Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Identity-and-Access-Management-Architect Salesforce Certified Identity andAccess Management Architect (SP25) Questions and Answers

Questions 4

Universal containers (UC) would like to enable self - registration for their salesforce partner community users. UC wants to capture some custom data elements from the partner user,and based on these data elements, wants to assign the appropriate profile and account values. Which two actions should the architect recommend to UC? Choose 2 answers

Options:

A.

Modify the communitiesselfregcontroller to assign the profile and account.

B.

Modify the selfregistration trigger to assign profile and account.

C.

Configure registration for communities to use a custom visualforce page.

D.

Configure registration for communities to use a custom apex controller.

Buy Now
Questions 5

Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wants to allow customers to login using Facebook, Google, and other social sign-on providers.

How should this functionality be enabled for UC, assuming ail social sign-on providers support OpenID Connect?

Options:

A.

Configure an authentication provider and a registration handler for each social sign-on provider.

B.

Configure a single sign-on settingand a registration handler for each social sign-on provider.

C.

Configure an authentication provider and a Just-In-Time (JIT) handler for each social sign-on provider.

D.

Configure a single sign-on setting and a JIT handler for each social sign-on provider.

Buy Now
Questions 6

The CIO of universal containers(UC) wants to start takingadvantage of the refresh token capability for the UC applications that utilize Oauth 2.0. UC has listed an architect to analyze all of the applications that use Oauth flows to. See where refresh Tokens canbe applied. Which two OAuth flows should the architect consider in their evaluation? Choose 2 answers

Options:

A.

Web server

B.

Jwt bearer token

C.

User-Agent

D.

Username-password

Buy Now
Questions 7

Universal Containers is creating a web application that will be secured by SalesforceIdentity using the OAuth 2.0 Web Server Flow uses the OAuth 2.0 authorization code grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Verification URL

B.

Client Secret

C.

Access Token

D.

Scopes

Buy Now
Questions 8

Universal Containers (UC) rollingout a new Customer Identity and Access Management Solution will be built on top of their existing Salesforce instance.

Several service providers have been setup and integrated with Salesforce using OpenlD Connect to allow for a seamless single sign-on experience. UC has a requirement to limit user access to only a subset of service providers per customer type.

Which two steps should be done on the platform to satisfy the requirement?

Choose 2 answers

Options:

A.

Manage which connected apps a user has access to byassigning authentication providers to the user’s profile.

B.

Assign the connected app to the customer community, and enable the users profile in the Community settings.

C.

Use Profiles and Permission Sets to assign user access to Admin Pre-Approved Connected Apps.

D.

Set each of the Connected App access settings to Admin Pre-Approved.

Buy Now
Questions 9

N NO: 161

An identity architect has built a native mobile application and plans to integrate it with a Salesforce Identity solution. The following are the requirements for the solution:

1. Users should not have to login every time they use the app.

2. The app should be able to make calls to the Salesforce REST API.

3. End users should NOT see the OAuth approval page.

How should the identity architect configure the Salesforce connected app to meet the requirements?

Options:

A.

Enable the API Scope and Offline Access Scope, upload a certificate so JWT Bearer Flow can be used and then set the connected app access settings to "Admin Pre-Approved".

B.

Enable the API Scope and Offline Access Scope on the connected app, and then set the connected app to access settings to 'Admin Pre-Approved".

C.

Enable the Full Access Scope and then set the connected app access settings to "Admin Pre-Approved".

D.

Enable the API Scope and Offline Access Scope on the connected app, and then set the Connected App access settings to "User may self authorize".

Buy Now
Questions 10

Northern Trail Outfitters would like to use a portal built on Salesforce Experience Cloud for customer self-service. Guests of the portal be able toself-register, but be unable to automatically be assigned to a contact record until verified. External Identity licenses have been purchased for the project.

After registered guests complete an onboarding process, a flow will create the appropriate accountand contact records for the user.

Which three steps should an identity architect follow to implement the outlined requirements?

Choose 3 answers

Options:

A.

Enable "Allow customers and partners to self-register".

B.

Select the "Configurable Self-Reg Page" optionunder Login & Registration.

C.

Set jp an external login page and call Salesforce APIs for user creation.

D.

Customize the self-registration Apex handler to temporarily associate the user to a shared single contact record.

E.

Customize me self-registrationApex handler to create only the user record.

Buy Now
Questions 11

Northern Trail Outfitters would like to automatically create new employee users in Salesforce with an appropriate profile that maps to its Active Directory Department.

Howshould an identity architect implement this requirement?

Options:

A.

Use the createUser method in the Just-in-Time (JIT) provisioning registration handler to assign the appropriate profile.

B.

Use the updateUser method in the Just-in-Time (JIT) provisioning registration handler to assign the appropriate profile.

C.

Use a login flow to collect Security Assertion Markup Language attributes and assign the appropriate profile during Just-In-Time(JIT) provisioning.

D.

Make a callout during the login flow to query department from Active Directory to assign the appropriate profile.

