Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Salesforce Identity-and-Access-Management-Architect Dumps Questions Answers

Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Questions and Answers

Question 1

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type). Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Scopes

B.

Client ID

C.

Authorization Code

D.

Verification Code

E.

Refresh Token

Buy Now
Question 2

Universal Containers is creating a web application that will be secured by Salesforce Identity using the OAuth 2.0 Web Server Flow (this flow uses the OAuth 2.0 authorization code grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Verification URL

B.

Authentication Token

C.

Scopes

D.

Access Token

E.

Client Secret

Question 3

Universal Containers (UC) has built a custom time tracking app for its employees on a third party system. UC wants to leverage Salesforce Identity to control access to the custom app.

At a minimum, which Salesforce license is required to support this requirement?

Options:

A.

Identity Only

B.

D External Identity

C.

Identity Connect

D.

Identity Verification

Question 4

An organization has a central cloud-based Identity and Access Management (IAM) Service

for authentication and user management, which must be utilized by all applications as follows:

1 - Change of a user status in the central IAM Service triggers provisioning or deprovisioning

in the integrated cloud applications.

2 - Security Assertion Markup Language single sign-on (SSO) is used to facilitate access for

users authenticated at identity provider (Central IAM Service).

Which approach should an IAM architect implement on Salesforce Sales Cloud to meet the

requirements?

Options:

A.

Configure Salesforce as a SAML service provider, and enable Just-In Time (JIT) provisioning and deprovisioning of users.

B.

Configure central IAM Service as an authentication provider and extend registration handler to manage provisioning and deprovisioning of users.

C.

Configure Salesforce as a SAML Service Provider, and enable SCIM (System for CrossDomain Identity Management) for provisioning and deprovisioning of users.

D.

Deploy Identity Connect component and set up automated provisioning and deprovisioning of users, as well as SAML-based SSO.

Question 5

Universal Containers has multiple Salesforce instances where users receive emails from different instances. Users should be logged into the correct Salesforce instance authenticated by their IdP when clicking on an email link to a Salesforce record.

What should be enabled in Salesforce as a prerequisite?

Options:

A.

External Identity

B.

My Domain

C.

Multi-Factor Authentication

D.

Identity Provider

Question 6

A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities.

Which Salesforce OAuth authorization flow should be used?

Options:

A.

OAuth 2.0 User-Agent

B.

OAuth 2.0 Asset Token Flow

C.

OAuth 2.0 WiT Bearer Flow

D.

OAuth 2.0 Device Flow

Question 7

A service provider (SP) supports both Security Assertion Narkup Language (SAML) and OpenID Connect (OIDC).

When Salesforce is acting as Identity Provider for this SP, which use case is the determining factor when choosing OIDC or SAML?

Options:

A.

OIDC is more secure than SAML and therefore is the obvious choice.

B.

the SP needs to perform our calls back to Salesforce on behalf of the user after the user logs in to the service provider.

C.

They are equivalent protocols and there is no real reason to choose one over the other.

D.

If the user has a session on Salesforce, you do not want them to be promoted for a username and password when they login to the SP.

Question 8

Northern Trail Outfitters recently acquired a company. Each company will retain its Identity Provider (IdP). Both companies rely extensively on Salesforce processes that send emails to users to take specific actions in Salesforce.

How should the combined companys ' employees collaborate in a single Salesforce org, yet authenticate to the appropriate IdP?

Options:

A.

Configure unique MyDomains for each company and have generated links use the appropriate MyDomain in the URL.

B.

Have generated links append a quenystring parameter indicating the IdP. The login service will redirect to the appropriate IdP.

C.

Enable each IdP as a login option in the My Domain Authentication Service settings. Users will then click on the appropriate IdP button.

D.

Have generated links be prefixed with the appropriate IdP URL to invoke an idP-initiated Security Assertion Markup Language flow when clicked.

Question 9

Universal Containers (UC) currently uses Salesforce Sales Cloud and an external billing application. Both Salesforce and the billing application are accessed several times a day to

manage customers. UC would like to configure single sign-on and leverage Salesforce as the identity provider. Additionally, UC would like the billing application to be accessible from

Salesforce. A redirect is acceptable.

