Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Salesforce > Identity and Access Management Designer > Identity-and-Access-Management-Architect

Identity-and-Access-Management-Architect Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Question and Answers

Question # 4

A global company is using the Salesforce Platform as an Identity Provider and needs to integrate a third-party application with its Experience Cloud customer portal.

Which two features should be utilized to provide users with login and identity services for the third-party application?

Choose 2 answers

A.

Use the App Launcher with single sign-on (SSO).

B.

Use Delegated Authentication.

C.

Use a connected app.

D.

External a Data source with Named Principal identity type.

Full Access
Question # 5

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grants an Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

A.

4, 1, 5, 2, 3

B.

4, 5, 2, 3, 1

C.

1, 4, 5, 2, 3

D.

2, 1, 3, 4, 5

Full Access
Question # 6

Northern Trail Outfitters (NTO) has a number of employees who do NOT need access Salesforce objects. The employees should sign in to a custom Benefits web app using their Salesforce credentials.

Which license should the identity architect recommend to fulfill this requirement?

A.

Identify Only License

B.

Identify Verification Credits Add-On License

C.

External Identity License

D.

Identify Connect License

Full Access
Question # 7

An Identity and Access Management (IAM) Architect is recommending Identity Connect to integrate Microsoft Active Directory (AD) with Salesforce for user provisioning, deprovisioning and single sign-on (SSO).

Which feature of Identity Connect is applicable for this scenario?

A.

Identify Connect can be deployed as a managed package on Salesforce org, leveraging High Availability of Salesforce Platform out-of-the-box.

B.

When configured, Identity Connect acts as an identity provider to both Active Directory and Salesforce, thus providing SSO as a default feature.

C.

If the number of provisioned users exceeds Salesforce licence allowances, Identity Connect will start disabling the existing Salesforce users in First-in, First-out (FIFO) fashion.

D.

When Identity Connect is in place, if a user is deprovisioned in an on-premise AD, the user’s Salesforce session is revoked immediately.

Full Access
Question # 8

The executive sponsor for an organization has asked if Salesforce supports the ability to embed a login widget into its service providers in order to create a more seamless user experience.

What should be used and considered before recommending it as a solution on the Salesforce Platform?

A.

Embedded Login. Identify what level of UI customization will be required to make it match the service providers look and feel.

B.

Salesforce REST APIs. Ensure that Secure Sockets Layer (SSL) connection for the integration is used.

C.

OpenID Connect Web Server Flow. Determine if the service provider is secure enough to store the client secret on.

D.

Embedded Login. Consider whether or not it relies on third party cookies which can cause browser compatibility issues.

Full Access
Question # 9

Which two things should be done to ensure end users can only use single sign-on (SSO) to login in to Salesforce?

Choose 2 answers

A.

Enable My Domain and select " Prevent login from https://login.salesforce.com " .

B.

Request Salesforce Support to enable delegated authentication.

C.

Once SSO is enabled, users are only able to login using Salesforce credentials.

D.

Assign user " Is Single Sign-On Enabled " permission via profile or permission set.

Full Access
Question # 10

The CMO of an advertising company has invited an Identity and Access Management (IAM) specialist to discuss Salesforce out-of-box capabilities for configuring the company ' s login and registration experience on Salesforce Experience Cloud.

The CMO is looking to brand the login page with the company ' s logo, background color, login button color, and dynamic right-frame from an external URL.

Which two solutions should the IAM specialist recommend?

Choose 2 answers:

A.

Login & Registration pages can be branded in the Community Administration settings.

B.

Build custom site pages for reset and forget password features.

C.

Build custom pages for handling requirements as Experienced Cloud.

D.

Use Experience Builder to build branded Reset and Forget Password pages.

Full Access
Question # 11

A security architect is rolling out a new multi-factor authentication (MFA) mandate, where all employees must go through a secure authentication process before accessing Salesforce. There are multiple Identity Providers (IdP) in place and the architect is considering how the " Authentication Method Reference " ” field (AMR) in the Login History can help.

Which two considerations should the architect keep in mind?

Choose 2 answers

A.

Both OIDC and Security Assertion Markup Language (SAML) are supported but AMR must be implemented at IdP.

B.

High-assurance sessions must be configured under Session Security Level Policies.