Buy Now
Questions 12

NorthernTrail Outfitters (NTO) leverages Microsoft Active Directory (AD) for management of employee usernames, passwords, permissions, and asset access. NTO also owns a third-party single sign-on (SSO) solution. The third-party party SSO solution is used for all corporate applications, including Salesforce.

NTO has asked an architect to explore Salesforce Identity Connect for automatic provisioning and deprovisioning of users in Salesforce.

What role does identity Connect play in the outlined requirements?

Options:

A.

Service Provider

B.

Single Sign-On

C.

Identity Provider

D.

User Management

Buy Now
Questions 13

Universal containers (UC) has implemented SAML SSO to enable seamless access across multiple applications. UC has regional salesforce orgs and wants it's usersto be able to access them from their main Salesforce org seamless. Which action should an architect recommend?

Options:

A.

Configure the main salesforce org as an authentication provider.

B.

Configure the main salesforce org as the Identity provider.

C.

Configurethe regional salesforce orgs as Identity Providers.

D.

Configure the main Salesforce org as a service provider.

Buy Now
Questions 14

Northern Trail Outfitters (NTO) recently purchased Salesforce Identity Connect to streamline user provisioning across Microsoft Active Directory (AD) and Salesforce Sales Cloud.

NTO has asked an identity architect to identify which salesforce security configurations can map to AD permissions.

Which three Salesforce permissions are available to map to AD permissions?

Choose 3 answers

Options:

A.

Public Groups

B.

Field-Level Security

C.

Roles

D.

Sharing Rules

E.

Profiles and Permission Sets

Buy Now
Questions 15

Universal Containers (UC) is looking to build a Canvas app and wants to use the corresponding Connected App to control where the app is visible. Which two options are correct in regards to where theapp can be made visible under the Connected App setting for the Canvas app? Choose 2 answers

Options:

A.

As part of the body of a Salesforce Knowledge article.

B.

In the mobile navigation menu on Salesforce for Android.

C.

The sidebar of a Salesforce Console as a console component.

D.

Included in the Call Control Tool that's part of Open CTI.

Buy Now
Questions 16

An Identity and Access Management (IAM) architect is tasked with unifying multiple B2C Commerce sites and an Experience Cloud community with a single identity. The solution needs to support more than 1,000 logins per minute.

What should the IAM do to fulfill this requirement?

Options:

A.

Configure both the community and the commerce sites as OAuth2 RPs (relying party) withan external identity provider.

B.

Configure community as a Security Assertion Markup Language (SAML) identity provider and enable Just-in-Time Provisioning to B2C Commerce.

C.

Create a default account for capturing all ecommerce contacts registered on thecommunity because person Account is not supported for this case.

D.

Confirm performance considerations with Salesforce Customer Support due to high peaks.

Buy Now
Questions 17

Universal Containers (UC) operates in Asia, Europe and North America regions. There is one Salesforce org for each region. UC is implementing Customer 360 in Salesforce and has procured External Identity and Customer Community licenses in all orgs.

Customers of UC use Community to track orders and create inquiries. Customers also tend to move across regions frequently.

What should an identity architect recommend to optimize license usage and reduce maintenance overhead?

Options:

A.

Merge three orgs into one instance of Salesforce. This will no longer require maintaining three separate copies of the same customer.

B.

Delete contact/account records and deactivate user if user moves from a specific region; Sync will no longer be required.

C.

Contacts are required since Community access needs to be enabled. Maintenance is a necessary overhead that must be handled via data integration.

D.

D. Enable Contactless User in all orgs and downgrade users from Experience Cloud license to External Identity license once users have moved out of that region.

Buy Now
Questions 18

Containers (UC) has an existing Customer Community. UC wants to expand the self-registration capabilities such that customers receive a different community experience based on the data they provide during the registration process. What is the recommended approach an Architect Should recommend to UC?

Options:

A.

Create an After Insert Apextrigger on the user object to assign specific custom permissions.

B.

Create separate login flows corresponding to the different community user personas.

C.

Modify the Community pages to utilize specific fields on the User and Contact records.

D.

Modify theexisting Communities registration controller to assign different profiles.

Buy Now
Questions 19

Containers (UC) uses a legacy Employee portal for their employees to collaborate. Employees access theportal from their company’s internal website via SSO. It is set up to work with SiteMinder and Active Directory. The Employee portal has features to support posing ideas. UC decides to use Salesforce Ideas for voting and better tracking purposes. To avoidprovisioning users on Salesforce, UC decides to integrate Employee portal ideas with Salesforce idea through the API. What is the role of Salesforce in the context of SSO, based on this scenario?

Options:

A.

Service Provider, because Salesforce is the applicationfor managing ideas.

B.

Connected App, because Salesforce is connected with Employee portal via API.

C.

Identity Provider, because the API calls are authenticated by Salesforce.

D.

An independent system, because Salesforce is not part of the SSO setup.

