Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Universal Containers (UC) uses Salesforce as a CRM and identity provider (IdP) for their Sales Team to seamlessly login to internal portals.

The IT team at UC is now evaluating Salesforce to act as an IdP for its remaining employees.

Which Salesforce license is required to full fill this requirement?

A.

Identify Verification

B.

Identify Connect

C.

Identify Only

D.

External Identity

An identity professional working on a project to integrate a third-party application with Salesforce, is tasked with evaluating OAuth options. The project requires fine-grained access

control and the ability to obtain long-lived access tokens.

Which OAuth flow would best full fill the project requirements?

A.

Client Credentials flow

B.

Authorization Code flow

C.

Implicit flow

D.

Username-password grant

An Identity and Access Management (IAM) architect is tasked with unifying multiple B2C Commerce sites and an Experience Cloud community with a single identity. The solution needs to support more than 1,000 logins per minute.

What should the IAM Architect do to fulfill this requirement?

A.

Create a default account for capturing all ecommerce contacts registered on the community because personAccount is not supported for this case.

B.

Confirm performance considerations with Salesforce Customer Support due to high peaks.

C.

Configure community as a Security Assertion Markup Language (SAML) identity provider and enable Just-In-Time Provisioning to B2C Commerce.

D.

Configure both the community and the commerce sites as OAuth2 RPs (relying party) with an external identity provider.

Universal Containers (UC) is building a custom employee hub application on Amazon Web Services (AWS) and would like to store their users ' credentials there. Users will also need access to Salesforce for internal operations. UC has tasked an identity architect with evaluating different solutions for authentication and authorization between AWS and Salesforce.

How should an identity architect configure AWS to authenticate and authorize Salesforce users?

A.

Create a custom external authentication provider.

B.

Develop a custom Auth server in AWS.

C.

Configure the custom employee app as a connected app.

D.

Configure AWS as an OpenID Connect Provider.

An administrator created a connected app for a custom web application in Salesforce which needs to be visible as a tile in App Launcher. The tile for the custom web application is missing in the app launcher for all users in Salesforce. The administrator requested assistance from an identity architect to resolve the issue.

Which two reasons are the source of the issue?

Choose 2 answers

A.

Session Policy is set as “High Assurance Session required” for this connected app.

B.

The connected app is not set in the App menu as “Visible in App Launcher”.

C.

Statutes, for the connected app is not set in Connected App settings.

D.

Obtain scope does not include “openid”.

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grants an Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

A.

4, 1, 5, 2, 3

B.

4, 5, 2, 3, 1

C.

1, 4, 5, 2, 3

D.

2, 1, 3, 4, 5

A real estate company wants to provide its customers a digital space to design their interior decoration options. To simplify the registration to gain access to the community site (built in Experience Cloud), the CTO has requested that the IT/Development team provide the option for customers to use their existing social-media credentials to register and access.

The IT lead has approached the Salesforce Identity and Access Management (IAM) architect

for technical direction on implementing the social sign-on (for Facebook, Twitter, and a new

provider that supports standard OpenID Connect (OIDC)).

Which two recommendations should the Salesforce IAM architect make to the IT Lead?

Choose 2 answers

A.

For supporting OIDC it is necessary to enable Security Assertion Markup Language (SAML) with Just-In-Time provisioning (JIT) and OAuth 2.0.

B.

Authentication provider configuration is required each social sign-on providers; and enable Authentication providers in community.

C.

Apex coding skills are needed for registration handler to create and update users.

D.

Use declarative registration handler process builder/flow to create, update users and contacts.

A company ' s external application is protected by Salesforce through OAuth. The identity architect for the project needs to limit the level of access to the data of the protected resource in a flexible way.

What should be done to improve security?

A.

Select " Admin approved users are pre-authorized " and assign specific profiles.

B.

Create custom scopes and assign to the connected app.

C.

Leverage external objects and data classification policies.

D.

Define a permission set that grants access to the app and assign to authorized users.

A global company is using the Salesforce Platform as an Identity Provider and needs to integrate a third-party application with its Experience Cloud customer portal.

Which two features should be utilized to provide users with login and identity services for the third-party application?

Choose 2 answers

A.

Use the App Launcher with single sign-on (SSO).

B.

Use Delegated Authentication.

C.

Use a connected app.

D.

External a Data source with Named Principal identity type.

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

A.

Leverage OpenID Connect Token Introspection.

B.

Query using OpenID Connect discovery endpoint.

C.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

D.

Create a custom OAuth scope.