C.

AMR field shows the authentication methods used at IdP.

D.

Dependency on what is supported by OpenID Connect (OIDC) implementation at IdP.

Full Access
Question # 12

Northern Trail Outfitters (NTO) is launching a new sportswear brand on its existing consumer portal built on Salesforce Experience Cloud. As part of the launch, emails with promotional links will be sent to existing customers to log in and claim a discount. The marketing manager would like the portal dynamically branded so that users will be directed to the brand link they clicked on; otherwise, users will view a recognizable NTO-branded page.

The campaign is launching quickly, so there is no time to procure any additional licenses.

However, the development team is available to apply any required changes to the portal.

Which approach should the identity architect recommend?

A.

Create a full audience to replicate the portal and set up these the branding accordingly.

B.

Use tutorials to build the new brand site and embedded login for some identities.

C.

Configure an additional community site on the same way that is dedicated for the new brand.

D.

Implement Experiences ID in the code and extend the URLs and endpoints, as required.

Full Access
Question # 13

A global company ' s Salesforce Identity Architect is reviewing its Salesforce production org login history and is seeing some intermittent Security Assertion Markup Language (SAML SSO) " Replay Detected " and " Assertion Invalid " login errors.

Which two issues would cause these errors?

Choose 2 answers

A.

The certificate loaded into SSO configuration does not match the certificate used by the IdP.

B.

The subject element is missing from the assertion sent to Salesforce.

C.

The current time setting of the company ' s identity provider (IdP) and Salesforce platform

is out of sync by more than eight minutes.

D.

The assertion sent to Salesforce contains an assertion ID previously used.

Full Access
Question # 14

An identity professional is working on the configuration of a connected app for Universal Container’s (UC) partner portal. UC wants to allow external users to access certain Salesforce data and perform limited actions. However, they also want to enforce additional security measures, such as IP restrictions and session timeout settings.

Which configuration option should be used to enforce IP restrictions and session timeout

settings for the connected app?

A.

Session Settings

B.

Login IP Ranges

C.

Custom Permissions

D.

Connected App QAuth policies

Full Access
Question # 15

A technology enterprise is planning to implement single sign-on login for users. When users log in to Salesforce, data should be populated in User object custom fields.

Which two steps should an identity architect recommend?

Choose 2 answers

A.

Implement Auth.SamJitHandler Interface.

B.

Implement SessionManagement Class.

C.

Create and update methods.

D.

Implement RegistrationHandler Interface.

Full Access
Question # 16

A farming enterprise offers smart farming technology to its farmer customers, which includes a variety of sensors for livestock tracking, pest monitoring, climate monitoring etc.

They plan to store all the data in Salesforce. They would also like to ensure timely maintenance of the installed sensors. They have engaged a Salesforce Architect to propose an appropriate way to send an alert when something goes wrong.

Which OAuth flow should the architect recommend?

A.

OAuth 2.0 SAML Bearer Assertion Flow

B.

OAuth 2.0 Device Authentication Flow

C.

OAuth 2.0 Asset Token Flow

D.

OAuth 2.0 JWT Bearer Token Flow

Full Access
Question # 17

A service provider (SP) supports both Security Assertion Narkup Language (SAML) and OpenID Connect (OIDC).

When Salesforce is acting as Identity Provider for this SP, which use case is the determining factor when choosing OIDC or SAML?

A.

OIDC is more secure than SAML and therefore is the obvious choice.

B.

the SP needs to perform our calls back to Salesforce on behalf of the user after the user logs in to the service provider.

C.

They are equivalent protocols and there is no real reason to choose one over the other.

D.

If the user has a session on Salesforce, you do not want them to be promoted for a username and password when they login to the SP.

Full Access
Question # 18

Universal Containers (UC) rolling out a new Customer Identity and Access Management Solution will be built on top of their existing Salesforce instance. Several service providers have been setup and integrated with Salesforce using OpenID Connect to allow for a seamless single sign-on experience. UC has a requirement to limit users to sign on directly from the Salesforce org to the external Service provider app that accepts OpenID Connect.

Which two steps should be done on the platform to satisfy the requirement?

Choose 2 answers

A.

Manage which connected apps a user has access to by assigning authentication providers to the users profile.

B.