Buy Now
Questions 20

Universal containers (UC) has a customer Community that uses Facebook for authentication. UC would like to ensure that changes in the Facebook profile are reflected on the appropriate customer Community user. How can this requirement be met?

Options:

A.

Use the updateuser() method on the registration handler class.

B.

Use SAML just-in-timeprovisioning between Facebook and Salesforce

C.

Use information in the signed request that is received from Facebook.

D.

Develop a schedule job that calls out to Facebook on a nightly basis.

Buy Now
Questions 21

Northern Trail Outfitters (NTO) uses the Customer 360 Platform implemented on Salesforce Experience Cloud. The development team in charge has learned of a contactless user feature, which can reduce the overhead of managing customers and partners by creating users without contact information.

What is the potential impact to the architecture if NTO decides to implement this feature?

Options:

A.

Custom registration handler is needed to correctly assign External Identity or Community license for the newly registered contactless user.

B.

If contactless user is upgraded to Community license, the contact record is automatically created and linked to the user record, but not associated with an Account.

C.

Contactless user feature is available only with the External Identity license, which can restrict the ExperienceCloud functionality available to the user.

D.

Passwordless authentication cannot be supported because the mobile phone receiving one-time password (OTP) needs to match the number on the contact record.

Buy Now
Questions 22

Universal containers (UC) built a customer Community for customers to buy products, review orders, and manage their accounts. UC has provided three different options for customers to log in to the customer Community: salesforce, Google, and Facebook. Which two role combinations are represented by the systems in the scenario? Choose 2 answers

Options:

A.

Google is the service provider and Facebook is the identity provider

B.

Salesforceis the service provider and Google is the identity provider

C.

Facebook is the service provider and salesforce is the identity provider

D.

Salesforce is the service provider and Facebook is the identity provider

Buy Now
Questions 23

Universal Containers (UC) has a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured asa connected App in Salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app. Which two are recommendations to make the UC? Choose 2 answers

Options:

A.

Disallow the use of Single Sign-on for anyusers of the mobile app.

B.

Require High Assurance sessions in order to use the Connected App.

C.

Set Login IP Ranges to the internal network for all of the app users Profiles.

D.

Use Google Authenticator as an additional part of the login process

Buy Now
Questions 24

An identity architect wants to secure Salesforce APIs using Security Assertion Markup Language (SAML). For security purposes, administrators will need to authorize the applications that will be consuming the APIs.

Which Salesforce OAuth authorization flow should be used?

Options:

A.

OAuth 2-0 SAML Bearer Assertion Flow

B.

OAuth 2.0 JWT Bearer Flow

C.

SAML Assertion Flow

D.

OAuth 2.0 User-Agent Flow

Buy Now
Questions 25

Universal Containers (UC) is building a custom employee hut) application on Amazon Web Services (AWS) and would like to store their users' credentials there. Users will also need access to Salesforce for internal operations. UC has tasked an identity architect with evaluating Afferent solutions for authentication and authorization between AWS and Salesforce.

How should an identity architect configure AWS to authenticate and authorize Salesforce users?

Options:

A.

Configure the custom employee app as a connected app.

B.

Configure AWS as an OpenID Connect Provider.

C.

Create a custom external authentication provider.

D.

Develop a customAuth server in AWS.

Buy Now
Questions 26

Containers (UC) uses an internal system for recruiting and would like to have thecandidates' info available in the Salesforce automatically when they are selected. UC decides to use OAuth to connect to Salesforce from the recruiting system and would like to do the authentication using digital certificates. Which two OAuth flows shouldbe considered to meet the requirement? Choose 2 answers

Options:

A.

JWT Bearer Token flow

B.

Refresh Token flow

C.

SAML Bearer Assertion flow

D.

Web Service flow

Buy Now
Questions 27

Universal Containers (UC) uses Salesforce for its customer service agents. UC has a proprietary system for order tracking which supports Security Assertion Markup Language (SAML) based single sign-on. The VP of customer service wants to ensure only active Salesforce users should be able to access the order tracking system which is only visible within Salesforce.

What should be done to fulfill the requirement?

Choose 2 answers

Options:

A.

Setup Salesforce as an identity provider (IdP) for order Tracking.

B.

Set up the Corporate Identity store as an identity provider (IdP) for Order Tracking,

C.

Customize Order Tracking to initiate a REST call to validate users in Salesforce after login.

D.

Setup Order Tracking as a Canvas app in Salesforce to POST IdPinitiated SAML assertion.

Buy Now
Questions 28

Which three are features of federated Single sign-on solutions? Choose 3 Answers

Options:

A.

It establishes trust between Identity Store and Service Provider.

B.

It federates credentials control to authorized applications.

C.

It solves all identity and access management problems.

D.

It improves affiliated applications adoption rates.

E.

It enables quick and easy provisioning and deactivating of users.

Buy Now
Questions 29

which three are features of federated Single Sign-on solutions? Choose 3 answers

Options:

A.

It federates credentials control toauthorized applications.