Which two Salesforce tools should an identity architect recommend to satisfy the requirements?

Choose 2 answers

Options:

A.

Salesforce Canvas

B.

Age Launcher

C.

Identity Connect

D.

Connected Ages

Question 10

When designing a multi-branded Customer Identity and Access Management solution on the Salesforce Platform, how should an identity architect ensure a specific brand experience in Salesforce is presented?

Options:

A.

The Experience ID, which can be included in OAuth/Open ID flows and Security Assertion

Markup Language (SAML) flows as a URL parameter.

B.

The Audience ID, which can be set in a shared cookie.

C.

Add a custom parameter to the service provider’s OAuth/SAML call and implement logic on its login page to apply branding based on the parameters value.

D.

Provide a brand picker that the end user can use to select its sub-brand when they arrive on Salesforce.

Question 11

Universal Containers uses Salesforce as an identity provider and Concur as the Employee Expense management system. The HR director wants to ensure Concur accounts for employees are created only after the appropriate approval in the Salesforce org.

Which three steps should the identity architect use to implement this requirement?

Choose 3 answers

Options:

A.

Create an approval process for User object associated with the provisioning flow.

B.

Create an approval process for a custom object associated with the provisioning flow.

C.

Create an approval process for UserProviderRequests object associated with the provisioning flow.

D.

Enable User Provisioning for the connected app.

E.

Create a connected app for Concur in Salesforce.

Question 12

Northern Trail Outfitters (NTO) has a number of employees who do NOT need access Salesforce objects. The employees should sign in to a custom Benefits web app using their Salesforce credentials.

Which license should the identity architect recommend to fulfill this requirement?

Options:

A.

Identify Only License

B.

Identify Verification Credits Add-On License

C.

External Identity License

D.

Identify Connect License

Question 13

A leading fitness tracker company is getting ready to launch a customer community. The company wants its customers to login to the community and connect their fitness device to their profile. Customers should be able to obtain exercise details and fitness recommendation in the community.

Which should be used to satisfy this requirement?

Options:

A.

Named Credentials

B.

Login Flows

C.

OAuth Device Flow

D.

OAuth Asset Token flow

Question 14

Northern Trail Outfitters has implemented OAuth 2.0 for its single sign-on (SSO) solution, allowing users to authenticate and access Salesforce resources using external identity providers. However, some users are reporting intermittent logouts when trying to access Salesforce through SSO.

What can be a potential point of failure that should be considered during troubleshooting?

Options:

A.

Expiration or revocation of the access token issued by the identity provider.

B.

Misconfiguration of the user’s device, such as an outdated web browser or disabled JavaScript.

C.

Delays in the network routing between the user’s location and the Salesforce servers.

D.

Insufficient user permissions in Salesforce causing access issues.

Question 15

A multinational industrial products manufacturer is planning to implement Salesforce CRM to manage their business. They have the following requirements:

1. They plan to implement Partner communities to provide access to their partner network.

2. They have operations in multiple countries and are planning to implement multiple Salesforce orgs.

3. Some of their partners do business in multiple countries and will need information from multiple Salesforce communities.

4. They would like to provide a single login for their partners.

How should an Identity Architect solution this requirement with limited custom development?

Options:

A.

Create a partner login for the country of their operation and use SAML federation to provide access to other orgs.

B.

Register partners in one org and access information from other orgs using APIs.

C.

Allow partners to choose the Salesforce org they need information from and use login flows to authenticate access.

D.

Consolidate Partner related information in a single org and provide access through Salesforce community.

Question 16

Universal Containers (UC) is using its production org as the identity provider for a new Experience Cloud site and the identity architect is deciding which login experience to use for the site.

Which two page types are valid login page types for the site?

Choose 2 answers

Options:

A.

Login Discovery Page

B.

Experience Builder Page

C.

Embedded Login Page

D.

Lightning Experience Page

Question 17

Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO inactivated the user account and needs to perform a forensic analysis and identify signals that could indicate a breach has occurred.

What should NTO’s first step be in gathering signals that could indicate account compromise?

