Big Cyber Monday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Question and Answers

Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)

Last Update Dec 7, 2025
Total Questions : 243

We are offering FREE Identity-and-Access-Management-Architect Salesforce exam questions. All you do is to just go and sign up. Give your details, prepare Identity-and-Access-Management-Architect free exam questions and then go for complete pool of Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) test questions that will help you more.

Identity-and-Access-Management-Architect pdf

Identity-and-Access-Management-Architect PDF

$36.75  $104.99
Identity-and-Access-Management-Architect Engine

Identity-and-Access-Management-Architect Testing Engine

$43.75  $124.99
Identity-and-Access-Management-Architect PDF + Engine

Identity-and-Access-Management-Architect PDF + Testing Engine

$57.75  $164.99
Questions 1

Universal Containers (UC) is implementing Salesforce and would like to establish SAML SSO for its users to log in. UC stores its corporate user identities in a Custom Database. The UC IT Manager has heard good things about Salesforce Identity Connect as an Idp, and would like to understand what limitations they may face if they decided to use Identity Connect in their current environment. What limitation Should an Architect inform the IT Manager about?

Options:

A.  

Identity Connect will not support user provisioning in UC's current environment.

B.  

Identity Connect will only support Idp-initiated SAML flows in UC'scurrent environment.

C.  

Identity Connect will only support SP-initiated SAML flows in UC's current environment.

D.  

Identity connect is not compatible with UC's current identity environment.

Discussion 0
Questions 2

Universal Containers (UC) is building a customer community and will allow customers to authenticate using Facebook credentials. The First time the user authenticating using Facebook, UC would like acustomer account created automatically in their accounting system. The accounting system has a web service accessible to Salesforce for the creation of accounts. How can the Architect meet these requirements?

Options:

A.  

Create a custom application on Heroku that manages the sign-on process from Facebook.

B.  

Use JIT Provisioning to automatically create the account in the accounting system.

C.  

Add an Apex callout in the registration handler of the authorization provider.

D.  

Use OAuth JWT flow to pass the data fromSalesforce to the Accounting System.

Discussion 0
Questions 3

A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities.

WhichSalesforce OAuth authorization flow should be used?

Options:

A.  

OAuth 2.0 JWT Bearer How

B.  

OAuth 2.0 Device Flow

C.  

OAuth 2.0 User-Agent Flow

D.  

OAuth 2.0 Asset Token Flow

Discussion 0
Questions 4

Northern Trail Outfitters (NTO) wants its customers to use phone numbers to log into their new digital portal, which was designed and built using Salesforce Experience Cloud. In order to access the portal, the user will need to do the following:

1. Enter a phone number and/or email address

2. Enter a verification code that is to be sent via email or text.

What is the recommended approach to fulfill this requirement?

Options:

A.  

Create a Login Discovery page and provide a Login Discovery Handler Apex class.

B.  

Create a custom login page with an Apex controller. The controller has logic to send and verify the identity.

C.  

Create an authentication provider and implement a self-registration handler class.

D.  

Create a custom login flow that uses an Apex controller to verify the phone numbers with the company's verification service.

Discussion 0
Questions 5

Universal containers (UC) does my domain enable in the context of a SAML SSO configuration? Choose 2 answers

Options:

A.  

Resource deep linking

B.  

App launcher

C.  

SSO from salesforce1 mobile app.

D.  

Login forensics

Discussion 0
Questions 6

Universal Containers (UC) has Active Directory (AD) as their enterprise identity store and wouldlike to use it for Salesforce user authentication. UC expects to synchronize user data between Salesforce and AD and Assign the appropriate Profile and Permission Sets based on AD group membership. What would be the optimal way to implement SSO?

Options:

A.  

Use Active Directory with Reverse Proxy as the Identity Provider.

B.  

Use Microsoft Access control Service as the Authentication provider.

C.  

Use Active Directory Federation Service (ADFS) as the Identity Provider.

D.  

Use Salesforce Identity Connect as the Identity Provider.

Discussion 0
Questions 7

A financial services company uses Salesforce and has a compliance requirement to track information about devices from whichusers log in. Also, a Salesforce Security Administrator needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

Options:

A.  

Use multi-factor authentication (MFA) to meet the compliance requirement totrack device information.

B.  

Use the Activations feature to meet the compliance requirement to track device information.

C.  

Use the Login History object to track information about devices from which users log in.

D.  

Use Login Flows to capture device fromwhich users log in and store device and user information in a custom object.

Discussion 0
Questions 8

Universal containers (UC) has implemented SAML -based single Sign-on for their salesforce application. UC is using PingFederate as the Identity provider. To access salesforce, Users usually navigate to a bookmarked link to my domain URL. What type of single Sign-on is this?

Options:

A.  

Sp-Initiated

B.  

IDP-initiated with deep linking

C.  

