Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Salesforce Identity-and-Access-Management-Architect Dumps

Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Questions and Answers

Question 1

Universal Containers (UC) has an Experience Cloud site (Customer Community) where customers can authenticate and place orders, view the status of orders, etc. UC allows guest checkout.

How can a guest register using data previously collected during order placement?

Options:

A.

Enable self-registration and customize a self-registration page to collect only order details to retrieve customer data.

B.

Enable Security Assertion Markup Language (SAML) Sign-On and use a login flow to collect only order details to retrieve customer data.

C.

Enable Facebook as an authentication provider and use a registration handler to collect only order details to retrieve customer data.

D.

Use a Connected App Handler. Apex Plugin class to collect only order details to retrieve customer data.

Question 2

A client is planning to rollout multi-factor authentication (MFA) to its internal employees and wants to understand which authentication and verification methods meet the Salesforce criteria for secure authentication.

Which three functions meet the Salesforce criteria for secure MFA?

Choose 3 answers

Options:

A.

Username and password = security key

B.

Lightning Login

C.

Username and password = SMS passwords

D.

Third-party single sign-on with Mobile Authenticator app

E.

Username & password = Email Verification Code

Question 3

A global fitness equipment manufacturer is planning to sell fitness tracking devices and has the following requirements:

1) Customer purchases the device.

2) Customer registers the device using their mobile app.

3) A case should automatically be created in Salesforce and associated with the customers

account in cases where the device registers issues with tracking.

Which OAuth flow should be used to meet these requirements?

Options:

A.

OAuth 2.0 User-Agent Flow

B.

OAuth 2.0 Asset Token Flow

C.

OAuth 2.0 Device Flow

D.

OAuth 2.0 SAVL Server Assertion Flow

Question 4

A financial enterprise is planning to set up a user authentication mechanism to login to the Salesforce system. Due to regulatory requirements, the CIO of the company wants user administration, including passwords and authentication requests, to be managed by an external system that is only accessible via a SOAP webservice.

Which authentication mechanism should an identity architect recommend to meet the requirements?

Options:

A.

Just-in-Time Provisioning

B.

Delegated Authentication

C.

Security Assertion Markup Language (SANL) Single Sign On

D.

OAuth Web-Server Flow

Question 5

Universal Containers (UC) currently uses Salesforce Sales Cloud and an external billing application. Both Salesforce and the billing application are accessed several times a day to

manage customers. UC would like to configure single sign-on and leverage Salesforce as the identity provider. Additionally, UC would like the billing application to be accessible from

Salesforce. A redirect is acceptable.

Which two Salesforce tools should an identity architect recommend to satisfy the requirements?

Choose 2 answers

Options:

A.

Salesforce Canvas

B.

Age Launcher

C.

Identity Connect

D.

Connected Ages

Question 6

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

Options:

A.

Leverage OpenID Connect Token Introspection.

B.

Query using OpenID Connect discovery endpoint.

C.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

D.

Create a custom OAuth scope.

Question 7

Universal Containers (UC) rolling out a new Customer Identity and Access Management Solution will be built on top of their existing Salesforce instance. Several service providers have been setup and integrated with Salesforce using OpenID Connect to allow for a seamless single sign-on experience. UC has a requirement to limit users to sign on directly from the Salesforce org to the external Service provider app that accepts OpenID Connect.

Which two steps should be done on the platform to satisfy the requirement?

Choose 2 answers

Options:

A.

Manage which connected apps a user has access to by assigning authentication providers to the users profile.

B.

Assign the connected app to the customer community, and enable the users profile in the Community settings.

C.

Set each of the Connected App access settings to Admin Pre-Approved.

D.

Use Profiles and Permission Sets to assign user access to Admin Pre-Approved Connected Apps.

Question 8

Universal Containers (UC) wants to provide single sign-on (SSO) for a business-to consumer (B2C) application using Salesforce Identity.

Which Salesforce license should UC utilize to implement this use case?

Options:

A.

Salesforce Platform

B.

Partner Community

C.

External Identity

D.

Identity Only

Question 9

Universal Containers is implementing Salesforce Identity to broker authentication from its enterprise single sign-on (550) solution through Salesforce to third party applications using SAML.