B.

It establishes trust between Identity store and service provider.

C.

It solves all identity and access management problems.

D.

It improves affiliated applications adoption rates.

E.

It enables quick and easy provisioning and deactivating of users.

Buy Now
Questions 30

A technology enterprise is planning to implement single sign-on login for users. When users log in to the Salesforce User object custom field, data should be populated fornew and existing users.

Which two steps should an identity architect recommend?

Choose 2 answers

Options:

A.

Implement Auth.SamlJitHandler Interface.

B.

Create and update methods.

C.

Implement RegistrationHandler Interface.

D.

Implement SesslonManagement Class.

Buy Now
Questions 31

An Identity and Access Management (IAM) Architect is recommending Identity Connect to integrate Microsoft Active Directory (AD) with Salesforce for user provisioning, deprovisioning and single sign-on (SSO).

Which feature of Identity Connect is applicable for this scenario?

Options:

A.

When Identity Connect is in place, if a user is deprovisioned in an on-premise AD, the user's Salesforce session Is revoked Immediately.

B.

If the number of provisioned users exceeds Salesforce license allowances, identity Connect will start disabling the existingSalesforce users in First-in, First-out (FIFO) fashion.

C.

Identity Connect can be deployed as amanaged package on salesforce org, leveraging High Availability of Salesforce Platform out-of-the-box.

D.

When configured, Identity Connect acts as an identity provider to both Active Directory and Salesforce, thus providing SSO as a default feature.

Buy Now
Questions 32

Northern Trail Outfitters (NTO) wants to improve its engagement with existing customers to boost customer loyalty. To get a better understanding of its customers, NTO establishes a single customer view including their buying behaviors, channel preferences and purchasing history. All of this information exists but is spread across different systems and formats.

NTO has decided to use Salesforce as the platform to build a 360 degree view. The company already uses Microsoft Active Directory (AD) to manage its users and company assets.

What should an Identity Architect do to provision, deprovision and authenticate users?

Options:

A.

Salesforce Identity is not needed since NTO uses Microsoft AD.

B.

Salesforce Identity can be included but NTO will be required to build a custom integration with Microsoft AD.

C.

Salesforce Identity is included in the Salesforce licenses so it does not need to be considered separately.

D.

A Salesforce Identity can be included but NTO will require Identity Connect.

Buy Now
Questions 33

A service provider (SP) supportsboth Security Assertion Markup Language (SAML) and OpenID Connect (OIDC).

When integrating this SP with Salesforce, which use case is the determining factor when choosing OIDC or SAML?

Options:

A.

OIDC is more secure than SAML and therefore is the obvious choice.

B.

B. The SP needs to perform API calls back to Salesforce on behalf of the user after the user logs in to the service provider.

C.

If the user has a session on Salesforce, you do not want them to be prompted for a username and password when they login to theSP.

D.

They are equivalent protocols and there is no real reason to choose one over the other.

Buy Now
Questions 34

A financial enterprise isplanning to set up a user authentication mechanism to login to the Salesforce system. Due to regulatory requirements, the CIO of the company wants user administration, including passwords and authentication requests, to be managed by an external system that is only accessible via a SOAP webservice.

Which authentication mechanism should an identity architect recommend to meet the requirements?

Options:

A.

OAuth Web-Server Flow

B.

Identity Connect

C.

Delegated Authentication

D.

Just-in-Time Provisioning

Buy Now
Questions 35

A multinational company is looking to rollout Salesforce globally. The company has a Microsoft Active Directory Federation Services (ADFS) implementation for the Americas, Europe and APAC. The company plans to have a single org and they would like to have all of its users access Salesforce using the ADFS . The company would like to limit its investments and prefer not to procure additional applications to satisfy the requirements.

What is recommended to ensure these requirements are met ?

Options:

A.

Use connected apps for each ADFS implementation and implement Salesforce site to authenticate users across the ADFS system applicable to their geo.

B.

Implement Identity Connect to provide single sign-on to Salesforce and federated across multiple ADFS systems.

C.

Add a central identity system that federates between the ADFS systems and integrate with Salesforce for single sign-on.

D.

Configure Each ADFSsystem under single sign-on settings and allow users to choose the system to authenticate during sign on to Salesforce-

Buy Now
Questions 36

A third-party app provider would like to have users provisioned via a service endpoint before users access their app from Salesforce.

What should an identity architect recommend to configure the requirement with limited changes to the third-party app?

Options:

A.

Use a connected app with user provisioning flow.

B.

Create Canvas app in Salesforce for third-party app to provision users.

C.

Redirect users to the third-party app for registration.

D.

Use Salesforce identity with Security Assertion Markup Language (SAML)for provisioning users.

Buy Now
Questions 37

customer service representatives at Universal containers (UC) are complaining that whenever they click on links to case records and are asked to login with SAML SSO, they are beingredirected to the salesforce home tab and not the specific case record. What item should an architect advise the identity team at UC to investigate first?