IDP-initiated

D.  

Web server flow.

Discussion 0
Questions 9

Universal Containers (UC) plans to use a SAML-based third-party IdP serving both of the Salesforce Partner Community and the corporate portal. UC partners will log in 65* to the corporate portal to access protected resources, including links to Salesforce resources. What would be the recommended way to configure the IdP so that seamless access can be achieved in this scenario?

Options:

A.  

Set up the corporate portal as a ConnectedApp in Salesforce and use the Web server OAuth flow.

B.  

Configure SP-initiated SSO that passes the SAML token upon Salesforce resource access request.

C.  

Set up the corporate portal as a Connected App in Salesforce and use the User Agent OAuth flow.

D.  

Configure IdP-initiated SSO that passes the SAML token upon Salesforce resource access request.

Discussion 0
Questions 10

What is oneof the roles of an Identity Provider in a Single Sign-on setup using SAML?

Options:

A.  

Validate token

B.  

Create token

C.  

Consume token

D.  

Revoke token

Discussion 0
Questions 11

After a recent audit, universal containers was advised to implement Two-factor Authentication for all of their critical systems, including salesforce. Which two actions should UC consider to meet this requirement? Choose 2 answers

Options:

A.  

Require users to provide their RSA token along with their credentials.

B.  

Require users to supply their email and phone number, which gets validated.

C.  

Require users to enter a second password after the first Authentication

D.  

Require users to use a biometric reader as well as their password

Discussion 0
Questions 12

A division of a Northern Trail Outfitters (NTO) purchased Salesforce. NTO uses a third party identity provider (IdP) to validate user credentials against Its corporate Lightweight Directory Access Protocol (LDAP) directory. NTO wants to help employees remember as passwords as possible.

What should an identity architect recommend?

Options:

A.  

Setup Salesforce as a Service Provider to the existing IdP.

B.  

SetupSalesforce as an IdP to authenticate against the LDAP directory.

C.  

Use Salesforce connect to synchronize LDAP passwords to Salesforce.

D.  

Setup Salesforce as an Authentication Provider to the existing IdP.

Discussion 0
Questions 13

Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from withinsalesforce through App launcher and connected App set up? Choose 2 answers

Options:

A.  

Google is the identity provider

B.  

Salesforce is the identity provider

C.  

Google is the service provider

D.  

Salesforce is the service provider

Discussion 0
Questions 14

Universal Containers (UC) wants to build a mobile application that twill be making calls to the Salesforce REST API. UC's Salesforce implementation relies heavily on custom objects and custom Apex code. UC does not want its users to have to enter credentials every time they use the app. Which two scope values should an Architect recommend to UC? Choose 2 answers.

Options:

A.  

Custom_permissions

B.  

Api

C.  

Refresh_token

D.  

Full

Discussion 0
Questions 15

A third-party app provider would like to have users provisioned via a service endpoint before users access their app from Salesforce.

What should an identity architect recommend to configure the requirement with limited changes to the third-party app?

Options:

A.  

Use a connected app with user provisioning flow.

B.  

Create Canvas app in Salesforce for third-party app to provision users.

C.  

Redirect users to the third-party app for registration.

D.  

Use Salesforce identity with Security Assertion Markup Language (SAML)for provisioning users.

Discussion 0
Questions 16

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grantsan Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

Options:

A.  

1, 4, 5, 2, 3

B.  

4, 1, 5, 2, 3

C.  

2, 1, 3, 4, 5

D.  

4,5,2, 3, 1

Discussion 0
Questions 17

Which two statements are capable of Identity Connect? Choose 2 answers

Options:

A.  

Synchronization of Salesforce Permission Set Licence Assignments.

B.  

Supports both Identity-Provider-Initiated and Service-Provider-Initiated SSO.

C.  

Support multiple orgs connecting to multiple Active Directory servers.

D.  

Automated user synchronization and de-activation.

Discussion 0
Questions 18

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.  

Client ID

B.  

Refresh Token

C.  

Authorization Code

D.  

Verification Code

E.  

Scopes

Discussion 0
Questions 19

Containers (UC) has implemented SAML-based single Sign-on for their Salesforce application and is planning to provide access to Salesforce on mobile devices using the Salesforce1 mobile app. UC wants to ensure that Single Sign-on is used for accessing the Salesforce1 mobile App. Which two recommendations should the Architect make? Choose 2 Answers

Options:

A.  

Configure the Embedded Web Browser to use My Domain URL.

B.  

Configure the Salesforce1 App to use the MY Domain URL.

C.  

Use the existing SAML-SSO flow along with User Agent Flow.

D.  

Use the existing SAML SSO flow along with Web Server Flow.