Options:

A.

download the identity provider Event log and contact the details of activities performed by the user.

B.

download the Login history and evaluate the details of topics performed by the user.

C.

download the Setup Audit Trail and review all recent activities performed by the user.

D.

Review the User record and evaluate the login and transaction history.

Question 18

Universal Containers (UC) is planning to add Wi-Fi enabled GPS tracking devices to its shipping containers so that the GPS coordinates data can be sent from the tracking device to its Salesforce production org via a custom API. The GPS devices have no direct user input or output capabilities.

Which OAuth flow should the identity architect recommend to meet the requirement?

Options:

A.

OAuth 2.0 Asset Token Flow for Securing Connected Devices

B.

OAuth 2.0 Web Server Flow for Web App Integration

C.

OAuth 2.0 JWT Bearer Flow for Server-to-Server Integration

D.

OAuth 2.0 Username-Password Flow for Special Scenarios

Question 19

An identity professional working on a project to integrate a third-party application with Salesforce, is tasked with evaluating OAuth options. The project requires fine-grained access

control and the ability to obtain long-lived access tokens.

Which OAuth flow would best full fill the project requirements?

Options:

A.

Client Credentials flow

B.

Authorization Code flow

C.

Implicit flow

D.

Username-password grant

Question 20

Northern Trail Outfitters wants to enable single sign-on (SSO) for its Salesforce platform by integrating it with an identity provider (IdP).

Which step should be performed to establish the trust between Salesforce and the identity provider (IdP)?

Options:

A.

Setting up a VPN (Virtual Private Network) tunnel between Salesforce and the identity provider for secure communication.

B.

Embedding the identity provider’s authentication code directly into Salesforce source code.

C.

Configuring a trust relationship by exchanging metadata XML files between Salesforce and the IdP.

D.

Creating a custom login page within the Salesforce platform for user authentication.

Question 21

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow. Application users will authenticate using username and password. They should not be forced to approve API access in the mobile app or reauthenticate for 3 months.

Which two connected app options need to be configured to fulfill this use case?

Choose 2 answers

Options:

A.

Set the Sealston Timeout value to 3 months.

B.

Set Permitted Users to " All users may self-authorize " .

C.

Set Permitted Users to " Admin approved users are pre-authorized " .

D.

Set the Refresh Token Policy to expire refresh token after 3 months.

Question 22

Northern Trail Outfitters (NTO) has an existing business-to-consumer (B2C) website that does NOT support single sign-on standards, such as Security Assertion Markup Language (SAML) or OAuth. NTO wants to use Salesforce Identity to register and authenticate new customers on the website.

Which three Salesforce features should an Identity architect use in order to provide social sign-in capabilities for the website?

Choose 3 answers

Options:

A.

Connected Apps

B.

Authentication Providers

C.

Delegated Authentication

D.

Embedded Login

E.

Identity Connect

Question 23

A multinational company is looking to rollout Salesforce globally. The company has a Microsoft Active Directory Federation Services (ADFS) implementation for the Americas, Europe and APAC. The company plans to have a single org and they would like to have all of its users access Salesforce using the ADFS. The company would like to limit its investments and prefer not to procure additional applications to satisfy the requirements.

What is recommended to ensure these requirements are met?

Options:

A.

Implement Identity Connect to provide single sign-on to Salesforce and federated across multiple ADFS systems.

B.

Configure Each ADFS system under single sign-on settings and allow users to choose the system to authenticate during sign on to Salesforce.

C.

Add a central identity system that facilitates between the ADFS systems and integrate with Salesforce for single sign-on.

D.

Use connected apps for each ADFS implementation and implement Salesforce site to authenticate users across the ADFS system applicable to their geo.

Question 24

Universal Containers (UC) uses Salesforce as a CRM and identity provider (IdP) for their Sales Team to seamlessly login to internal portals.

The IT team at UC is now evaluating Salesforce to act as an IdP for its remaining employees.

Which Salesforce license is required to full fill this requirement?

Options:

A.

Identify Verification

B.

Identify Connect

C.

Identify Only

D.