Assign the connected app to the customer community, and enable the users profile in the Community settings.

C.

Set each of the Connected App access settings to Admin Pre-Approved.

D.

Use Profiles and Permission Sets to assign user access to Admin Pre-Approved Connected Apps.

Full Access
Question # 19

A multinational company using the Salesforce platform wants to implement robust user activity verification capabilities to detect unauthorized access and unusual login patterns.

They need real-time monitoring and alerting functionalities to respond promptly to security incidents.

Which Salesforce tool should be utilized to achieve these requirements?

A.

Salesforce Event Monitoring and Event Log Files

B.

Salesforce Profiles

C.

Salesforce Platform Encryption

D.

Salesforce Data Loader

Full Access
Question # 20

Northern Trail Outfitters (NTO) is planning to build a new customer service portal and wants to use passwordless login, allowing customers to login with a one-time passcode sent to them via email or SMS.

How should the quantity of required Identity Verification Credits be estimated?

A.

Identity Verification Credits are consumed with each verification sent and should be estimated based on the number of logins that will incur a verification challenge.

B.

Each community comes with 10,000 Identity Verification Credits per month and only customers with more than 10,000 logins a month should estimate additional SMS verifications needed.

C.

Identity Verification Credits are consumed with each SMS (best message) sent and should be estimated based on the number of login verification challenges for SMS verification users.

D.

Identity Verification Credits are a direct add-on license based on the number of existing member-based or login-based Community licenses.

Full Access
Question # 21

Universal Container’s (UC) is using Salesforce Experience Cloud site for its container wholesale business. The identity architect wants to use an authentication provider for the new site.

Which two options should be utilized in creating an authentication provider?

Choose 2 answers

A.

The default login user can be set.

B.

A custom error URL can be set.

C.

The default authentication provider certificate can be set.

D.

A custom registration handler can be set.

Full Access
Question # 22

A Salesforce Administrator is tasked with setting up Just-in-Time (JIT) provisioning for SAML to enable Single Sign-On (SSO) for your organization. They have already configured the SAML settings for SSO in Salesforce.

What should be their next steps to enable JIT provisioning?

A.

Enable Just-in-Time User Provisioning in the SAML Single Sign-On Setting, configure the User Provisioning Type, and provide the SAML JIT Handler.

B.

Create a new permission set with JIT provisioning enabled, configure the necessary permissions, and assign the permission set to relevant users.

C.

Create a new Apex class to handle JIT provisioning, implement the required methods, and assign the class to the appropriate user profiles.

D.

Modify the organization-wide sharing settings to allow JIT provisioning, update the sharing rules for the user object.

Full Access
Question # 23

Northern Trail Outfitters (NTO) is using Experience Cloud as an Identity Provider for its application on Heroku. The application on Heroku should be able to handle two brands,

Northern Trail Shoes and Northern Trail Shirts.

A user should select either of the two brands in Heroku before logging into the community. The app then performs Authorization using OAuth2.0 with the Salesforce Experience Cloud site.

NTO wants to make sure it renders login page images dynamically based on the user ' s brand

preference selected in Heroku before Authorization.

What should an identity architect do to fulfill the above requirements?

A.

Create multiple login screens using Experience Builders and use Login Flows at runtime to route to different login screens.

B.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?node=value.

C.

For each brand create different communities and redirect users to the appropriate community using a custom Login controller written in Ages.

D.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?coside_value.

Full Access
Question # 24

An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to be able to authenticate to Salesforce and then make API calls against the REST API.

One of the requirements is that the solution needs to ensure the third party service providers connected app in Salesforce minimizes the need for end user interaction and maximizes security.

Which OAuth flow should be used to fulfill the requirement?

A.

JWT Bearer Flow

B.

Web Server Flow

C.

Username-Razoned Flow

D.

User Agent Flow

Full Access
Question # 25

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

A.

Leverage OpenID Connect Token Introspection.

B.

Query using OpenID Connect discovery endpoint.

C.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

D.

Create a custom OAuth scope.

Full Access
Question # 26

A multinational company is looking to rollout Salesforce globally. The company has a Microsoft Active Directory Federation Services (ADFS) implementation for the Americas, Europe and APAC. The company plans to have a single org and they would like to have all of its users access Salesforce using the ADFS. The company would like to limit its investments and prefer not to procure additional applications to satisfy the requirements.