Discussion 0
Questions 20

Universal containers (UC) would like to enable self - registration for their salesforce partner community users. UC wants to capture some custom data elements from the partner user,and based on these data elements, wants to assign the appropriate profile and account values. Which two actions should the architect recommend to UC? Choose 2 answers

Options:

A.  

Modify the communitiesselfregcontroller to assign the profile and account.

B.  

Modify the selfregistration trigger to assign profile and account.

C.  

Configure registration for communities to use a custom visualforce page.

D.  

Configure registration for communities to use a custom apex controller.

Discussion 0
Questions 21

Northern Trail Outfitters (NTO) employees use a customon-premise helpdesk application to request, approve, notify, and track access granted to various on-premises and cloud applications, including Salesforce. Salesforce is currently used to authenticate users.

How should NTO provision Salesforce users as soon as they are approved in the helpdesk application with the approved profiles and permission sets?

Options:

A.  

Build an integration that performs a remote call-in to the Salesforce SOAP or REST API.

B.  

Use a login flow to query the helpdesk to validate user status.

C.  

Have the helpdesk initiate an IdP-initiated Just-m-Time provisioning Security Assertion Markup Language flow.

D.  

Use Salesforce Connect to integrate with the helpdesk application.

Discussion 0
Questions 22

UESTION NO: 154

Universal Containers (UC) wants to provide single sign-on (SSO) for a business-to-consumer (B2C) application using Salesforce Identity.

Which Salesforce license should UC utilize to implement this use case?

Options:

A.  

Identity Only

B.  

Salesforce Platform

C.  

External Identity

D.  

Partner Community

Discussion 0
Questions 23

Universal containers (UC) has multiple salesforce orgs and would like to use a single identity provider to access all of their orgs. How should UC'S architect enable this behavior?

Options:

A.  

Ensure that users have the same email value in their user records in all of UC's salesforce orgs.

B.  

Ensure the same username is allowed in multiple orgs by contacting salesforce support.

C.  

Ensure that users have the same Federation ID value in their user recordsin all of UC's salesforce orgs.

D.  

Ensure that users have the same alias value in their user records in all of UC's salesforce orgs.

Discussion 0
Questions 24

An architect needs to advise the team that manages the identity provider howto differentiate salesforce from other service providers. What SAML SSO setting in salesforce provides this capability?

Options:

A.  

Entity id

B.  

Issuer

C.  

Identity provider login URL

D.  

SAML identity location

Discussion 0
Questions 25

Universal Containers (UC) uses middleware to integrate multiple systems with Salesforce. UC has a strict, new requirement that usernames and passwords cannot be stored in any UC system. How can UC’s middleware authenticate to Salesforce while adhering to this requirement?

Options:

A.  

Create a Connected App that supports the JWT Bearer Token OAuth Flow.

B.  

Create a Connected App that supportsthe Refresh Token OAuth Flow

C.  

Create a Connected App that supports the Web Server OAuth Flow.

D.  

Create a Connected App that supports the User-Agent OAuth Flow.

Discussion 0
Questions 26

Containers (UC) has an existing Customer Community. UC wants to expand the self-registration capabilities such that customers receive a different community experience based on the data they provide during the registration process. What is the recommended approach an Architect Should recommend to UC?

Options:

A.  

Create an After Insert Apextrigger on the user object to assign specific custom permissions.

B.  

Create separate login flows corresponding to the different community user personas.

C.  

Modify the Community pages to utilize specific fields on the User and Contact records.

D.  

Modify theexisting Communities registration controller to assign different profiles.

Discussion 0
Questions 27

Universal containers (UC) is setting up Delegated Authentication to allow employees to log in using their corporate credentials. UC's security team is concerned about the risk of exposing the corporate login service on the Internet and has asked that a reliable trust mechanism be put in place between the loginservice and salesforce. What mechanism should an architect put in place to enable a trusted connection between the login services and salesforce?

Options:

A.  

Include client ID and client secret in the login header callout.

B.  

Set up a proxy server for the login service in the DMZ.

C.  

Require the use of Salesforce security Tokens on password.

D.  

Enforce mutual Authentication between systems using SSL.

Discussion 0
Questions 28

Universal containers (UC) have a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured as a connected App in salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properlysecure access to the app. Which two are recommendations to make the UC? Choose 2 answers

Options:

A.  

Disallow the use of single Sign-on for any users of the mobile app.

B.  

Require high assurance sessions in order to use the connected App

C.  

Use Google Authenticator as an additional part of the logical processes.

D.  

Set login IP ranges to the internal network for all of the app users profiles.

Discussion 0
Questions 29

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Amazon credentials.

What should an identity architect recommend to meet these requirements?

Options:

A.  

Configure a predefined authentication provider for Amazon.

B.  

Create a custom external authentication provider for Amazon.

C.  

Configure an OpenID Connect Authentication Provider for Amazon.

D.  

Configure Amazon as a connected app.

