Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO inactivated the user account and needs to perform a forensic analysis and identify signals that could indicate a breach has occurred.
What should NTO’s first step be in gathering signals that could indicate account compromise?
Universal Containers (UC) is planning to add Wi-Fi enabled GPS tracking devices to its shipping containers so that the GPS coordinates data can be sent from the tracking device to its Salesforce production org via a custom API. The GPS devices have no direct user input or output capabilities.
Which OAuth flow should the identity architect recommend to meet the requirement?
An identity professional working on a project to integrate a third-party application with Salesforce, is tasked with evaluating OAuth options. The project requires fine-grained access
control and the ability to obtain long-lived access tokens.
Which OAuth flow would best full fill the project requirements?
Northern Trail Outfitters wants to enable single sign-on (SSO) for its Salesforce platform by integrating it with an identity provider (IdP).
Which step should be performed to establish the trust between Salesforce and the identity provider (IdP)?