Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Identity-and-Access-Management-Architect Questions and Answers

Question # 6

A third-party app provider would like to have users provisioned via a service endpoint before users access their app from Salesforce.

What should an identity architect recommend to configure the requirement with limited changes to the third-party app?

A.

Use a connected app with user provisioning flow.

B.

Redirect users to the third-party app for registration.

C.

Create Canvas app in Salesforce for third-party app to provision users.

D.

Use Salesforce Identity with Security Assertion Markup Language (SAML) for provisioning users.

Full Access
Question # 7

An identity architect has built a native mobile application and plans to integrate it with a Salesforce Identity solution. The following are the requirements for the solution:

1. Users should not have to login every time they use the app.

2. The app should be able to make calls to the Salesforce REST API.

3. End users should NOT see the OAuth approval page.

How should the identity architect configure the Salesforce connected app to meet the requirements?

A.

Enable the API Scope and Offline Access Scope on the connected app, and then set the Connected App access settings to " User may self authorize " .

B.

Enable the Full Access Scope and then set the connected app access settings to " Admin Pre-Approved " .

C.

Enable the API Scope and Offline Access Scope on the connected app, and then set the connected app to access settings to " Admin Pre-Approved " .

D.

Enable the API Scope and Offline Access Scope, upload a certificate so JWT Bearer Flow can be used and then set the connected app access settings to " Admin Pre-Approved " .

Full Access
Question # 8

A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token.

Which authentication mechanism should an identity architect recommend to meet the

requirements?

A.

User Agent Flow

B.

OpenID Connect

C.

JWT Bearer Token Flow

D.

Web Server Flow

Full Access
Question # 9

Northern Trail Outfitters (NTO) is using Experience Cloud as an Identity Provider for its application on Heroku. The application on Heroku should be able to handle two brands,

Northern Trail Shoes and Northern Trail Shirts.

A user should select either of the two brands in Heroku before logging into the community. The app then performs Authorization using OAuth2.0 with the Salesforce Experience Cloud site.

NTO wants to make sure it renders login page images dynamically based on the user ' s brand

preference selected in Heroku before Authorization.

What should an identity architect do to fulfill the above requirements?

A.

Create multiple login screens using Experience Builders and use Login Flows at runtime to route to different login screens.

B.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?node=value.

C.

For each brand create different communities and redirect users to the appropriate community using a custom Login controller written in Ages.

D.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?coside_value.

Full Access
Question # 10

Universal Containers (UC) has decided to replace the homegrown customer portal with Salesforce Experience Cloud. UC will continue to use Its third-party single sign-on (SSO) solution that stores all of its customer and partner credentials.

The first time a customer logs in to the Experience Cloud site through SSO, a user record needs to be created automatically.

Which solution should an identity architect recommend in order to automatically provision users in Salesforce upon login?

A.

Third-party AppExchange solution

B.

Custom middleware and web services

C.

Just-in-Time (JIT) provisioning

D.

Custom login flow and Apex handler

Full Access
Question # 11

A farming enterprise offers smart farming technology to its farmer customers, which includes a variety of sensors for livestock tracking, pest monitoring, climate monitoring etc.

They plan to store all the data in Salesforce. They would also like to ensure timely maintenance of the installed sensors. They have engaged a Salesforce Architect to propose an appropriate way to send an alert when something goes wrong.

Which OAuth flow should the architect recommend?

A.

OAuth 2.0 SAML Bearer Assertion Flow

B.

OAuth 2.0 Device Authentication Flow

C.

OAuth 2.0 Asset Token Flow

D.

OAuth 2.0 JWT Bearer Token Flow

Full Access
Question # 12

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before performing any further operation on the portal.

Which approach will meet this requirement?

A.

Create a custom landing page and email campaign asking all community members to login and verify their data.

B.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

C.

Create tasks for users who need to update their data or accept the new community rules.

D.

Create a login flow that conditionally prompts users who have not accepted the new community rules and who have missing or outdated information.