Discussion 0
Questions 30

Northern Trail Outfitters (NTO) has an existing custom business-to-consumer (B2C) website that does NOT support single sign-on standards, such as Security Assertion Markup Language (SAMi) or OAuth. NTO wants to use Salesforce Identity to register and authenticate new customers on the website.

Which two Salesforce features should an identity architect use in order to provide username/password authentication for the website?

Choose 2 answers

Options:

A.  

Identity Connect

B.  

Delegated Authentication

C.  

Connected Apps

D.  

Embedded Login

Discussion 0
Questions 31

Universal Containers (UC) uses Salesforce for its customer service agents. UC has a proprietary system for order tracking which supports Security Assertion Markup Language (SAML) based single sign-on. The VP of customer service wants to ensure only active Salesforce users should be able to access the order tracking system which is only visible within Salesforce.

What should be done to fulfill the requirement?

Choose 2 answers

Options:

A.  

Setup Salesforce as an identity provider (IdP) for order Tracking.

B.  

Set up the Corporate Identity store as an identity provider (IdP) for Order Tracking,

C.  

Customize Order Tracking to initiate a REST call to validate users in Salesforce after login.

D.  

Setup Order Tracking as a Canvas app in Salesforce to POST IdPinitiated SAML assertion.

Discussion 0
Questions 32

Universal containers want to build a custom mobile app connecting to salesforce using Oauth, and would like to restrict the types of resources mobile users can access. What Oauth feature of Salesforce should be used to achieve the goal?

Options:

A.  

Access Tokens

B.  

Mobile pins

C.  

Refresh Tokens

D.  

Scopes

Discussion 0
Questions 33

A global fitness equipment manufacturer uses Salesforce to manage its sales cycle. The manufacturer has a custom order fulfillment app that needs to request order data from Salesforce. The order fulfillment app needs to integrate with the Salesforce API using OAuth 2.0 protocol.

What should an identity architect use to fulfill this requirement?

Options:

A.  

Canvas App Integration

B.  

OAuth Tokens

C.  

Authentication Providers

D.  

Connected App and OAuth scopes

Discussion 0
Questions 34

IT security at Unversal Containers (UC) us concerned about recent phishing scams targeting its users and wants to add additional layers of login protection. What should an Architect recommend to address the issue?

Options:

A.  

Use the Salesforce Authenticator mobile app with two-step verification

B.  

Lock sessions to the IP address from which they originated.

C.  

Increase Password complexity requirements in Salesforce.

D.  

Implement Single Sign-on using a corporateIdentity store.

Discussion 0
Questions 35

Universal Containers (UC) has built a custom token-based Two-factor authentication (2FA) system for their existing on-premise applications. They are now implementingSalesforce and would like to enable a Two-factor login processfor it, as well. What is the recommended solution as Architect should consider?

Options:

A.  

Use the custom 2FA system for on-premise applications and native 2FA for Salesforce.

B.  

Replace the custom 2FA system with an AppExchange App that supports on premise application and salesforce.

C.  

Use Custom Login Flows to connect to the existing custom 2FA system for use in Salesforce.

D.  

Replace the custom 2FA system with Salesforce 2FA for on-premise applications and Salesforce.

Discussion 0
Questions 36

The CIO of universal containers(UC) wants to start takingadvantage of the refresh token capability for the UC applications that utilize Oauth 2.0. UC has listed an architect to analyze all of the applications that use Oauth flows to. See where refresh Tokens canbe applied. Which two OAuth flows should the architect consider in their evaluation? Choose 2 answers

Options:

A.  

Web server

B.  

Jwt bearer token

C.  

User-Agent

D.  

Username-password

Discussion 0
Questions 37

Universal Containers (UC) has five Salesforce orgs (UC1, UC2, UC3, UC4, UC5). of Every userthat is in UC2, UC3, UC4, and UC5 is also in UC1, however not all users 65* have access to every org. Universal Containers would like to simplify the authentication process such that all Salesforce users need to remember one set of credentials. UC would like to achieve this with the least impact to cost and maintenance. What approach should an Architect recommend to UC?

Options:

A.  

Purchase a third-party Identity Provider for all five Salesforce orgs to use and set up JIT user provisioning on all other orgs.

B.  

Purchase a third-party Identity Provider for all five Salesforce orgs to use, but don't set up JIT user provisioning for other orgs.

C.  

Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.

D.  

Configure UC1 as the Identity Provider to the other four Salesforce orgs, but don't set up JIT user provisioning for other orgs.

Discussion 0
Questions 38

Which tool should be used to track login data, such as the average number of logins, who logged in more thanthe average number of times and who logged in during non-business hours?

Options:

A.  

Login Inspector

B.  

Login History

C.  

Login Report

D.  

