

Implement Auth.SamlJitHandler Interface.

B.

Create and update methods.

C.

Implement RegistrationHandler Interface.

D.

Implement SesslonManagement Class.

Full Access
Question # 44

Northern Trail Outfitters (NTO) is launching a new sportswear brand on its existing consumer portal built on Salesforce Experience Cloud. As part of the launch, emails with promotional links will be sent to existing customers to log in and claim a discount. The marketing manager would like the portal dynamically branded so that users will be directed to the brand link they clicked on; otherwise, users will view a recognizable NTO-branded page.

The campaign is launching quickly, so there is no time to procure any additional licenses. However, the development team is available to apply any required changes to the portal.

Which approach should the identity architect recommend?

A.

Create a full sandbox to replicate the portal site and update the branding accordingly.

B.

Implement Experience ID in the code and extend the URLs and endpoints, as required.

C.

Use Heroku to build the new brand site and embedded login to reuse identities.

D.

Configure an additional community site on the same org that is dedicated for the new brand.

Full Access
Question # 45

Universal containers (UC) has implemented a multi-org strategy and would like to centralize the management of their salesforce user profiles. What should the architect recommend to allow salesforce profiles to be managed from a central system of record?

A.

Implement jit provisioning on the SAML IDP that will pass the profile id in each assertion.

B.

Create an apex scheduled job in one org that will synchronize the other orgsprofile.

C.

Implement Delegated Authentication that will update the user profiles as necessary.

D.

Implement an Oauthjwt flow to pass the profile credentials between systems.

Full Access
Question # 46

Universal Containers (UC) has an Experience Cloud site (Customer Community) where customers can authenticate andplace orders, view the status of orders, etc. UC allows guest checkout.

Mow can a guest register using data previously collected during order placement?

A.

Enable Security Assertion Markup Language Sign-On and use a login flow to collect only order detailsto retrieve customer data.

B.

Enable Facebook as an authentication provider and use a registration handler to collect only order details to retrieve customer data.

C.

Use a Connected App Handler Apex Plugin class to collect only order details to retrievecustomer data.

D.

Enable self-registration and customize a self-registration page to collect only order details to retrieve customer data.

Full Access
Question # 47

Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wants to allow customers to login using Facebook, Google, and other social sign-on providers.

How should this functionality be enabled for UC, assuming ail social sign-on providers support OpenID Connect?

A.

Configure an authentication provider and a registration handler for each social sign-on provider.

B.

Configure a single sign-on settingand a registration handler for each social sign-on provider.

C.

Configure an authentication provider and a Just-In-Time (JIT) handler for each social sign-on provider.

D.

Configure a single sign-on setting and a JIT handler for each social sign-on provider.

Full Access
Question # 48

UESTION NO: 154

Universal Containers (UC) wants to provide single sign-on (SSO) for a business-to-consumer (B2C) application using Salesforce Identity.

Which Salesforce license should UC utilize to implement this use case?

A.

Identity Only

B.

Salesforce Platform

C.

External Identity

D.

Partner Community

Full Access
Question # 49

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

A.

Client ID

B.

Refresh Token

C.

Authorization Code

D.

Verification Code

E.

Scopes

Full Access
Question # 50

Universal Containers (UC) currently uses Salesforce Sales Cloud and an external billing application. Both Salesforce andthe billing application are accessed several times a day to manage customers. UC would like to configure single sign-on and leverageSalesforce as the identity provider. Additionally, UC would like the billing application to be accessible from Salesforce.A redirect is acceptable.

Which two Salesforce tools should an identity architect recommend to satisfy the requirements?

Choose 2 answers

A.

salesforce Canvas

B.

Identity Connect

C.

Connected Apps

D.

App Launcher

Full Access
Question # 51

Universal Containers (UC) is considering a Customer 360 initiative to gain a single source of the truth for its customer data across disparate systems and services. UC wants to understand the primary benefits of Customer 360 Identity and how it contributes ato successful Customer 360 Truth project.

What are two are key benefits of Customer 360 Identity as it relates to Customer 360?

Choose 2answers

A.

Customer 360 Identity automatically integrates with Customer 360 Data Manager and Customer 360 Audiences to seamlessly populate all user data.

B.