Full Access
Question # 13

Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications. Salesforce users also use Okta to authorize a Forecasting web application to access Salesforce records on their behalf.

Which two roles are being performed by Salesforce?

Choose 2 answers

A.

OAuth Resource Server

B.

SAML Service Provider

C.

OAuth Client

D.

SAML Identity Provider

Full Access
Question # 14

Universal Containers (UC) currently uses Salesforce Sales Cloud and an external billing application. Both Salesforce and the billing application are accessed several times a day to

manage customers. UC would like to configure single sign-on and leverage Salesforce as the identity provider. Additionally, UC would like the billing application to be accessible from

Salesforce. A redirect is acceptable.

Which two Salesforce tools should an identity architect recommend to satisfy the requirements?

Choose 2 answers

A.

Salesforce Canvas

B.

Age Launcher

C.

Identity Connect

D.

Connected Ages

Full Access
Question # 15

Universal Containers wants to allow its customers to log in to its Experience Cloud via a third party authentication provider that supports only the OAuth protocol.

What should an identity architect do to fulfill this requirement?

A.

Contact Salesforce Support and enable delegate single sign-on.

B.

Configure OpenID Connect authentication provider.

C.

Create a custom external authentication provider.

D.

Use certificate-based authentication.

Full Access
Question # 16

The executive sponsor for an organization has asked if Salesforce supports the ability to embed a login widget into its service providers in order to create a more seamless user experience.

What should be used and considered before recommending it as a solution on the Salesforce Platform?

A.

Embedded Login. Identify what level of UI customization will be required to make it match the service providers look and feel.

B.

Salesforce REST APIs. Ensure that Secure Sockets Layer (SSL) connection for the integration is used.

C.

OpenID Connect Web Server Flow. Determine if the service provider is secure enough to store the client secret on.

D.

Embedded Login. Consider whether or not it relies on third party cookies which can cause browser compatibility issues.

Full Access
Question # 17

A division of a Northern Trail Outfitters (NTO) purchased Salesforce. NTO uses a third party identity provider (IdP) to validate user credentials against its corporate Lightweight.

Directory Access Protocol (LDAP) directory. NTO wants to help employees remember as few passwords as possible.

What should an identity architect recommend?

A.

Use Salesforce connect to synchronize LDAP passwords to Salesforce.

B.

Setup Salesforce as an Authentication Provider to the existing IdR.

C.

Setup Salesforce as an IdP to authenticate against the LDAP directory.

D.

Setup Salesforce as a Service Provider to the existing IdP.

Full Access
Question # 18

Universal Containers (UC) is considering a Customer 360 initiative to gain a single source of the truth for its customer data across disparate systems and services. UC wants to understand the primary benefits of Customer 360 Identity and how it contributes to a successful Customer 360 Truth project.

What are two are key benefits of Customer 360 Identity as it relates to Customer 360?

Choose 2 answers

A.

Customer 360 Identity automatically integrates with Customer 360 Data Manager and Customer 360 Audiences to seamlessly populate all user data.

B.

Customer 360 Identity supports multiple brands so you can deliver centralized identity services and correlation of user activity, even if it spans multiple corporate brands and user experiences.

C.

Customer 360 Identity enables an organization to build a simple login for each of its customers, giving the organization an understanding of the user’s login activity across all its digital properties and applications.

D.

Customer 360 Identity not only provides a unified sign up and sign in experience, but also tracks anonymous user activity prior to signing up so organizations can understand user activity before and after the users identify themselves.

Full Access
Question # 19

Universal Containers (UC) is building a custom employee hub application on Amazon Web Services (AWS) and would like to store their users ' credentials there. Users will also need access to Salesforce for internal operations. UC has tasked an identity architect with evaluating different solutions for authentication and authorization between AWS and Salesforce.

How should an identity architect configure AWS to authenticate and authorize Salesforce users?

A.

Create a custom external authentication provider.

B.

Develop a custom Auth server in AWS.