Login Forensics

Discussion 0
Questions 39

ON NO: 12

A group of users try to access one of Universal Containers' Connected Apps and receive the following error message: " Failed: Not approved for access." What is the most likely cause of this issue?

Options:

A.  

The Connected App settings "All users mayself-authorize" is enabled.

B.  

The Salesforce Administrators have revoked the OAuth authorization.

C.  

The Users do not have the correct permission set assigned to them.

D.  

The User of High Assurance sessions are required for the Connected App.

Discussion 0
Questions 40

Universal containers (UC) wants to implement a partner community. As part of their implementation, UC would like to modify both the Forgot password and change password experience with custom branding for their partner community users. Which 2 actions should an architect recommend to UC? Choose 2 answers

Options:

A.  

Build a community builder page for the change password experience and Custom Visualforce page for the Forgot password experience.

B.  

Build acustom visualforce page for both the change password and Forgot password experiences.

C.  

Build a custom visualforce page for the change password experience and a community builder page for the Forgot password experience.

D.  

Build a community builder page for both the change password and Forgot password experiences.

Discussion 0
Questions 41

Universal Containers (UC) is looking to purchase a third-party applicationas an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose2 answers

Options:

A.  

The Identity Provider can authenticate multiple applications.

B.  

The Identity Provider can authenticate multiple social media accounts.

C.  

The Identity provider can store credentials for multiple applications.

D.  

The Identity Provider can centralize enterprise password policy.

Discussion 0
Questions 42

Universal Container's (UC) identity architect needs to recommend a license type for their new Experience Cloud site that will be used by external partners (delivery providers) for reviewing and updating their accounts, downloading files provided by UC and obtaining scheduled pickup dates from their calendar.

UC is using their Salesforce production org as the identity provider for these users and the expected number of individual users is 2.5 million with 13.5 million unique logins per month.

Which of the following license types should be used to meet the requirement?

Options:

A.  

External Apps License

B.  

Partner CommunityLicense

C.  

Partner Community Login License

D.  

Customer Community plus Login License

Discussion 0
Questions 43

ON NO: 126

Universal containers (UC) is successfully using Delegated Authentication for their salesforce users. The service supporting Delegated Authentication is written in Java. UC has a new CIO that is requiring all company Web services be RESR-ful andwritten in. NET. Which two considerations should the UC Architect provide to the new CIO? Choose 2 answers

Options:

A.  

Delegated Authentication will not work with a.net service.

B.  

Delegated Authentication will continue to work with rest services.

C.  

Delegated Authentication will continue to work with a.net service.

D.  

Delegated Authentication will not work with rest services.

Discussion 0
Questions 44

Universal Containers has multiple Salesforce instances where users receive emails from different instances. Users should be logged into the correct Salesforce instance authenticated by their IdP when clicking on an email link to a Salesforce record.

What should be enabled in Salesforce as a prerequisite?

Options:

A.  

My Domain

B.  

External Identity

C.  

Identity Provider

D.  

Multi-Factor Authentication

Discussion 0
Questions 45

Northern Trail Outfitters (NTO) uses the Customer 360 Platform implemented on Salesforce Experience Cloud. The development team in charge has learned of a contactless user feature, which can reduce the overhead of managing customers and partners by creating users without contact information.

What is the potential impact to the architecture if NTO decides to implement this feature?

Options:

A.  

Custom registration handler is needed to correctly assign External Identity or Community license for the newly registered contactless user.

B.  

If contactless user is upgraded to Community license, the contact record is automatically created and linked to the user record, but not associated with an Account.

C.  

Contactless user feature is available only with the External Identity license, which can restrict the ExperienceCloud functionality available to the user.

D.  

Passwordless authentication cannot be supported because the mobile phone receiving one-time password (OTP) needs to match the number on the contact record.

Discussion 0
Questions 46

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.

Which action will accomplish this?

Options:

A.  

Use a HTTP POST to request the refresh token for the current user.

B.  

Use a HTTP POST to the System for Cross-domain Identity Management (SCIM) endpoint, including the current OAuth token.

C.  

Use a HTTP POST to make a call to the revoke token endpoint.

D.  

Enable Single Logout with a secure logout URL.

Discussion 0
Questions 47

N NO: 161

An identity architect has built a native mobile application and plans to integrate it with a Salesforce Identity solution. The following are the requirements for the solution:

1. Users should not have to login every time they use the app.

2. The app should be able to make calls to the Salesforce REST API.

3. End users should NOT see the OAuth approval page.

How should the identity architect configure the Salesforce connected app to meet the requirements?

Options:

A.  

Enable the API Scope and Offline Access Scope, upload a certificate so JWT Bearer Flow can be used and then set the connected app access settings to "Admin Pre-Approved".

B.  

Enable the API Scope and Offline Access Scope on the connected app, and then set the connected app to access settings to 'Admin Pre-Approved".