What is recommended to ensure these requirements are met?

A.

Implement Identity Connect to provide single sign-on to Salesforce and federated across multiple ADFS systems.

B.

Configure Each ADFS system under single sign-on settings and allow users to choose the system to authenticate during sign on to Salesforce.

C.

Add a central identity system that facilitates between the ADFS systems and integrate with Salesforce for single sign-on.

D.

Use connected apps for each ADFS implementation and implement Salesforce site to authenticate users across the ADFS system applicable to their geo.

Full Access
Question # 27

Universal Containers (UC) has decided to replace the homegrown customer portal with Salesforce Experience Cloud. UC will continue to use Its third-party single sign-on (SSO) solution that stores all of its customer and partner credentials.

The first time a customer logs in to the Experience Cloud site through SSO, a user record needs to be created automatically.

Which solution should an identity architect recommend in order to automatically provision users in Salesforce upon login?

A.

Third-party AppExchange solution

B.

Custom middleware and web services

C.

Just-in-Time (JIT) provisioning

D.

Custom login flow and Apex handler

Full Access
Question # 28

Northern Trail Outfitters has implemented OAuth 2.0 for its single sign-on (SSO) solution, allowing users to authenticate and access Salesforce resources using external identity providers. However, some users are reporting intermittent logouts when trying to access Salesforce through SSO.

What can be a potential point of failure that should be considered during troubleshooting?

A.

Expiration or revocation of the access token issued by the identity provider.

B.

Misconfiguration of the user’s device, such as an outdated web browser or disabled JavaScript.

C.

Delays in the network routing between the user’s location and the Salesforce servers.

D.

Insufficient user permissions in Salesforce causing access issues.

Full Access
Question # 29

Northern Trail Outfitters want to allow its consumer to self-register on it business-to consumer (B2C) portal that is built on Experience Cloud. The identity architect has recommended to use Person Accounts.

Which three steps need to be configured to enable self-registration using person accounts?

Choose 3 answers

A.

Enable business accounts in the Setup page.

B.

Enable person accounts in the Setup page.

C.

Under Login and Registration settings, ensure that the default account field is empty.

D.

Enable access to person and business account record types under Public Access Settings.

E.

Set organization-wide default sharing for Contact to Public Read Only.

Full Access
Question # 30

An Identity and Access Management (IAM) architect is tasked with unifying multiple B2C Commerce sites and an Experience Cloud community with a single identity. The solution needs to support more than 1,000 logins per minute.

What should the IAM Architect do to fulfill this requirement?

A.

Create a default account for capturing all ecommerce contacts registered on the community because personAccount is not supported for this case.

B.

Confirm performance considerations with Salesforce Customer Support due to high peaks.

C.

Configure community as a Security Assertion Markup Language (SAML) identity provider and enable Just-In-Time Provisioning to B2C Commerce.

D.

Configure both the community and the commerce sites as OAuth2 RPs (relying party) with an external identity provider.

Full Access
Question # 31

Universal Containers is building a web application that will connect with the Salesforce API using JWT OAuth Flow.

Which two settings need to be configured in the connect app to support this requirement?

Choose 2 answers

A.

The Use Digital Signature option in the connected app.

B.

The " web " OAuth scope in the connected app.

C.

The " api " OAuth scope in the connected app.

D.

The " eclair_api " OAuth scope in the connected app.

Full Access
Question # 32

Northern Trail Outfitters recently acquired a company. Each company will retain its Identity Provider (IdP). Both companies rely extensively on Salesforce processes that send emails to users to take specific actions in Salesforce.

How should the combined companys ' employees collaborate in a single Salesforce org, yet authenticate to the appropriate IdP?

A.

Configure unique MyDomains for each company and have generated links use the appropriate MyDomain in the URL.

B.

Have generated links append a quenystring parameter indicating the IdP. The login service will redirect to the appropriate IdP.

C.

Enable each IdP as a login option in the My Domain Authentication Service settings. Users will then click on the appropriate IdP button.

D.

Have generated links be prefixed with the appropriate IdP URL to invoke an idP-initiated Security Assertion Markup Language flow when clicked.

Full Access