C.

Configure the custom employee app as a connected app.

D.

Configure AWS as an OpenID Connect Provider.

Full Access
Question # 20

A consumer products company uses Salesforce to maintain consumer information, including orders. The company implemented a portal solution using Salesforce Experience Cloud for its consumers where the consumers can log in using their credentials. The company is considering allowing users to login with their Facebook or LinkedIn credentials.

Once enabled, what role will Salesforce play?

A.

Facebook and LinkedIn will be this SPs.

B.

Facebook and LinkedIn will act as the LIPS and SPs.

C.

Salesforce will be the service provider (SP).

D.

Salesforce will be the identity provider (LIP).

Full Access
Question # 21

Universal Containers would like its customers to register and log in to a portal built on

Salesforce Experience Cloud. Customers should be able to use their Facebook or LinkedIn

credentials for ease of use.

Which three steps should an identity architect take to implement social sign-on?

Choose 3 answers

A.

Update the default registration handlers to create and update users.

B.

Enable " Federated Single Sign-On Using SAML " .

C.

Enable " Facebook " and " LinkedIn " under Login Page Setup.

D.

Create authentication providers for both Facebook and LinkedIn.

E.

Register both Facebook and LinkedIn as connected apps.

Full Access
Question # 22

Universal Containers (UC) wants to provide single sign-on (SSO) for a business-to consumer (B2C) application using Salesforce Identity.

Which Salesforce license should UC utilize to implement this use case?

A.

Salesforce Platform

B.

Partner Community

C.

External Identity

D.

Identity Only

Full Access
Question # 23

An identity professional working on a project to integrate a third-party application with Salesforce, is tasked with evaluating OAuth options. The project requires fine-grained access

control and the ability to obtain long-lived access tokens.

Which OAuth flow would best full fill the project requirements?

A.

Client Credentials flow

B.

Authorization Code flow

C.

Implicit flow

D.

Username-password grant

Full Access
Question # 24

A financial services company uses Salesforce and has a compliance requirement to track information about devices from which users log in. Also, a Salesforce Security Administrator

needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

A.

Use multi-factor authentication (MFA) to meet the compliance requirement to track device information.

B.

Use the Login History object to track information about devices from which users log in.

C.

Use Login Flows to capture device from which users log in and store device and user information in a custom object.

D.

Use the Activations feature to meet the compliance requirement to track device information.

Full Access
Question # 25

A real estate company wants to provide its customers a digital space to design their interior decoration options. To simplify the registration to gain access to the community site (built in Experience Cloud), the CTO has requested that the IT/Development team provide the option for customers to use their existing social-media credentials to register and access.

The IT lead has approached the Salesforce Identity and Access Management (IAM) architect

for technical direction on implementing the social sign-on (for Facebook, Twitter, and a new

provider that supports standard OpenID Connect (OIDC)).

Which two recommendations should the Salesforce IAM architect make to the IT Lead?

Choose 2 answers

A.

For supporting OIDC it is necessary to enable Security Assertion Markup Language (SAML) with Just-In-Time provisioning (JIT) and OAuth 2.0.

B.

Authentication provider configuration is required each social sign-on providers; and enable Authentication providers in community.

C.

Apex coding skills are needed for registration handler to create and update users.

D.

Use declarative registration handler process builder/flow to create, update users and contacts.

Full Access
Question # 26

An identity architect has been asked to recommend a solution that allows administrators to configure personalized alert messages to users before they land on the Experience Cloud site (formerly known as Community) homepage.

What is recommended to fulfill this requirement with the least amount of customization?

A.

Customize the registration handler Apex class to create a routing logic navigating to different home pages based on the user profile.

B.

Use Login Flows to add a screen that shows personalized alerts.

C.

Create custom metadata that stores user alerts and use a LWC to display alerts.

D.

Build a Lightning Web Component (LWC) for a homepage that shows custom alerts.