C.  

Enable the Full Access Scope and then set the connected app access settings to "Admin Pre-Approved".

D.  

Enable the API Scope and Offline Access Scope on the connected app, and then set the Connected App access settings to "User may self authorize".

Discussion 0
Questions 48

Universal containers (UC) has a classifiedinformation system that it's call centre team uses only when they are working on a case with a record type of "classified". They are only allowed to access the system when they own an open "classified" case, and their access to the system is removed at allother times. They would like to implement SAML SSO with salesforce as the IDP, and automatically allow or deny the staff's access to the classified information system based on whether they currently own an open "classified" case record when they try to access the system using SSO. What is the recommended solution for automatically allowing or denying access to the classified information system based on the open "classified" case record criteria?

Options:

A.  

Use a custom connected App handler using apex to dynamically allow access to the system based on whether the staff owns any open "classified" cases.

B.  

Use apex trigger on case to dynamically assign permission sets that grant access when a user is assigned with an open "classified" case, and remove it when the case is closed.

C.  

Use custom SAML jit provisioning to dynamically query the user's open "classified" cases when attempting to access the classified information system

D.  

Use salesforce reports to identify users that currently owns open "classified" cases and should be granted access to the classified information system.

Discussion 0
Questions 49

Universal Containers (UC) has built a custom time tracking app for its employee. UC wants to leverage Salesforce Identity to control access to the custom app.

At a minimum, which Salesforce license is required to support this requirement?

Options:

A.  

Identity Verification

B.  

Identity Connect

C.  

Identity Only

D.  

External Identity

Discussion 0
Questions 50

Northern Trail Outfitters (NTO) is planning to build a new customer service portal and wants to use passwordlesslogin, allowing customers to login with a one-time passcode sent to them via email or SMS.

How should the quantity of required Identity Verification Credits be estimated?

Options:

A.  

Each community comes with 10,000 Identity Verification Credits per month and onlycustomers with more than 10,000 logins a month should estimate additional SMS verifications needed.

B.  

Identity Verification Credits are consumed with each SMS (text message) sent and should be estimated based on the number of login verification challengesfor SMS verification users.

C.  

Identity Verification Credits are consumed with each verification sent and should be estimated based on the number of loginsthat will incur a verification challenge.

D.  

Identity Verification Credits are a direct add-on license based on the number of existing member-based or login-based Community licenses.

Discussion 0
Questions 51

Universal containers(UC) wants to integrate a third-party reward calculation system with salesforce to calculate rewards. Rewards will be calculated on a schedule basis and update back into salesforce. The integration between Salesforce and the reward calculation system needs to be secure. Which are the recommended best practices for using Oauth flows in this scenario? Choose 2 answers

Options:

A.  

Oauth refresh token flow

B.  

Oauth SAML bearer assertion flow

C.  

Oauthjwt bearer token flow

D.  

Oauth Username-password flow

Discussion 0
Questions 52

Universal Containers want users to be able to log in to the Salesforce mobile app with their Active Directory password. Employees are unable to use mobile VPN.

Which two options should an identity architect recommend to meet therequirement?

Choose 2 answers

Options:

A.  

Active Directory Password Sync Plugin

B.  

Configure Cloud Provider Load Balancer

C.  

Salesforce Trigger & Field on Contact Object

D.  

Salesforce Identity Connect

Discussion 0
Questions 53

Universal Containers (UC) operates in Asia, Europe and North America regions. There is one Salesforce org for each region. UC is implementing Customer 360 in Salesforce and has procured External Identity and Customer Community licenses in all orgs.

Customers of UC use Community to track orders and create inquiries. Customers also tend to move across regions frequently.

What should an identity architect recommend to optimize license usage and reduce maintenance overhead?

Options:

A.  

Merge three orgs into one instance of Salesforce. This will no longer require maintaining three separate copies of the same customer.

B.  

Delete contact/account records and deactivate user if user moves from a specific region; Sync will no longer be required.

C.  

Contacts are required since Community access needs to be enabled. Maintenance is a necessary overhead that must be handled via data integration.

D.  

D.  

Enable Contactless User in all orgs and downgrade users from Experience Cloud license to External Identity license once users have moved out of that region.

Discussion 0
Questions 54

Universal Containers (UC) is using its production org as the identity provider for a new Experience Cloud site and the identity architect is deciding which login experience to use for the site.

Which two page types are valid login page types for the site?

Choose 2 answers

Options:

A.  

Experience Builder Page

B.  

lightning Experience Page

C.  

Login Discovery Page

D.  

Embedded Login Page

Discussion 0
Questions 55

Universal Containers (UC) is planning to deploy a custom mobile app that will allow users to get e-signatures from its customers on their mobile devices. The mobile app connects to Salesforce to upload the e-signature as a file attachment and uses OAuth protocol for both authentication and authorization. What is the most recommended and secure OAuth scope setting that an Architect should recommend?