Options:

A.

My domain is configured and active within salesforce.

B.

The salesforce SSO settings are using http post

C.

The identity provider is correctly preserving the Relay state

D.

The users have the correct Federation ID within salesforce.

Buy Now
Questions 38

When designing a multi-branded Customer Identity and Access Management solution on the Salesforce Platform, how should an identity architect ensure a specific brand experience in Salesforce is presented?

Options:

A.

The Experience ID, which can be included in OAuth/Open ID flows and Security Assertion Markup Language (SAML) flows as a URL parameter.

B.

Provide a brand picker that the end user can use to select its sub-brand when they arrive on salesforce.

C.

Add a custom parameter to the service provider's OAuth/SAML call and implement logic on its login page to apply branding based on the parameters value.

D.

The Audience ID, which can be set in a shared cookie.

Buy Now
Questions 39

Northern Trail Outfitters (NTO) has an off-boarding process where a terminated employee is first disabled in the Lightweight Directory ActProtocol (LDAP) directory, then requests are sent to the various application support teams to finish user deactivations. A terminated employee recently was able to login to NTO's Salesforce instance 24 hours after termination, even though the user was disabled in the corporate LDAP directory.

What should an identity architect recommend to prevent this from happening in the future?

Options:

A.

Create a Just-in-Time provisioning registration handler to ensure users are deactivated in Salesforce as they are disabled inLDAP.

B.

Configure an authentication provider to delegate authentication to the LDAP directory.

C.

use a login flow to make a callout to the LDAP directory before authenticating the user to Salesforce.

D.

Setup an identity provider (IdP) to authenticate users using LDAP, set up single sign-on to Salesforce and disable Login Form authentication.

Buy Now
Questions 40

Which two statements are capable of Identity Connect? Choose 2 answers

Options:

A.

Synchronization of Salesforce Permission Set Licence Assignments.

B.

Supports both Identity-Provider-Initiated and Service-Provider-Initiated SSO.

C.

Support multiple orgs connecting to multiple Active Directory servers.

D.

Automated user synchronization and de-activation.

Buy Now
Questions 41

Which tool should be used to track login data, such as the average number of logins, who logged in more thanthe average number of times and who logged in during non-business hours?

Options:

A.

Login Inspector

B.

Login History

C.

Login Report

D.

Login Forensics

Buy Now
Questions 42

A leadingfitness tracker company is getting ready to launch a customer community. The company wants its customers to login to the community and connect their fitness device to their profile. Customers should be able to obtain exercise details and fitness recommendation in the community.

Which should be used to satisfy this requirement?

Options:

A.

Named Credentials

B.

Login Flows

C.

OAuth Device Flow

D.

Single Sign-On Settings

Buy Now
Questions 43

Northern Trail Outfitters (NTO) has a requirement to ensure all user logins include a single multi-factor authentication (MFA) prompt. Currently,users are allowed the choice to login with a username and password or via single sign-on against NTO's corporate Identity Provider, which includes built-in MFA.

Which configuration will meet this requirement?

Options:

A.

Create and assign a permission set to all employees that includes "MFA for User Interface Logins."

B.

Create a custom login flow that enforces MFA and assign it to a permission set. Then assign the permission set to all employees.

C.

Enable "MFA for User Interface Logins" for your organization fromSetup -> Identity Verification.

D.

For all employee profiles, set the Session Level Required at Login to High Assurance and add the corporate identity provider to the High Assurance list for the org's Session Security Levels.

Buy Now
Questions 44

Northern Trail Outfitters (NTO) is setting up Salesforce to authenticate users with an external identity provider. The NTO Salesforce Administrator is having trouble getting things setup.

What should an identity architect use to show which part of the login assertion is fading?

Options:

A.

SAML Metadata file importer

B.

Identity Provider Metadata download

C.

Connected App Manager

D.

Security Assertion Markup Language Validator

Buy Now
Questions 45

Universal Containers (UC) has an e-commerce website where customers can buy products, make payments, and manage their accounts. UC decides tobuild a Customer Community on Salesforce and wants to allow the customers to access the community from their accounts without logging in again. UC decides to implement an SP-initiated SSO using a SAML-compliant Idp. In this scenario where Salesforce is theService Provider, which two activities must be performed in Salesforce to make SP-initiated SSO work? Choose 2 answers

Options:

A.

Configure SAML SSO settings.

B.

Create a Connected App.

C.

Configure Delegated Authentication.

D.

Set up My Domain.

Buy Now
Questions 46

Northern Trail Outfitters (NTO) has a number of employees who do NOT need access Salesforce objects. Trie employees should sign in to a custom Benefits web app using their Salesforce credentials.

Which license should the identity architect recommend tofulfill this requirement?

Options:

A.

Identity Only License

B.

External Identity License

C.

Identity Verification Credits Add-on License

D.

