Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Identity-and-Access-Management-Architect Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Questions and Answers

Questions 4

A real estate company wants to provide its customers a digital space to design their interior decoration options. To simplify the registration to gain access to the community site (built in Experience Cloud), the CTO has requested that the IT/Development team provide the option for customers to use their existing social-media credentials to register and access.

The IT lead has approached the Salesforce Identity and Access Management (IAM) architect

for technical direction on implementing the social sign-on (for Facebook, Twitter, and a new

provider that supports standard OpenID Connect (OIDC)).

Which two recommendations should the Salesforce IAM architect make to the IT Lead?

Choose 2 answers

Options:

A.

For supporting OIDC it is necessary to enable Security Assertion Markup Language (SAML) with Just-In-Time provisioning (JIT) and OAuth 2.0.

B.

Authentication provider configuration is required each social sign-on providers; and enable Authentication providers in community.

C.

Apex coding skills are needed for registration handler to create and update users.

D.

Use declarative registration handler process builder/flow to create, update users and contacts.

Buy Now
Questions 5

Which two things should be done to ensure end users can only use single sign-on (SSO) to login in to Salesforce?

Choose 2 answers

Options:

A.

Enable My Domain and select " Prevent login from https://login.salesforce.com " .

B.

Request Salesforce Support to enable delegated authentication.

C.

Once SSO is enabled, users are only able to login using Salesforce credentials.

D.

Assign user " Is Single Sign-On Enabled " permission via profile or permission set.

Buy Now
Questions 6

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow. Application users will authenticate using username and password. They should not be forced to approve API access in the mobile app or reauthenticate for 3 months.

Which two connected app options need to be configured to fulfill this use case?

Choose 2 answers

Options:

A.

Set the Sealston Timeout value to 3 months.

B.

Set Permitted Users to " All users may self-authorize " .

C.

Set Permitted Users to " Admin approved users are pre-authorized " .

D.

Set the Refresh Token Policy to expire refresh token after 3 months.

Buy Now
Questions 7

Northern Trail Outfitters wants to enable single sign-on (SSO) for its Salesforce platform by integrating it with an identity provider (IdP).

Which step should be performed to establish the trust between Salesforce and the identity provider (IdP)?

Options:

A.

Setting up a VPN (Virtual Private Network) tunnel between Salesforce and the identity provider for secure communication.

B.

Embedding the identity provider’s authentication code directly into Salesforce source code.

C.

Configuring a trust relationship by exchanging metadata XML files between Salesforce and the IdP.

D.

Creating a custom login page within the Salesforce platform for user authentication.

Buy Now
Questions 8

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Facebook and Twitter credentials.

What should an identity architect recommend to meet these requirements?

Options:

A.

create a custom external authentication provider for Facebook.

B.

obtain login icon for Facebook and Twitter.

C.

configure a predefined authentication provider for Facebook and Twitter.

D.

create a custom external authentication provider for Twitter.

Buy Now
Questions 9

Northern Trail Outfitters want to allow its consumer to self-register on it business-to consumer (B2C) portal that is built on Experience Cloud. The identity architect has recommended to use Person Accounts.

Which three steps need to be configured to enable self-registration using person accounts?

Choose 3 answers

Options:

A.

Enable business accounts in the Setup page.

B.

Enable person accounts in the Setup page.

C.

Under Login and Registration settings, ensure that the default account field is empty.

D.

Enable access to person and business account record types under Public Access Settings.

E.

Set organization-wide default sharing for Contact to Public Read Only.

Buy Now
Questions 10

Northern Trail Outfitters (NTO) has a number of employees who do NOT need access Salesforce objects. The employees should sign in to a custom Benefits web app using their Salesforce credentials.

Which license should the identity architect recommend to fulfill this requirement?

Options:

A.

Identify Only License

B.

Identify Verification Credits Add-On License

C.

External Identity License

D.

Identify Connect License

Buy Now
Questions 11

A client is planning to rollout multi-factor authentication (MFA) to its internal employees and wants to understand which authentication and verification methods meet the Salesforce criteria for secure authentication.

Which three functions meet the Salesforce criteria for secure MFA?

Choose 3 answers

Options:

A.

Username and password = security key

B.

Lightning Login

C.

Username and password = SMS passwords

D.

Third-party single sign-on with Mobile Authenticator app

E.

Username & password = Email Verification Code

Buy Now
Questions 12

Universal Containers (UC) uses Salesforce as a CRM and identity provider (IdP) for their Sales Team to seamlessly login to internal portals.

The IT team at UC is now evaluating Salesforce to act as an IdP for its remaining employees.

Which Salesforce license is required to full fill this requirement?

Options:

A.

Identify Verification

B.

Identify Connect

C.

Identify Only

D.

External Identity

Buy Now
Questions 13

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grants an Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

Options:

A.

4, 1, 5, 2, 3

B.

4, 5, 2, 3, 1

C.

1, 4, 5, 2, 3

D.

2, 1, 3, 4, 5

Buy Now
Questions 14

An insurance company has a connected app in its Salesforce environment that is used to integrate with a Google Workspace (formerly known as G Suite).