Options:

A.  

Id

B.  

Web

C.  

Api

D.  

Custom_permissions

Discussion 0
Questions 56

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for to give its customers the ability to login with their Facebook and Twitter credentials.

Which two actions should an identity architect recommend to meet these requirements?

Choose 2 answers

Options:

A.  

Create a custom external authentication provider for Facebook.

B.  

Configure a predefined authentication provider for Facebook.

C.  

Create a custom external authentication provider for Twitter.

D.  

Configure a predefined authentication provider for Twitter.

Discussion 0
Questions 57

The security team at Universal containers(UC) has identified exporting reports as a high-risk action and would like to require users to be logged into salesforce with their active directory (AD) credentialswhen doing so. For all other uses of Salesforce, Users should be allowed to use AD credentials or salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with salesforce credentials?

Options:

A.  

Use SAML Federated Authentication and Custom SAML jit provisioning to dynamically add or remove a permission set that grants the Export Reports permission.

B.  

Use SAML Federated Authentication, treat SAML sessions as high assurance, and raise the session level required for exporting reports.

C.  

Use SAML Federated Authentication and block access to reports when accesses through a standard assurance session.

D.  

Use SAML Federated Authentication with a login flow to dynamically add or remove a permission set that grants the export reports permission.

Discussion 0
Questions 58

An identity architect wants to secure Salesforce APIs using Security Assertion Markup Language (SAML). For security purposes, administrators will need to authorize the applications that will be consuming the APIs.

Which Salesforce OAuth authorization flow should be used?

Options:

A.  

OAuth 2-0 SAML Bearer Assertion Flow

B.  

OAuth 2.0 JWT Bearer Flow

C.  

SAML Assertion Flow

D.  

OAuth 2.0 User-Agent Flow

Discussion 0
Questions 59

Universal containers wants to implement single Sign-on for a salesforce org using an external identityprovider and corporate identity store. What type of Authentication flow is required to support deep linking?

Options:

A.  

Web server Oauth SSO flow.

B.  

Identity-provider-initiated SSO

C.  

Service-provider-initiated SSO

D.  

Start URL on identity provider

Discussion 0
Questions 60

An Enterprise is using a Lightweight Directory Access Protocol (LDAP ) server as the only point for user authentication with a username/password. Salesforce delegated authentication is configured to integrate Salesforce under single sign-on (SSO).

Mow can end users change their password?

Options:

A.  

Users once logged In, can go to the Change Password screen in Salesforce.

B.  

Users can click on the "Forgot your Password" link on the Salesforce.com login page.

C.  

Users can request the Salesforce Admin to reset their password.

D.  

Users can change it on the enterprise LDAP authentication portal.

Discussion 0
Questions 61

Refer to the exhibit.

Outfitters (NTO) is using Experience Cloud as an Identity for its application on Heroku. The application on Heroku should be able to handle two brands, Northern Trail Shoes and Northern Trail Shirts.

A user should select either of the two brands in Heroku before logging into the community. The app then performs Authorization using OAuth2.0 with the Salesforce Experience Cloud site.

NTO wants to make sure it renders login page images dynamically based on the user's brand preference selected in Heroku before Authorization.

what should an identity architect do to fulfill the above requirements?

Options:

A.  

For each brand create different communities and redirect users to the appropriate community using a custom Login controller written in Apex.

B.  

Create multiple login screens using Experience Builder and use Login Flows at runtime to route to different login screens.

C.  

Authorize third-party service by sending authorization requests to the community-url/services/oauth2/authorize/cookie_value.

D.  

Authorize third-party service by sending authorization requests to the community-url/services/oauth2/authonze/expid_value.

Discussion 0
Questions 62

Northern Trail Outfitters would like to use a portal built on Salesforce Experience Cloud for customer self-service. Guests of the portal be able toself-register, but be unable to automatically be assigned to a contact record until verified. External Identity licenses have been purchased for the project.

After registered guests complete an onboarding process, a flow will create the appropriate accountand contact records for the user.

Which three steps should an identity architect follow to implement the outlined requirements?

Choose 3 answers

Options:

A.  

Enable "Allow customers and partners to self-register".

B.  

Select the "Configurable Self-Reg Page" optionunder Login & Registration.

C.  

Set jp an external login page and call Salesforce APIs for user creation.

D.  

Customize the self-registration Apex handler to temporarily associate the user to a shared single contact record.

E.  

Customize me self-registrationApex handler to create only the user record.

Discussion 0
Questions 63

A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for identity verification.

Which feature should an identity architect recommend to meet therequirements?

Options:

A.  

Integrate with social websites (Facebook, Linkedin. Twitter)

B.  

Use an external Identity Provider

C.  