Full Access
Question # 27

A global company ' s Salesforce Identity Architect is reviewing its Salesforce production org login history and is seeing some intermittent Security Assertion Markup Language (SAML SSO) " Replay Detected " and " Assertion Invalid " login errors.

Which two issues would cause these errors?

Choose 2 answers

A.

The certificate loaded into SSO configuration does not match the certificate used by the IdP.

B.

The subject element is missing from the assertion sent to Salesforce.

C.

The current time setting of the company ' s identity provider (IdP) and Salesforce platform

is out of sync by more than eight minutes.

D.

The assertion sent to Salesforce contains an assertion ID previously used.

Full Access
Question # 28

A Salesforce Administrator is tasked with setting up Just-in-Time (JIT) provisioning for SAML to enable Single Sign-On (SSO) for your organization. They have already configured the SAML settings for SSO in Salesforce.

What should be their next steps to enable JIT provisioning?

A.

Enable Just-in-Time User Provisioning in the SAML Single Sign-On Setting, configure the User Provisioning Type, and provide the SAML JIT Handler.

B.

Create a new permission set with JIT provisioning enabled, configure the necessary permissions, and assign the permission set to relevant users.

C.

Create a new Apex class to handle JIT provisioning, implement the required methods, and assign the class to the appropriate user profiles.

D.

Modify the organization-wide sharing settings to allow JIT provisioning, update the sharing rules for the user object.

Full Access
Question # 29

A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for passwordless login.

Which feature should an identity architect recommend to meet the requirements?

A.

Integrate with social websites (Facebook, LinkedIn, Twitter)

B.

Use Login Discovery

C.

Create a custom Lightning Web Component

D.

Use an external Identity Provider

Full Access
Question # 30

Northern Trail Outfitters is implementing a business-to-business (B2B) collaboration site using Salesforce Experience Cloud. The partners will authenticate with an existing identity provider and the solution will utilize Security Assertion Markup Language (SAML) to provide single sign-on to Salesforce. Delegated administration will be used in the Experience Cloud site to allow the partners to administer their users ' access.

How should a partner identity be provisioned in Salesforce for this solution?

A.

Create a user and a related contact.

B.

Create only a contact.

C.

Create a contactless user.

D.

Create a person account.

Full Access
Question # 31

An organization has a central cloud-based Identity and Access Management (IAM) Service

for authentication and user management, which must be utilized by all applications as follows:

1 - Change of a user status in the central IAM Service triggers provisioning or deprovisioning

in the integrated cloud applications.

2 - Security Assertion Markup Language single sign-on (SSO) is used to facilitate access for

users authenticated at identity provider (Central IAM Service).

Which approach should an IAM architect implement on Salesforce Sales Cloud to meet the

requirements?

A.

Configure Salesforce as a SAML service provider, and enable Just-In Time (JIT) provisioning and deprovisioning of users.

B.

Configure central IAM Service as an authentication provider and extend registration handler to manage provisioning and deprovisioning of users.

C.

Configure Salesforce as a SAML Service Provider, and enable SCIM (System for CrossDomain Identity Management) for provisioning and deprovisioning of users.

D.

Deploy Identity Connect component and set up automated provisioning and deprovisioning of users, as well as SAML-based SSO.

Full Access
Question # 32

Universal Containers (UC) rolling out a new Customer Identity and Access Management Solution will be built on top of their existing Salesforce instance. Several service providers have been setup and integrated with Salesforce using OpenID Connect to allow for a seamless single sign-on experience. UC has a requirement to limit users to sign on directly from the Salesforce org to the external Service provider app that accepts OpenID Connect.

Which two steps should be done on the platform to satisfy the requirement?

Choose 2 answers

A.

Manage which connected apps a user has access to by assigning authentication providers to the users profile.

B.

Assign the connected app to the customer community, and enable the users profile in the Community settings.

C.

Set each of the Connected App access settings to Admin Pre-Approved.

D.

Use Profiles and Permission Sets to assign user access to Admin Pre-Approved Connected Apps.

Full Access