Customer 360 Identity enables an organization to build a single login for each ofits customers, giving the organization an understanding of the user's login activity across all its digital properties and applications.

C.

Customer 360 Identity supports multiple brands so you can deliver centralized identity services and correlation ofuser activity,even if it spans multiple corporate brands and user experiences.

D.

Customer 360 Identity not only provides a unified sign up and sign in experience, but also tracks anonymous user activity prior to signing up so organizations can understanduser activity before and after the users identify themselves.

Full Access
Question # 52

Universal Containers is creating a web application that will be secured by SalesforceIdentity using the OAuth 2.0 Web Server Flow uses the OAuth 2.0 authorization code grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

A.

Verification URL

B.

Client Secret

C.

Access Token

D.

Scopes

Full Access
Question # 53

The security team at Universal Containers (UC) has identified exporting reports as a high-riskaction and would like to require users to be logged into Salesforce with their Active Directory (AD) credentials when doing so. For all other users of Salesforce, users should be allowed to use AD Credentials or Salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with Salesforce credentials?

A.

Use SAML Federated Authentication and block access to reports when accessed through a Standard Assurance session.

B.

Use SAML Federated Authentication and Custom SAML JIT Provisioning to dynamically and or remove a permission set that grants the Export Reports Permission.

C.

Use SAML federated Authentication, treat SAML Sessionsas High Assurance, and raise the session level required for exporting reports.

D.

Use SAML federated Authentication with a Login Flow to dynamically add or remove a Permission Set that grants the Export Reports Permission.

Full Access
Question # 54

Northern Trail Outfitters (NTO) uses a Security Assertion Markup Language (SAML)-based Identity Provider (idP) to authenticate employees to all systems. The IdPauthenticates users against a Lightweight Directory Access Protocol (LDAP) directory and has access to user information. NTO wants to minimize Salesforce license usage since only a small percentage of users need Salesforce.

What is recommended to ensure new employees have immediate access to Salesforce using their current IdP?

A.

Install Salesforce Identity Connect to automatically provision new users in Salesforce the first time they attempt to login.

B.

Build an integration that queries LDAP periodically and creates new active users in Salesforce.

C.

Configure Just-in-Time provisioning using SAML attributes to create new Salesforce users as necessary when a new user attempts to login to Salesforce.

D.

Build an integration that queries LDAP and creates new inactive users in Salesforce and use a login flow to activate the user atfirst login.

Full Access
Question # 55

Containers (UC) uses an internal system for recruiting and would like to have thecandidates' info available in the Salesforce automatically when they are selected. UC decides to use OAuth to connect to Salesforce from the recruiting system and would like to do the authentication using digital certificates. Which two OAuth flows shouldbe considered to meet the requirement? Choose 2 answers

A.

JWT Bearer Token flow

B.

Refresh Token flow

C.

SAML Bearer Assertion flow

D.

Web Service flow

Full Access
Question # 56

A multinational industrial products manufacturer is planning to implement Salesforce CRMto manage their business. They have the following requirements:

1. They plan to implement Partner communities to provide access to their partner network .

2. They have operations in multiple countries and are planning to implement multiple Salesforce orgs.

3. Some of their partners do business in multiple countries and will need information from multiple Salesforce communities.

4. They would like to provide a single login for their partners.

How should an Identity Architect solution this requirement with limited custom development?

A.

Create a partner login for the country of their operation and use SAML federation to provide access to other orgs.

B.

Consolidate Partner related information in a single org and provide access through Salesforce community.

C.

Allow partners to choose the Salesforce org they need information from and use login flows to authenticate access.

D.

Register partners in one org and access information from other orgs using APIs.

Full Access
Question # 57

Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications. Salesforce users also use Oktato authorize a Forecasting web application to access Salesforce records on their behalf.

Which two roles are being performed by Salesforce?

Choose 2 answers

A.

SAML Identity Provider

B.

OAuth Client

C.

OAuth Resource Server

D.

SAML Service Provider

Full Access
Question # 58

A financial enterprise isplanning to set up a user authentication mechanism to login to the Salesforce system. Due to regulatory requirements, the CIO of the company wants user administration, including passwords and authentication requests, to be managed by an external system that is only accessible via a SOAP webservice.

Which authentication mechanism should an identity architect recommend to meet the requirements?

A.