Identity Connect License

Buy Now
Questions 47

A global fitness equipment manufacturer uses Salesforce to manage its sales cycle. The manufacturer has a custom order fulfillment app that needs to request order data from Salesforce. The order fulfillment app needs to integrate with the Salesforce API using OAuth 2.0 protocol.

What should an identity architect use to fulfill this requirement?

Options:

A.

Canvas App Integration

B.

OAuth Tokens

C.

Authentication Providers

D.

Connected App and OAuth scopes

Buy Now
Questions 48

Universal Containers (UC) has an Experience Cloud site (Customer Community) where customers can authenticate andplace orders, view the status of orders, etc. UC allows guest checkout.

Mow can a guest register using data previously collected during order placement?

Options:

A.

Enable Security Assertion Markup Language Sign-On and use a login flow to collect only order detailsto retrieve customer data.

B.

Enable Facebook as an authentication provider and use a registration handler to collect only order details to retrieve customer data.

C.

Use a Connected App Handler Apex Plugin class to collect only order details to retrievecustomer data.

D.

Enable self-registration and customize a self-registration page to collect only order details to retrieve customer data.

Buy Now
Questions 49

Universal Containers is considering using Delegated Authentication as the sole means of Authenticating of Salesforce users. A Salesforce Architect has been brought in to assist with the implementation. What two risks Should the Architect point out? Choose 2 answers

Options:

A.

Delegated Authentication is enabled or disabled for the entire Salesforce org.

B.

UC will be required to develop and support a custom SOAP web service.

C.

Salesforce users will be locked out of Salesforce ifthe web service goes down.

D.

The web service must reside on a public cloud service, such as Heroku.

Buy Now
Questions 50

Universal Containers (UC) has a strict requirement to authenticate users to Salesforce using their mainframe credentials. The mainframe user store cannot be accessed from aSAML provider. UC would also like to have users in Salesforce created on the fly if they provide accurate mainframecredentials.

How can the Architect meet these requirements?

Options:

A.

Use a Salesforce Login Flow to call out to a web service and create the user on the fly.

B.

Use the SOAP API to create the user when created on the mainframe; implement Delegated Authentication.

C.

Implement Just-In-Time Provisioning on the mainframe to create the user on the fly.

D.

Implement OAuth User-Agent Flow on the mainframe; use a Registration Handler to create the user on the fly.

Buy Now
Questions 51

Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from withinsalesforce through App launcher and connected App set up? Choose 2 answers

Options:

A.

Google is the identity provider

B.

Salesforce is the identity provider

C.

Google is the service provider

D.

Salesforce is the service provider

Buy Now
Questions 52

universal container plans to develop a custom mobile app for the sales team that will use salesforce for authentication and access management. The mobile app access needs to be restricted to only the sales team. What would be the recommended solution to grant mobile app access to sales users?

Options:

A.

Use a custom attribute on the user object to control access to the mobile app

B.

Use connected apps Oauth policies to restrictmobile app access to authorized users.

C.

Use the permission set license to assign the mobile app permission to sales users

D.

Add a new identity provider to authenticate and authorize mobile users.

Buy Now
Questions 53

An Identity architect works for a multinational, multi-brand organization. As they work with the organization to understand their Customer Identity and Access Management requirements, the identity architect learns that the brand experience is different for each of the customer's sub-brands and each of these branded experiences must be carried through the login experience depending on which sub-brand the user is logging into.

Which solution should the architect recommend to support scalability and reduce maintenance costs, if the organization has more than 150sub-brands?

Options:

A.

Assign each sub-brand a unique Experience ID and use the Experience ID to dynamically brand the login experience.

B.

Use Audiences to customize the login experience for each sub-brand and pass an audience ID to the community during the OAuthand Security Assertion Markup Language (SAML) flows.

C.

Create a community subdomain for each sub-brand and customize the look and feel of the Login page for each community subdomain to match the brand.

D.

Create a separate Salesforce org for each sub-brand so that each sub-brand has complete control over the user experience.

Buy Now
Questions 54

Which two considerations should be made whenimplementing Delegated Authentication?

Choose 2 answers

Options:

A.

The authentication web service can include custom attributes.

B.

It can be used to authenticate API clients and mobile apps.

C.

It requires trusted IP ranges at the User Profile level.

D.

Salesforce servers receive but do not validate a user’s credentials.

E.

Just-in-time Provisioning can be configured for new users.

Buy Now
Questions 55

Refer to the exhibit.

Outfitters (NTO) is using Experience Cloud as an Identity for its application on Heroku. The application on Heroku should be able to handle two brands, Northern Trail Shoes and Northern Trail Shirts.

A user should select either of the two brands in Heroku before logging into the community. The app then performs Authorization using OAuth2.0 with the Salesforce Experience Cloud site.

NTO wants to make sure it renders login page images dynamically based on the user's brand preference selected in Heroku before Authorization.

what should an identity architect do to fulfill the above requirements?

Options:

A.

For each brand create different communities and redirect users to the appropriate community using a custom Login controller written in Apex.

B.