What role does Salesforce Identity play in its relationship with the enterprise S50 system?

Options:

A.

Service Provider {SP)

B.

Identity Provider [IdP)

C.

Resource Server

D.

Client Application

Question 10

A multinational company is looking to rollout Salesforce globally. The company has a Microsoft Active Directory Federation Services (ADFS) implementation for the Americas, Europe and APAC. The company plans to have a single org and they would like to have all of its users access Salesforce using the ADFS. The company would like to limit its investments and prefer not to procure additional applications to satisfy the requirements.

What is recommended to ensure these requirements are met?

Options:

A.

Implement Identity Connect to provide single sign-on to Salesforce and federated across multiple ADFS systems.

B.

Configure Each ADFS system under single sign-on settings and allow users to choose the system to authenticate during sign on to Salesforce.

C.

Add a central identity system that facilitates between the ADFS systems and integrate with Salesforce for single sign-on.

D.

Use connected apps for each ADFS implementation and implement Salesforce site to authenticate users across the ADFS system applicable to their geo.

Question 11

Northern Trail Outfitters (NTO) is planning to roll out a partner portal for its distributors using Experience Cloud. NTO would like to use an external identity provider (IdP) and for partners to register for access to the portal. Each partner should be allowed to register only once to avoid duplicate accounts with Salesforce.

What should a identity architect recomend to create partners?

Options:

A.

Create a custom page in Experience Cloud to self register partner with Experience Cloud and Ping Identity store.

B.

On successful creation of Partners using Self Registration page in Experience Cloud, create Identity in Ping.

C.

Create a custom web page in the Portal and create users in the IdP and Experience Cloud

using published APIs.

D.

Allow partners to register through the IdP and create partner users in Salesforce through an API.

Question 12

Northern Trail Outfitters (NTO) is setting up Salesforce to authenticate users with an external identity provider. The NTO Salesforce Administrator is having trouble getting things setup.

What should an identity architect use to show which part of the login assertion is failing?

Options:

A.

Security Assertion Markup Language Validator

B.

Connected App Manager

C.

SAML Metadata file importer

D.

Identity Provider Metadata download

Question 13

An identity professional, responsible for ensuring secure access to the Salesforce platform, needs to audit and verify user activity during and after login. They want to monitor login attempts, track user authentication methods, and identify suspicious behavior or unauthorized access.

Which tool or feature should they leverage to achieve this objective?

Options:

A.

Customer Account Processes

B.

Salesforce Login History

C.

Salesforce Skield

D.

Salesforce Lightning Flow

Question 14

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type). Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Scopes

B.

Client ID

C.

Authorization Code

D.

Verification Code

E.

Refresh Token

Question 15

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before performing any further operation on the portal.

Which approach will meet this requirement?

Options:

A.

Create a custom landing page and email campaign asking all community members to login and verify their data.

B.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

C.

Create tasks for users who need to update their data or accept the new community rules.

D.

Create a login flow that conditionally prompts users who have not accepted the new community rules and who have missing or outdated information.

Question 16

An Enterprise is using a Lightweight Directory Access Protocol (LDAP) server as the only point for user authentication with a username/password. Salesforce leverages delegated authentication to integrate with the LDAP.

How can end users change their password?

Options:

A.

Users can change it on the enterprise LDAP authentication portal.

B.

Users can click on the " Forgot your Password " link on the Salesforce.com login page.

C.

Users can request the Salesforce Admin to reset their password.

D.

Users once logged in, can go to the Change Password screen in Salesforce.

Question 17

Northern Trail Outfitters (NTO) is launching a new sportswear brand on its existing consumer portal built on Salesforce Experience Cloud. As part of the launch, emails with promotional links will be sent to existing customers to log in and claim a discount. The marketing manager would like the portal dynamically branded so that users will be directed to the brand link they clicked on; otherwise, users will view a recognizable NTO-branded page.

The campaign is launching quickly, so there is no time to procure any additional licenses.

However, the development team is available to apply any required changes to the portal.

Which approach should the identity architect recommend?

Options:

A.

Create a full audience to replicate the portal and set up these the branding accordingly.

B.

Use tutorials to build the new brand site and embedded login for some identities.

C.

Configure an additional community site on the same way that is dedicated for the new brand.