OAuth Web-Server Flow

B.

Identity Connect

C.

Delegated Authentication

D.

Just-in-Time Provisioning

Full Access
Question # 59

Universal Containers (UC) is planning to add Wi-Fi enabled GPS tracking devices to its shipping containers so that the GPS coordinates data can be sent from the tracking device to its Salesforce production org via a custom API. The GPS devices have no direct user input or output capabilities.

Which OAuth flow should the identity architect recommend to meet the requirement?

A.

OAuth 2.0 Asset Token Flow for Securing Connected Devices

B.

OAuth 2.0 Username-Password Flow for Special Scenarios

C.

OAuth 2.0 WebServer Flow for Web App Integration

D.

OAuth 2.0 JWT Bearer Flow for Server-to-Server Integration

Full Access
Question # 60

Universal Containers (UC) has implemented a multi-org architecture in their company. Many users have licences across multiple orgs, and they are complaining about remembering which org and credentials are tied to which business process. Which two recommendations should the Architect make to address the Complaints? Choose 2 answers

A.

Activate My Domain to Brand each org to the specific business use case.

B.

Implement SP-Initiated Single Sign-on flows to allow deep linking.

C.

ImplementIdP-Initiated Single Sign-on flows to allow deep linking.

D.

Implement Delegated Authentication from each org to the LDAP provider.

Full Access
Question # 61

An identity architect's client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of ITis worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.

What should the identity architect recommend to make sure that there is additional trust between the SP and the IdP?

A.

Ensure that there is an HTTPS connection between IDP and SP.

B.

Ensure that on the SSO settings page, the "Request Signing Certificate" field has a self-signed certificate.

C.

Ensure that the Issuer and Assertion Consumer service (ACS) URL is propertyconfigured between SP and IDP.

D.

Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.

Full Access
Question # 62

A service provider (SP) supportsboth Security Assertion Markup Language (SAML) and OpenID Connect (OIDC).

When integrating this SP with Salesforce, which use case is the determining factor when choosing OIDC or SAML?

A.

OIDC is more secure than SAML and therefore is the obvious choice.

B.

B. The SP needs to perform API calls back to Salesforce on behalf of the user after the user logs in to the service provider.

C.

If the user has a session on Salesforce, you do not want them to be prompted for a username and password when they login to theSP.

D.

They are equivalent protocols and there is no real reason to choose one over the other.

Full Access
Question # 63

Universal containers (UC) has a classifiedinformation system that it's call centre team uses only when they are working on a case with a record type of "classified". They are only allowed to access the system when they own an open "classified" case, and their access to the system is removed at allother times. They would like to implement SAML SSO with salesforce as the IDP, and automatically allow or deny the staff's access to the classified information system based on whether they currently own an open "classified" case record when they try to access the system using SSO. What is the recommended solution for automatically allowing or denying access to the classified information system based on the open "classified" case record criteria?

A.

Use a custom connected App handler using apex to dynamically allow access to the system based on whether the staff owns any open "classified" cases.

B.

Use apex trigger on case to dynamically assign permission sets that grant access when a user is assigned with an open "classified" case, and remove it when the case is closed.

C.

Use custom SAML jit provisioning to dynamically query the user's open "classified" cases when attempting to access the classified information system

D.

Use salesforce reports to identify users that currently owns open "classified" cases and should be granted access to the classified information system.

Full Access
Question # 64

Universal Containers is implementing a new Experience Cloud site and the identity architect wants to use dynamic branding features as of the login process.

Which two options should the identity architect recommend to support dynamic branding for the site?

Choose 2 answers

A.

To use dynamic branding, the community must be built with the Visuaiforce + Salesforce Tabs template.

B.

To use dynamic branding, the community must be built with the Customer Account Portal template.

C.

An experience ID (expid) or placeholder parametermust be used in the URL to represent the brand.

D.

An external content management system (CMS) must be used for dynamic branding on Experience Cloud sites.

Full Access
Question # 65

Universal containers (UC) wants to implement Delegated Authentication for a certainsubset of Salesforce users. Which three items should UC take into consideration while building the Web service to handle the Delegated Authentication request? Choose 3 answers

A.

The web service needs to include Source IP as a method parameter.

B.

UC should whitelist all salesforce ip ranges on their corporate firewall.