Create multiple login screens using Experience Builder and use Login Flows at runtime to route to different login screens.

C.

Authorize third-party service by sending authorization requests to the community-url/services/oauth2/authorize/cookie_value.

D.

Authorize third-party service by sending authorization requests to the community-url/services/oauth2/authonze/expid_value.

Buy Now
Questions 56

How should an Architect force user to authenticate with Two-factor Authentication (2FA) for Salesforce only when not connected to an internal company network?

Options:

A.

Use Custom Login Flows with Apex to detect the user's IP address and prompt for 2FA if needed.

B.

Add the list of company's network IP addresses to the Login Range list under 2FA Setup.

C.

Use an Apex Trigger on the UserLogin object to detect the user's IP address and prompt for 2FA if needed.

D.

Apply the "Two-factor Authentication for User Interface Logins" permission and Login IP Ranges for all Profiles.

Buy Now
Questions 57

Universal Containers (UC) uses Salesforce as a CRM and identity provider (IdP) for their Sales Team to seamlessly login to intemaJ portals. The IT team at UC is now evaluating Salesforce to act as an IdP for its remaining employees.

Which Salesforce license is required to fulfill this requirement?

Options:

A.

External Identity

B.

IdentityVerification

C.

Identity Connect

D.

Identity Only

Buy Now
Questions 58

Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?

Options:

A.

Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encryptthe payload.

B.

Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.

C.

Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate toencrypt the payload.

D.

Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.

Buy Now
Questions 59

The security team at Universal Containers (UC) has identified exporting reports as a high-riskaction and would like to require users to be logged into Salesforce with their Active Directory (AD) credentials when doing so. For all other users of Salesforce, users should be allowed to use AD Credentials or Salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with Salesforce credentials?

Options:

A.

Use SAML Federated Authentication and block access to reports when accessed through a Standard Assurance session.

B.

Use SAML Federated Authentication and Custom SAML JIT Provisioning to dynamically and or remove a permission set that grants the Export Reports Permission.

C.

Use SAML federated Authentication, treat SAML Sessionsas High Assurance, and raise the session level required for exporting reports.

D.

Use SAML federated Authentication with a Login Flow to dynamically add or remove a Permission Set that grants the Export Reports Permission.

Buy Now
Questions 60

Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO inactivated the user account and needs U perform a forensic analysis and identify signals that could Indicate a breach has occurred.

What should NTO's first step be in gathering signals that could indicate account compromise?

Options:

A.

Review the User record and evaluate the login and transaction history.

B.

Download the Setup Audit Trail and review all recent activities performed by the user.

C.

Download the Identity Provider Event Log and evaluate the details of activities performed by the user.

D.

Download the Login History and evaluate the details of logins performed by the user.

Buy Now
Questions 61

Northern Trail Outfitters (NTO) wants its customers to use phone numbers to log into their new digital portal, which was designed and built using Salesforce Experience Cloud. In order to access the portal, the user will need to do the following:

1. Enter a phone number and/or email address

2. Enter a verification code that is to be sent via email or text.

What is the recommended approach to fulfill this requirement?

Options:

A.

Create a Login Discovery page and provide a Login Discovery Handler Apex class.

B.

Create a custom login page with an Apex controller. The controller has logic to send and verify the identity.

C.

Create an authentication provider and implement a self-registration handler class.

D.

Create a custom login flow that uses an Apex controller to verify the phone numbers with the company's verification service.

Buy Now
Questions 62

ON NO: 126

Universal containers (UC) is successfully using Delegated Authentication for their salesforce users. The service supporting Delegated Authentication is written in Java. UC has a new CIO that is requiring all company Web services be RESR-ful andwritten in. NET. Which two considerations should the UC Architect provide to the new CIO? Choose 2 answers

Options:

A.

Delegated Authentication will not work with a.net service.

B.

Delegated Authentication will continue to work with rest services.

C.

Delegated Authentication will continue to work with a.net service.

D.

Delegated Authentication will not work with rest services.

Buy Now
Questions 63

Universal containers (UC) uses a legacy Employee portal for their employeesto collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides topush ideas posted on the Employee portal to salesforce through API. UC decides to usean API user using Oauth Username - password flow for the connection. How can the connection to salesforce be restricted only to the employee portal server?

Options:

A.

Add the Employee portals IP address to the Trusted IP range for the connected App

B.

Use a digital certificate signed by the employee portal Server.

C.

Add the employee portals IP address to the login IP range on the user profile.

D.

Use a dedicated profile for the user the Employee portal uses.

Buy Now
Questions 64

Universal Containers (UC) is building an integration between Salesforce and a legacy web application using the canvas framework. The security for UC has determined that asigned request from Salesforce is not an adequate authentication solution for the Third-Party app. Which two options should the Architect consider for authenticating the third-party app using the canvas framework? Choose 2 Answers

Options:

A.

Utilize the SAML Single Sign-on flow to allow the third-party to authenticate itself against UC's IdP.

B.