D.

Implement Experiences ID in the code and extend the URLs and endpoints, as required.

Question 18

Universal Containers has multiple Salesforce instances where users receive emails from different instances. Users should be logged into the correct Salesforce instance authenticated by their IdP when clicking on an email link to a Salesforce record.

What should be enabled in Salesforce as a prerequisite?

Options:

A.

External Identity

B.

My Domain

C.

Multi-Factor Authentication

D.

Identity Provider

Question 19

Northern Trail Outfitters (NTO) wants its customers to use phone numbers to log in to their new digital portal, which was designed and built using Salesforce Experience Cloud. In order to access the portal, the user will need to do the following:

1. Enter a phone number and/or email address

2. Enter a verification code that is to be sent via email or text.

What is the recommended approach to fulfill this requirement?

Options:

A.

create an authentication provider and implement a self-registration handler class.

B.

Create a custom login page with an Apex controller. The controller has tips to send and verify the identity.

C.

create a Login Discoverer page and provide a Login Discovery Handler Apex class.

D.

Create a custom login flow that uses an Apex controller to verify the phone numbers with the company’s verification service.

Question 20

Universal Containers (UC) is considering a Customer 360 initiative to gain a single source of the truth for its customer data across disparate systems and services. UC wants to understand the primary benefits of Customer 360 Identity and how it contributes to a successful Customer 360 Truth project.

What are two are key benefits of Customer 360 Identity as it relates to Customer 360?

Choose 2 answers

Options:

A.

Customer 360 Identity automatically integrates with Customer 360 Data Manager and Customer 360 Audiences to seamlessly populate all user data.

B.

Customer 360 Identity supports multiple brands so you can deliver centralized identity services and correlation of user activity, even if it spans multiple corporate brands and user experiences.

C.

Customer 360 Identity enables an organization to build a simple login for each of its customers, giving the organization an understanding of the user’s login activity across all its digital properties and applications.

D.

Customer 360 Identity not only provides a unified sign up and sign in experience, but also tracks anonymous user activity prior to signing up so organizations can understand user activity before and after the users identify themselves.

Question 21

Northern Trail Outfitters (NTO) is using Experience Cloud as an Identity Provider for its application on Heroku. The application on Heroku should be able to handle two brands,

Northern Trail Shoes and Northern Trail Shirts.

A user should select either of the two brands in Heroku before logging into the community. The app then performs Authorization using OAuth2.0 with the Salesforce Experience Cloud site.

NTO wants to make sure it renders login page images dynamically based on the user ' s brand

preference selected in Heroku before Authorization.

What should an identity architect do to fulfill the above requirements?

Options:

A.

Create multiple login screens using Experience Builders and use Login Flows at runtime to route to different login screens.

B.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?node=value.

C.

For each brand create different communities and redirect users to the appropriate community using a custom Login controller written in Ages.

D.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?coside_value.

Question 22

Universal Containers wants to secure its Salesforce APIs by using an existing Security Assertion Markup Language (SAML) configuration that supports the company ' s single signon process to Salesforce.

Which Salesforce OAuth authorization flow should be used?

Options:

A.

OAuth 2.0 JWT Bearer Flow

B.

OAuth 2.0 SAML Bearer Assertion Flow

C.

OAuth 2.0 User-Agent Flow

D.

SAML Assertion Flow

Question 23

Northern Trail Outfitters (NTO) uses the Customer 360 Platform implemented on Salesforce Experience Cloud. The development team in charge has learned of a contact lessuser feature, which can reduce the overhead of managing customers and partners by creating users without contact information.

What is the potential impact to the architecture if NTO decides to implement this feature?

Options:

A.

Custom registration handler is needed to correctly assign External Identity or Community license for the newly registered contactless user.

B.

If contactless user is upgraded to Community license, the contact record is automatically created and linked to the user record, but not associated with an Account.

C.

Contactless user feature is available only with the External Identity license, which can restrict the Experience Cloud functionality available to the user.

D.

Passivordless authentication can not be supported because the mobile phone receiving one-time password (OTP) needs to match the number on the contact record.

Question 24

Northern Trail Outfitters wants to enable single sign-on (SSO) for its Salesforce platform by integrating it with an identity provider (IdP).