An identity and access management (ZAM) architect has been asked to implement automation to enable users, freeze/suspend users, disable users, and reactivate existing users in Google Workspace upon similar actions in Salesforce.

Which solution is recommended to meet this requirement?

Options:

A.

Build a custom REST endpoint in Salesforce that Google Workspace can pull against.

B.

Build an Asset Trigger on the UserLogin object to make asynchronous callouts to Google APIs.

C.

configure Users Provisioning for Connected Apps.

D.

Update the Security Attention Hadoop Language Just-In-Time (SJAR, LTT) handler in Salesforce for user provisioning and de-provisioning.

Buy Now
Questions 15

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

Options:

A.

Leverage OpenID Connect Token Introspection.

B.

Query using OpenID Connect discovery endpoint.

C.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

D.

Create a custom OAuth scope.

Buy Now
Questions 16

An Identity architect works for a multinational, multi-brand organization. As they work with the organization to understand their Customer Identity and Access Management requirements, the identity architect learns that the brand experience is different for each of the customer’s sub-brands and each of these branded experiences must be carried through the login experience depending on which sub-brand the user is logging into.

Which solution should the architect recommend to support scalability and reduce maintenance costs, if the organization has more than 150 sub-brands?

Options:

A.

Create a community subdomain for each sub-brand and customize the look and feel of the Login page for each community subdomain to match the brand.

B.

Assign each sub-brand a unique Experience ID and use the Experience ID to dynamically brand the login experience.

C.

Create a separate Salesforce org for each sub-brand so that each sub-brand has complete control over the user experience.

D.

Use Audiences to customize the login experience for each sub-brand and pass an audience ID to the community during the DAuth and Security Assertion Markup Language (SANL) flows.

Buy Now
Questions 17

A financial enterprise is planning to set up a user authentication mechanism to login to the Salesforce system. Due to regulatory requirements, the CIO of the company wants user administration, including passwords and authentication requests, to be managed by an external system that is only accessible via a SOAP webservice.

Which authentication mechanism should an identity architect recommend to meet the requirements?

Options:

A.

Just-in-Time Provisioning

B.

Delegated Authentication

C.

Security Assertion Markup Language (SANL) Single Sign On

D.

OAuth Web-Server Flow

Buy Now
Questions 18

Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wants to allow customers to login using Facebook, Google, and other social sign-on providers.

How should this functionality be enabled for UC, assuming all social sign-on providers support OpenID Connect?

Options:

A.

configure a single sign-on setting and a JTT handler for each social sign-on provider.

B.

configure an authentication provider and a Auto-Time Unit handler for each social sign-on provider.

C.

configure an authentication provider and a registration handler for each social sign-on provider.

D.

configure a single sign-on setting and a registration handler for each social sign-on provider.

Buy Now
Questions 19

Northern Trail Outfitters has implemented OAuth 2.0 for its single sign-on (SSO) solution, allowing users to authenticate and access Salesforce resources using external identity providers. However, some users are reporting intermittent logouts when trying to access Salesforce through SSO.

What can be a potential point of failure that should be considered during troubleshooting?

Options:

A.

Expiration or revocation of the access token issued by the identity provider.

B.

Misconfiguration of the user’s device, such as an outdated web browser or disabled JavaScript.

C.

Delays in the network routing between the user’s location and the Salesforce servers.

D.

Insufficient user permissions in Salesforce causing access issues.

Buy Now
Questions 20

A Salesforce customer is implementing Sales Cloud and a custom pricing application for its call center agents. An Enterprise single sign-on solution is used to authenticate and sign-in users to all applications. The customer has the following requirements:

1. The development team has decided to use a Canvas app to expose the pricing application to agents.

2. Agents should be able to access the Canvas app without needing to log in to the pricing application.

Which two options should the identity architect consider to provide support for the Canvas app to initiate login for users?

Choose 2 answers

Options:

A.

Configure the Canvas app as a connected app and set Admin-approved users as pre authorized.

B.

Select " Enable as a Canvas Personal App " in the connected app settings.

C.

Enable OAuth settings in the connected app with required OAuth scopes for the pricing application.

D.

Enable SAML in the connected app and Security Assertion Markup Language (SAML) Initiation Method as Service Provider Initiated.

Buy Now
Questions 21

A security architect is rolling out a new multi-factor authentication (MFA) mandate, where all employees must go through a secure authentication process before accessing Salesforce. There are multiple Identity Providers (IdP) in place and the architect is considering how the " Authentication Method Reference " ” field (AMR) in the Login History can help.

Which two considerations should the architect keep in mind?

Choose 2 answers

Options:

A.

Both OIDC and Security Assertion Markup Language (SAML) are supported but AMR must be implemented at IdP.

B.

High-assurance sessions must be configured under Session Security Level Policies.

C.

AMR field shows the authentication methods used at IdP.

D.

Dependency on what is supported by OpenID Connect (OIDC) implementation at IdP.

Buy Now
Questions 22

Northern Trail Outfitters (NTO) is planning to build a new customer service portal and wants to use passwordless login, allowing customers to login with a one-time passcode sent to them via email or SMS.