Utilize Authorization Providers to allow the third-party application to authenticate itself against Salesforce as the Idp.

C.

Utilize Canvas OAuth flow to allow the third-party application to authenticate itself against Salesforce as the Idp.

D.

Create a registration handler Apex class to allow the third-party application to authenticate itself against Salesforce as the Idp.

Buy Now
Questions 65

A financial services company uses Salesforce and has a compliance requirement to track information about devices from whichusers log in. Also, a Salesforce Security Administrator needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

Options:

A.

Use multi-factor authentication (MFA) to meet the compliance requirement totrack device information.

B.

Use the Activations feature to meet the compliance requirement to track device information.

C.

Use the Login History object to track information about devices from which users log in.

D.

Use Login Flows to capture device fromwhich users log in and store device and user information in a custom object.

Buy Now
Questions 66

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.

Which action will accomplish this?

Options:

A.

Use a HTTP POST to request the refresh token for the current user.

B.

Use a HTTP POST to the System for Cross-domain Identity Management (SCIM) endpoint, including the current OAuth token.

C.

Use a HTTP POST to make a call to the revoke token endpoint.

D.

Enable Single Logout with a secure logout URL.

Buy Now
Questions 67

Universal Containers (UC) plans to use a SAML-based third-party IdP serving both of the Salesforce Partner Community and the corporate portal. UC partners will log in 65* to the corporate portal to access protected resources, including links to Salesforce resources. What would be the recommended way to configure the IdP so that seamless access can be achieved in this scenario?

Options:

A.

Set up the corporate portal as a ConnectedApp in Salesforce and use the Web server OAuth flow.

B.

Configure SP-initiated SSO that passes the SAML token upon Salesforce resource access request.

C.

Set up the corporate portal as a Connected App in Salesforce and use the User Agent OAuth flow.

D.

Configure IdP-initiated SSO that passes the SAML token upon Salesforce resource access request.

Buy Now
Questions 68

Universal Containers (UC) would like to enable self-registration for their Salesforce Partner Community Users. UC wants to capture some custom data elements from the partner user, and based on these data elements, wants to assign the appropriate Profile and Account values.

Which two actions should the Architect recommend to UC1

Choose 2 answers

Options:

A.

Configure Registration for Communities to use a custom Visualforce Page.

B.

Modify the SelfRegistration trigger to assign Profile and Account.

C.

Modify the CommunitiesSelfRegController to assign the Profile and Account.

D.

Configure Registration for Communitiesto use a custom Apex Controller.

Buy Now
Questions 69

Northern Trail Outfitters (NTO) employees use a customon-premise helpdesk application to request, approve, notify, and track access granted to various on-premises and cloud applications, including Salesforce. Salesforce is currently used to authenticate users.

How should NTO provision Salesforce users as soon as they are approved in the helpdesk application with the approved profiles and permission sets?

Options:

A.

Build an integration that performs a remote call-in to the Salesforce SOAP or REST API.

B.

Use a login flow to query the helpdesk to validate user status.

C.

Have the helpdesk initiate an IdP-initiated Just-m-Time provisioning Security Assertion Markup Language flow.

D.

Use Salesforce Connect to integrate with the helpdesk application.

Buy Now
Questions 70

Universal containers (UC) employees havesalesforce access from restricted ip ranges only, to protect against unauthorized access. UC wants to rollout the salesforce1 mobile app and make it accessible from any location. Which two options should an architect recommend? Choose 2 answers

Options:

A.

Relax the ip restriction in the connect app settings for the salesforce1 mobile app

B.

Use login flow to bypass ip range restriction for the mobile app.

C.

Relax the ip restriction with a second factor in the connect app settings for salesforce1 mobile app

D.

Remove existing restrictions on ip ranges for all types of user access.

Buy Now
Questions 71

Universal Containers (UC) is looking to purchase a third-party applicationas an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose2 answers

Options:

A.

The Identity Provider can authenticate multiple applications.

B.

The Identity Provider can authenticate multiple social media accounts.

C.

The Identity provider can store credentials for multiple applications.

D.

The Identity Provider can centralize enterprise password policy.

Buy Now
Questions 72

Universal Containers (UC) has an existing web application that itwould like to access from Salesforce without requiring users to re-authenticate. The web application is owned UC and the UC team that is responsible for it is willing to add new javascript code and/or libraries to the application. What implementation should an Architect recommend to UC?

Options:

A.

Create a Canvas app and use Signed Requests to authenticate the users.

B.

Rewrite the web application as a set of Visualforce pages and Apex code.

C.

Configure the web application as an item in the Salesforce App Launcher.

D.

Add the web application as a ConnectedApp using OAuth User-Agent flow.

Buy Now
Exam Name: Salesforce Certified Identity andAccess Management Architect (SP25)
Last Update: Jun 12, 2025
Questions: 243

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now Identity-and-Access-Management-Architect testing engine

PDF (Q&A)

$36.75  $104.99
buy now Identity-and-Access-Management-Architect pdf