New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Salesforce Identity-and-Access-Management-Architect - Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)

Universal Containers (UC) is considering a Customer 360 initiative to gain a single source of the truth for its customer data across disparate systems and services. UC wants to understand the primary benefits of Customer 360 Identity and how it contributes ato successful Customer 360 Truth project.

What are two are key benefits of Customer 360 Identity as it relates to Customer 360?

Choose 2answers

A.

Customer 360 Identity automatically integrates with Customer 360 Data Manager and Customer 360 Audiences to seamlessly populate all user data.

B.

Customer 360 Identity enables an organization to build a single login for each ofits customers, giving the organization an understanding of the user's login activity across all its digital properties and applications.

C.

Customer 360 Identity supports multiple brands so you can deliver centralized identity services and correlation ofuser activity,even if it spans multiple corporate brands and user experiences.

D.

Customer 360 Identity not only provides a unified sign up and sign in experience, but also tracks anonymous user activity prior to signing up so organizations can understanduser activity before and after the users identify themselves.

Universal containers (UC) uses an internal company portal for their employees to collaborate. UC decides to use salesforce ideas and provide the ability for employees to post ideas from the company portal. They use SAML-BASED SSO to get into the company portal and would like to leverage it to access salesforce. Most of the users don't exist in salesforce and they would like the user records created in salesforce communities the first time they try to access salesforce. What recommendation should an architect make to meet this requirement?

A.

Use on-the-fly provisioning

B.

Use just-in-time provisioning

C.

Use salesforce APIs to create users on the fly

D.

Use Identity connect to sync users

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Amazon credentials.

What should an identity architect recommend to meet these requirements?

A.

Configure a predefined authentication provider for Amazon.

B.

Create a custom external authentication provider for Amazon.

C.

Configure an OpenID Connect Authentication Provider for Amazon.

D.

Configure Amazon as a connected app.

A large consumer company is planning to create a community and will requ.re login through the customers social identity. The following requirements must be met:

1. The customer should be able to login with any of their social identities, however salesforce should only haveone user per customer.

2. Once the customer has been identified with a social identity, they should not be required to authonze Salesforce.

3. The customers personal details from the social sign on need to be captured when the customer logs intoSalesforce using their social Identity.

3. If the customer modifies their personal details in the social site, the changes should be updated in Salesforce .

Which two options allow the Identity Architect to fulfill the requirements?

Choose 2 answers

A.

UseLogin Flows to call an authentication registration handler to provision the user before logging the user into the community.

B.

Use authentication providers for social sign-on and use the custom registration handler to insert or update personal details.

C.

C. Redirect the user to a custom page that allows the user to select an existing social identity for login.

D.

Use the custom registration handler to link social identities to Salesforce identities.

Universal Containerswants to implement Single Sign-on for a Salesforce org using an external Identity Provider and corporate identity store.

What type of authentication flow is required to support deep linking'

A.

Web Server OAuth SSO flow

B.

Service-Provider-Initiated SSO

C.

C. Identity-Provider-initiated SSO

D.

StartURL on Identity Provider

A consumer products company uses Salesforce to maintain consumer information, including orders. The company implemented a portal solution using SalesforceExperience Cloud for its consumers where the consumers can log in using their credentials. The company is considering allowing users to login with their Facebook or Linkedln credentials.

Once enabled, what role will Salesforce play?

A.

Facebook and Linkedln will be the SPs.

B.

Salesforce will be the service provider (SP).

C.

Salesforce will be the identity provider (IdP).

D.

Facebook and Linkedln will act as the IdPs and SPs.

Northern Trail Outfitters (NTO) utilizesa third-party cloud solution for an employee portal. NTO also owns Salesforce Service Cloud and would like employees to be able to login to Salesforce with their third-party portal credentials for a seamless experience. The third-party employee portal onlysupports OAuth.

What should an identity architect recommend to enable single sign-on (SSO) between the portal and Salesforce?

A.

Configure SSO to use the third-party portal as an identity provider.

B.

Create a custom external authentication provider.

C.

Add the third-party portal as a connected app.

D.

Configure Salesforce for Delegated Authentication.

universal container plans to develop a custom mobile app for the sales team that will use salesforce for authentication and access management. The mobile app access needs to be restricted to only the sales team. What would be the recommended solution to grant mobile app access to sales users?

A.

Use a custom attribute on the user object to control access to the mobile app

B.

Use connected apps Oauth policies to restrictmobile app access to authorized users.

C.

Use the permission set license to assign the mobile app permission to sales users

D.

Add a new identity provider to authenticate and authorize mobile users.

An Architect has configured a SAML-based SSO integration between Salesforce and an external Identity provider and is ready to test it. When the Architect attempts to log in toSalesforce using SSO, the Architect receives a SAML error. Which two optimal actions should the Architect take to troubleshoot the issue?

A.

Ensure the Callback URL is correctly set in the Connected Apps settings.

B.

Use a browser that hasan add-on/extension that can inspect SAML.

C.

Paste the SAML Assertion Validator in Salesforce.

D.

Use the browser's Development tools to view the Salesforce page's markup.

The security team at Universal containers(UC) has identified exporting reports as a high-risk action and would like to require users to be logged into salesforce with their active directory (AD) credentialswhen doing so. For all other uses of Salesforce, Users should be allowed to use AD credentials or salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with salesforce credentials?

A.

Use SAML Federated Authentication and Custom SAML jit provisioning to dynamically add or remove a permission set that grants the Export Reports permission.

B.

Use SAML Federated Authentication, treat SAML sessions as high assurance, and raise the session level required for exporting reports.

C.

Use SAML Federated Authentication and block access to reports when accesses through a standard assurance session.

D.

Use SAML Federated Authentication with a login flow to dynamically add or remove a permission set that grants the export reports permission.