Which step should be performed to establish the trust between Salesforce and the identity provider (IdP)?

Options:

A.

Setting up a VPN (Virtual Private Network) tunnel between Salesforce and the identity provider for secure communication.

B.

Embedding the identity provider’s authentication code directly into Salesforce source code.

C.

Configuring a trust relationship by exchanging metadata XML files between Salesforce and the IdP.

D.

Creating a custom login page within the Salesforce platform for user authentication.

Question 25

A third-party app provider would like to have users provisioned via a service endpoint before users access their app from Salesforce.

What should an identity architect recommend to configure the requirement with limited changes to the third-party app?

Options:

A.

Use a connected app with user provisioning flow.

B.

Redirect users to the third-party app for registration.

C.

Create Canvas app in Salesforce for third-party app to provision users.

D.

Use Salesforce Identity with Security Assertion Markup Language (SAML) for provisioning users.

Question 26

Universal Containers wants to allow its customers to log in to its Experience Cloud via a third party authentication provider that supports only the OAuth protocol.

What should an identity architect do to fulfill this requirement?

Options:

A.

Contact Salesforce Support and enable delegate single sign-on.

B.

Configure OpenID Connect authentication provider.

C.

Create a custom external authentication provider.

D.

Use certificate-based authentication.

Question 27

A division of a Northern Trail Outfitters (NTO) purchased Salesforce. NTO uses a third party identity provider (IdP) to validate user credentials against its corporate Lightweight.

Directory Access Protocol (LDAP) directory. NTO wants to help employees remember as few passwords as possible.

What should an identity architect recommend?

Options:

A.

Use Salesforce connect to synchronize LDAP passwords to Salesforce.

B.

Setup Salesforce as an Authentication Provider to the existing IdR.

C.

Setup Salesforce as an IdP to authenticate against the LDAP directory.

D.

Setup Salesforce as a Service Provider to the existing IdP.

Question 28

Northern Trail Outfitters has implemented OAuth 2.0 for its single sign-on (SSO) solution, allowing users to authenticate and access Salesforce resources using external identity providers. However, some users are reporting intermittent logouts when trying to access Salesforce through SSO.

What can be a potential point of failure that should be considered during troubleshooting?

Options:

A.

Expiration or revocation of the access token issued by the identity provider.

B.

Misconfiguration of the user’s device, such as an outdated web browser or disabled JavaScript.

C.

Delays in the network routing between the user’s location and the Salesforce servers.

D.

Insufficient user permissions in Salesforce causing access issues.

Question 29

A technology enterprise is planning to implement single sign-on login for users. When users log in to Salesforce, data should be populated in User object custom fields.

Which two steps should an identity architect recommend?

Choose 2 answers

Options:

A.

Implement Registration/Handle Interface.

B.

Implement SessionManagement Class.

C.

Implement Auth.SumIDHandler Interface.

D.

Create and update methods.

Question 30

Universal Containers uses Salesforce as an identity provider and Concur as the Employee Expense management system. The HR director wants to ensure Concur accounts for employees are created only after the appropriate approval in the Salesforce org.

Which three steps should the identity architect use to implement this requirement?

Choose 3 answers

Options:

A.

Create an approval process for User object associated with the provisioning flow.

B.

Create an approval process for a custom object associated with the provisioning flow.

C.

Create an approval process for UserProviderRequests object associated with the provisioning flow.

D.

Enable User Provisioning for the connected app.

E.

Create a connected app for Concur in Salesforce.

Question 31

Universal Containers is building a web application that will connect with the Salesforce API using JWT OAuth Flow.

Which two settings need to be configured in the connect app to support this requirement?

Choose 2 answers

Options:

A.

The Use Digital Signature option in the connected app.

B.

The " web " OAuth scope in the connected app.

C.

The " api " OAuth scope in the connected app.

D.

The " eclair_api " OAuth scope in the connected app.

Question 32

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Amazon credentials.

What should an identity architect recommend to meet these requirements?

Options:

A.

Create a custom external authentication provider for Amazon.

B.

Configure Amazon as & connected app.

C.

Configure an OpenlD Connect Authentication Provider for Amazon.

D.

Configure a predefined authentication provider for Amazon.

Page: 1 / 11
Total 109 questions