External Identity

Question 25

Northern Trail Outfitters is implementing a business-to-business (B2B) collaboration site using Salesforce Experience Cloud. The partners will authenticate with an existing identity provider and the solution will utilize Security Assertion Markup Language (SAML) to provide single sign-on to Salesforce. Delegated administration will be used in the Experience Cloud site to allow the partners to administer their users ' access.

How should a partner identity be provisioned in Salesforce for this solution?

Options:

A.

Create a user and a related contact.

B.

Create only a contact.

C.

Create a contactless user.

D.

Create a person account.

Question 26

A technology enterprise is planning to implement single sign-on login for users. When users log in to Salesforce, data should be populated in User object custom fields.

Which two steps should an identity architect recommend?

Choose 2 answers

Options:

A.

Implement Auth.SamJitHandler Interface.

B.

Implement SessionManagement Class.

C.

Create and update methods.

D.

Implement RegistrationHandler Interface.

Question 27

A global fitness equipment manufacturer uses Salesforce to manage its sales cycle. The manufacturer has a custom order fulfillment app that needs to request order data from

Salesforce. The order fulfillment app needs to integrate with the Salesforce API using OAuth 2.0 protocol.

What should an identity architect use to fulfill this requirement?

Options:

A.

OAuth Token

B.

Genre Age Integration

C.

Authentication Providers

D.

Connected App and OAuth Scopes

Question 28

Universal Containers (UC) has an Experience Cloud site (Customer Community) where customers can authenticate and place orders, view the status of orders, etc. UC allows guest checkout.

How can a guest register using data previously collected during order placement?

Options:

A.

Enable self-registration and customize a self-registration page to collect only order details to retrieve customer data.

B.

Enable Security Assertion Markup Language (SAML) Sign-On and use a login flow to collect only order details to retrieve customer data.

C.

Enable Facebook as an authentication provider and use a registration handler to collect only order details to retrieve customer data.

D.

Use a Connected App Handler. Apex Plugin class to collect only order details to retrieve customer data.

Question 29

A client is planning to rollout multi-factor authentication (MFA) to its internal employees and wants to understand which authentication and verification methods meet the Salesforce criteria for secure authentication.

Which three functions meet the Salesforce criteria for secure MFA?

Choose 3 answers

Options:

A.

Username and password = security key

B.

Lightning Login

C.

Username and password = SMS passwords

D.

Third-party single sign-on with Mobile Authenticator app

E.

Username & password = Email Verification Code

Question 30

A Salesforce Administrator is tasked with setting up Just-in-Time (JIT) provisioning for SAML to enable Single Sign-On (SSO) for your organization. They have already configured the SAML settings for SSO in Salesforce.

What should be their next steps to enable JIT provisioning?

Options:

A.

Enable Just-in-Time User Provisioning in the SAML Single Sign-On Setting, configure the User Provisioning Type, and provide the SAML JIT Handler.

B.

Create a new permission set with JIT provisioning enabled, configure the necessary permissions, and assign the permission set to relevant users.

C.

Create a new Apex class to handle JIT provisioning, implement the required methods, and assign the class to the appropriate user profiles.

D.

Modify the organization-wide sharing settings to allow JIT provisioning, update the sharing rules for the user object.

Question 31

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before performing any further operation on the portal.

Which approach will meet this requirement?

Options:

A.

Create a custom landing page and email campaign asking all community members to login and verify their data.

B.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

C.

Create tasks for users who need to update their data or accept the new community rules.

D.

Create a login flow that conditionally prompts users who have not accepted the new community rules and who have missing or outdated information.

Question 32

The CMO of an advertising company has invited an Identity and Access Management (IAM) specialist to discuss Salesforce out-of-box capabilities for configuring the company ' s login and registration experience on Salesforce Experience Cloud.

The CMO is looking to brand the login page with the company ' s logo, background color, login button color, and dynamic right-frame from an external URL.

Which two solutions should the IAM specialist recommend?

Choose 2 answers:

Options:

A.

Login & Registration pages can be branded in the Community Administration settings.

B.

Build custom site pages for reset and forget password features.

C.

Build custom pages for handling requirements as Experienced Cloud.

D.

Use Experience Builder to build branded Reset and Forget Password pages.