Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Salesforce Identity-and-Access-Management-Architect - Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)

Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wants to allow customers to login using Facebook, Google, and other social sign-on providers.

How should this functionality be enabled for UC, assuming all social sign-on providers support OpenID Connect?

A.

configure a single sign-on setting and a JTT handler for each social sign-on provider.

B.

configure an authentication provider and a Auto-Time Unit handler for each social sign-on provider.

C.

configure an authentication provider and a registration handler for each social sign-on provider.

D.

configure a single sign-on setting and a registration handler for each social sign-on provider.

Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO inactivated the user account and needs to perform a forensic analysis and identify signals that could indicate a breach has occurred.

What should NTO’s first step be in gathering signals that could indicate account compromise?

A.

download the identity provider Event log and contact the details of activities performed by the user.

B.

download the Login history and evaluate the details of topics performed by the user.

C.

download the Setup Audit Trail and review all recent activities performed by the user.

D.

Review the User record and evaluate the login and transaction history.

Universal Containers has multiple Salesforce instances where users receive emails from different instances. Users should be logged into the correct Salesforce instance authenticated by their IdP when clicking on an email link to a Salesforce record.

What should be enabled in Salesforce as a prerequisite?

A.

External Identity

B.

My Domain

C.

Multi-Factor Authentication

D.

Identity Provider

Universal Containers allows employees to use a mobile device to access Salesforce for daily operations using a hybrid mobile app. This app uses Mobile software development kits (SDK), leverages refresh token to regenerate access token when required and is distributed as a private app.

The chief security officer is rolling out an org wide compliance policy to enforce re verification of devices if an employee has not logged in from that device in the last week.

Which connected app setting should be leveraged to comply with this policy change?

A.

Scope - Deny refresh_token scope for this connected app.

B.

Permitted User - Ask admins to maintain a list of users who are permitted based on last login date.

C.

Session Policy - Set timeout value of the connected app to 7 days.

D.

Refresh Token Policy - Expire the refresh token if it has not been used for 7 days.

Universal Containers (UC) is planning to add Wi-Fi enabled GPS tracking devices to its shipping containers so that the GPS coordinates data can be sent from the tracking device to its Salesforce production org via a custom API. The GPS devices have no direct user input or output capabilities.

Which OAuth flow should the identity architect recommend to meet the requirement?

A.

OAuth 2.0 Asset Token Flow for Securing Connected Devices

B.

OAuth 2.0 Web Server Flow for Web App Integration

C.

OAuth 2.0 JWT Bearer Flow for Server-to-Server Integration

D.

OAuth 2.0 Username-Password Flow for Special Scenarios

A leading fitness tracker company is getting ready to launch a customer community. The company wants its customers to login to the community and connect their fitness device to their profile. Customers should be able to obtain exercise details and fitness recommendation in the community.

Which should be used to satisfy this requirement?

A.

Named Credentials

B.

Login Flows

C.

OAuth Device Flow

D.

OAuth Asset Token flow

A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token.

Which authentication mechanism should an identity architect recommend to meet the

requirements?

A.

User Agent Flow

B.

OpenID Connect

C.

JWT Bearer Token Flow

D.

Web Server Flow

An identity architect has built a native mobile application and plans to integrate it with a Salesforce Identity solution. The following are the requirements for the solution:

1. Users should not have to login every time they use the app.

2. The app should be able to make calls to the Salesforce REST API.

3. End users should NOT see the OAuth approval page.

How should the identity architect configure the Salesforce connected app to meet the requirements?

A.

Enable the API Scope and Offline Access Scope on the connected app, and then set the Connected App access settings to " User may self authorize " .

B.

Enable the Full Access Scope and then set the connected app access settings to " Admin Pre-Approved " .

C.

Enable the API Scope and Offline Access Scope on the connected app, and then set the connected app to access settings to " Admin Pre-Approved " .

D.

Enable the API Scope and Offline Access Scope, upload a certificate so JWT Bearer Flow can be used and then set the connected app access settings to " Admin Pre-Approved " .

An organization has a central cloud-based Identity and Access Management (IAM) Service

for authentication and user management, which must be utilized by all applications as follows:

1 - Change of a user status in the central IAM Service triggers provisioning or deprovisioning

in the integrated cloud applications.

2 - Security Assertion Markup Language single sign-on (SSO) is used to facilitate access for

users authenticated at identity provider (Central IAM Service).

Which approach should an IAM architect implement on Salesforce Sales Cloud to meet the

requirements?

A.

Configure Salesforce as a SAML service provider, and enable Just-In Time (JIT) provisioning and deprovisioning of users.

B.

Configure central IAM Service as an authentication provider and extend registration handler to manage provisioning and deprovisioning of users.

C.

Configure Salesforce as a SAML Service Provider, and enable SCIM (System for CrossDomain Identity Management) for provisioning and deprovisioning of users.

D.

Deploy Identity Connect component and set up automated provisioning and deprovisioning of users, as well as SAML-based SSO.

A technology enterprise is planning to implement single sign-on login for users. When users log in to Salesforce, data should be populated in User object custom fields.

Which two steps should an identity architect recommend?

Choose 2 answers

A.

Implement Auth.SamJitHandler Interface.

B.

Implement SessionManagement Class.

C.

Create and update methods.

D.

Implement RegistrationHandler Interface.