How should the quantity of required Identity Verification Credits be estimated?

Options:

A.

Identity Verification Credits are consumed with each verification sent and should be estimated based on the number of logins that will incur a verification challenge.

B.

Each community comes with 10,000 Identity Verification Credits per month and only customers with more than 10,000 logins a month should estimate additional SMS verifications needed.

C.

Identity Verification Credits are consumed with each SMS (best message) sent and should be estimated based on the number of login verification challenges for SMS verification users.

D.

Identity Verification Credits are a direct add-on license based on the number of existing member-based or login-based Community licenses.

Buy Now
Questions 23

Universal Containers (UC) has an Experience Cloud site (Customer Community) where customers can authenticate and place orders, view the status of orders, etc. UC allows guest checkout.

How can a guest register using data previously collected during order placement?

Options:

A.

Enable self-registration and customize a self-registration page to collect only order details to retrieve customer data.

B.

Enable Security Assertion Markup Language (SAML) Sign-On and use a login flow to collect only order details to retrieve customer data.

C.

Enable Facebook as an authentication provider and use a registration handler to collect only order details to retrieve customer data.

D.

Use a Connected App Handler. Apex Plugin class to collect only order details to retrieve customer data.

Buy Now
Questions 24

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the QAuth 2.0 user-agent flow (this flow uses the QAuth 2.0 implicit grant type).

Which three QAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Refresh Token

B.

Client ID

C.

Verification Code

D.

Authorization Code

E.

Scopus

Buy Now
Questions 25

A service provider (SP) supports both Security Assertion Narkup Language (SAML) and OpenID Connect (OIDC).

When Salesforce is acting as Identity Provider for this SP, which use case is the determining factor when choosing OIDC or SAML?

Options:

A.

OIDC is more secure than SAML and therefore is the obvious choice.

B.

the SP needs to perform our calls back to Salesforce on behalf of the user after the user logs in to the service provider.

C.

They are equivalent protocols and there is no real reason to choose one over the other.

D.

If the user has a session on Salesforce, you do not want them to be promoted for a username and password when they login to the SP.

Buy Now
Questions 26

Universal Containers is building a web application that will connect with the Salesforce API using JWT OAuth Flow.

Which two settings need to be configured in the connect app to support this requirement?

Choose 2 answers

Options:

A.

The Use Digital Signature option in the connected app.

B.

The " web " OAuth scope in the connected app.

C.

The " api " OAuth scope in the connected app.

D.

The " eclair_api " OAuth scope in the connected app.

Buy Now
Questions 27

Universal Containers would like its customers to register and log in to a portal built on

Salesforce Experience Cloud. Customers should be able to use their Facebook or LinkedIn

credentials for ease of use.

Which three steps should an identity architect take to implement social sign-on?

Choose 3 answers

Options:

A.

Update the default registration handlers to create and update users.

B.

Enable " Federated Single Sign-On Using SAML " .

C.

Enable " Facebook " and " LinkedIn " under Login Page Setup.

D.

Create authentication providers for both Facebook and LinkedIn.

E.

Register both Facebook and LinkedIn as connected apps.

Buy Now
Questions 28

An identity professional working on a project to integrate a third-party application with Salesforce, is tasked with evaluating OAuth options. The project requires fine-grained access

control and the ability to obtain long-lived access tokens.

Which OAuth flow would best full fill the project requirements?

Options:

A.

Client Credentials flow

B.

Authorization Code flow

C.

Implicit flow

D.

Username-password grant

Buy Now
Questions 29

Northern Trail Outfitters (NTO) is setting up Salesforce to authenticate users with an external identity provider. The NTO Salesforce Administrator is having trouble getting things setup.

What should an identity architect use to show which part of the login assertion is failing?

Options:

A.

Security Assertion Markup Language Validator

B.

Connected App Manager

C.

SAML Metadata file importer

D.

Identity Provider Metadata download

Buy Now
Questions 30

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type). Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Scopes

B.

Client ID

C.

Authorization Code

D.

Verification Code

E.

Refresh Token

Buy Now
Questions 31

Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO inactivated the user account and needs to perform a forensic analysis and identify signals that could indicate a breach has occurred.

What should NTO’s first step be in gathering signals that could indicate account compromise?

Options:

A.

download the identity provider Event log and contact the details of activities performed by the user.

B.

download the Login history and evaluate the details of topics performed by the user.

C.

download the Setup Audit Trail and review all recent activities performed by the user.

D.

Review the User record and evaluate the login and transaction history.

Buy Now
Questions 32

A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for passwordless login.

Which feature should an identity architect recommend to meet the requirements?

Options:

A.

Integrate with social websites (Facebook, LinkedIn, Twitter)

B.

Use Login Discovery

C.

Create a custom Lightning Web Component

D.

Use an external Identity Provider

Buy Now
Exam Name: Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)
Last Update: Apr 30, 2026
Questions: 109

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now Identity-and-Access-Management-Architect testing engine

PDF (Q&A)

$43.57  $124.49
buy now Identity-and-Access-Management-Architect pdf