C.

The web service can be written using either the soap or rest protocol.

D.

Delegated Authentication is enabled for the system administrator profile.

E.

The return type of the Web service method should be a Boolean value

Full Access
Question # 66

Universal Containers (UC) uses Global Shipping (GS) as one of their shipping vendors. Regional leads of GS need access to UC's Salesforce instance for reporting damage of goods using Cases. The regional leads also need access to dashboards to keep track ofregional shipping KPIs. UC internally uses a third-party cloud analytics tool forcapacity planning and UC decided to provide access to this tool to a subset of GS employees. In addition to regional leads, the GS capacity planning team would benefit fromaccess to this tool. To access the analytics tool, UC IT has set up Salesforce as the Identity provider for Internal users and would like to follow the same approach for the GS users as well. What are the most appropriate license types for GS Tregional Leads and the GS Capacity Planners? Choose 2 Answers

A.

Customer Community Plus license for GS Regional Leads and External Identity for GS Capacity Planners.

B.

Customer Community Plus license for GS Regional Leads and Customer Community license for GS Capacity Planners.

C.

Identity License for GS Regional Leads and External Identity license for GS capacity Planners.

D.

Customer Community license for GS Regional Leads and Identity license for GS Capacity Planners.

Full Access
Question # 67

Universal containers (UC) has an e-commerce website while customers can buy products, make payments, and manage their accounts. UC decides to build a customer Community on Salesforce and wants to allow the customers to access the community for their accounts without logging in again. UC decides to implement ansp-Initiated SSO using a SAML-BASED complaint IDP. In this scenario where salesforce is the service provider, which two activities must be performed in salesforce to make sp-Initiated SSO work? Choose 2 answers

A.

Configure SAML SSO settings.

B.

Configure Delegated Authentication

C.

Create a connected App

D.

Set up my domain

Full Access
Question # 68

customer service representatives at Universal containers (UC) are complaining that whenever they click on links to case records and are asked to login with SAML SSO, they are beingredirected to the salesforce home tab and not the specific case record. What item should an architect advise the identity team at UC to investigate first?

A.

My domain is configured and active within salesforce.

B.

The salesforce SSO settings are using http post

C.

The identity provider is correctly preserving the Relay state

D.

The users have the correct Federation ID within salesforce.

Full Access
Question # 69

Northern Trail Outfitters (NTO) wants to improve its engagement with existing customers to boost customer loyalty. To get a better understanding of its customers, NTO establishes a single customer view including their buying behaviors, channel preferences and purchasing history. All of this information exists but is spread across different systems and formats.

NTO has decided to use Salesforce as the platform to build a 360 degree view. The company already uses Microsoft Active Directory (AD) to manage its users and company assets.

What should an Identity Architect do to provision, deprovision and authenticate users?

A.

Salesforce Identity is not needed since NTO uses Microsoft AD.

B.

Salesforce Identity can be included but NTO will be required to build a custom integration with Microsoft AD.

C.

Salesforce Identity is included in the Salesforce licenses so it does not need to be considered separately.

D.

A Salesforce Identity can be included but NTO will require Identity Connect.

Full Access
Question # 70

Which three different attributes can be used to identify the user in a SAML 65> assertion when Salesforce is acting as a Service Provider? Choose 3 answers

A.

Federation ID

B.

Salesforce User ID

C.

User Full Name

D.

User Email Address

E.

Salesforce Username

Full Access
Question # 71

Universal containers(UC) has decided to build a new, highly sensitive application on Force.com platform. The security team at UC has decided that they want users toprovide a fingerprint in addition to username/Password to authenticate to this application.How can an architect support fingerprint as a form of identification for salesforce Authentication?

A.

Use salesforce Two-factor Authentication with callouts to a third-party fingerprint scanning application.

B.

Use Delegated Authentication with callouts to a third-party fingerprint scanning application.

C.

Use an AppExchange product that does fingerprint scanning with native salesforce identity confirmation.

D.

Use custom login flows with callouts to a third-party fingerprint scanning application.

Full Access
Question # 72

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grantsan Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

A.

1, 4, 5, 2, 3

B.

4, 1, 5, 2, 3

C.

2, 1, 3, 4, 5

D.

4,5,2, 3, 1

Full Access