Create a custom Lightning Web Component

D.  

Use Login Discovery

Discussion 0
Questions 64

A financial enterprise isplanning to set up a user authentication mechanism to login to the Salesforce system. Due to regulatory requirements, the CIO of the company wants user administration, including passwords and authentication requests, to be managed by an external system that is only accessible via a SOAP webservice.

Which authentication mechanism should an identity architect recommend to meet the requirements?

Options:

A.  

OAuth Web-Server Flow

B.  

Identity Connect

C.  

Delegated Authentication

D.  

Just-in-Time Provisioning

Discussion 0
Questions 65

Universal containers (UC) has an e-commerce website while customers can buy products, make payments, and manage their accounts. UC decides to build a customer Community on Salesforce and wants to allow the customers to access the community for their accounts without logging in again. UC decides to implement ansp-Initiated SSO using a SAML-BASED complaint IDP. In this scenario where salesforce is the service provider, which two activities must be performed in salesforce to make sp-Initiated SSO work? Choose 2 answers

Options:

A.  

Configure SAML SSO settings.

B.  

Configure Delegated Authentication

C.  

Create a connected App

D.  

Set up my domain

Discussion 0
Questions 66

An insurance company has a connected app in its Salesforce environment that is usedto integrate with a Google Workspace (formerly knot as G Suite).

An identity and access management (IAM) architect has been asked to implement automation to enable users, freeze/suspend users, disable users, and reactivate existing users in Google Workspace upon similar actions in Salesforce.

Which solution is recommended to meet this requirement?

Options:

A.  

Configure user Provisioning for Connected Apps.

B.  

Update the Security Assertion Markup Language Just-in-Time (SAML JIT) handler in Salesforce for user provisioning and de-provisioning.

C.  

Build a custom REST endpoint in Salesforce that Google Workspace can poll against.

D.  

Build an Apex trigger on the userlogin object to make asynchronous callouts to Google APIs.

Discussion 0
Questions 67

Universal Containers (UC) has implemented SAML-based SSO solution for use with their multi-org Salesforce implementation, utilizing one ofthe the orgs as the Identity Provider. One user is reporting that they can log in to the Identity Provider org but get a generic SAML error message when accessing the other orgs. Which two considerations should the architect review to troubleshoot the issue? Choose 2 answers

Options:

A.  

The Federation ID must be a valid Salesforce Username

B.  

The Federation ID must is case sensitive

C.  

The Federation ID must be in the form of an email address.

D.  

The Federation ID must be populated on the user record.

Discussion 0
Questions 68

What information does the 'Relaystate' parameter contain in sp-Initiated Single Sign-on?

Options:

A.  

Referenceto a URL redirect parameter at the identity provider.

B.  

Reference to a URL redirect parameter at the service provider.

C.  

Reference to the login address URL of the service provider.

D.  

Reference to the login address URL of the identity Provider.

Discussion 0
Questions 69

Containers (UC) uses an internal system for recruiting and would like to have thecandidates' info available in the Salesforce automatically when they are selected. UC decides to use OAuth to connect to Salesforce from the recruiting system and would like to do the authentication using digital certificates. Which two OAuth flows shouldbe considered to meet the requirement? Choose 2 answers

Options:

A.  

JWT Bearer Token flow

B.  

Refresh Token flow

C.  

SAML Bearer Assertion flow

D.  

Web Service flow

Discussion 0
Questions 70

Northern Trail Outfitters is implementing a business-to-business (B2B) collaborationsite using Salesforce Experience Cloud. The partners will authenticate with an existing identity provider and the solution will utilize Security Assertion Markup Language (SAML) to provide single sign-on to Salesforce. Delegated administration will be used in the Expenence Cloud site to allow the partners to administer their users' access.

How should a partner identity be provisioned in Salesforce for this solution?

Options:

A.  

Create only a contact.

B.  

Create a contactless user.

C.  

Create a user and a related contact.

D.  

Create a person account.

Discussion 0
Questions 71

An identity architect has been asked to recommend a solution that allows administrators to configure personalized alert messages to users before they land on the Experience Cloud site (formerly known as Community) homepage.

What is recommended to fulfill this requirement with the least amount of customization?

Options:

A.  

Customize the registration handler Apex class to create a routing logic navigating to different home pages based on the user profile.

B.  

Use Login Flows to add a screen that shows personalized alerts.

C.  

Build aLightning web Component (LWC) for a homepage that shows custom alerts.

D.  

Create custom metadata that stores user alerts and use a LWC to display alerts.

Discussion 0
Questions 72

Which two capabilities does My Domain enable in the context of a SAML SSOconfiguration? Choose 2 answers

Options:

A.  

App Launcher

B.  

Resource deep linking

C.  

SSO from Salesforce Mobile App

D.  

Login Forensics

Discussion 0