Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the QAuth 2.0 user-agent flow (this flow uses the QAuth 2.0 implicit grant type).

Which three QAuth concepts apply to this flow?

Choose 3 answers

A.

Refresh Token

B.

Client ID

C.

Verification Code

D.

Authorization Code

E.

Scopus

A financial services company uses Salesforce and has a compliance requirement to track information about devices from which users log in. Also, a Salesforce Security Administrator

needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

A.

Use multi-factor authentication (MFA) to meet the compliance requirement to track device information.

B.

Use the Login History object to track information about devices from which users log in.

C.

Use Login Flows to capture device from which users log in and store device and user information in a custom object.

D.

Use the Activations feature to meet the compliance requirement to track device information.

An organization has a central cloud-based Identity and Access Management (IAM) Service

for authentication and user management, which must be utilized by all applications as follows:

1 - Change of a user status in the central IAM Service triggers provisioning or deprovisioning

in the integrated cloud applications.

2 - Security Assertion Markup Language single sign-on (SSO) is used to facilitate access for

users authenticated at identity provider (Central IAM Service).

Which approach should an IAM architect implement on Salesforce Sales Cloud to meet the

requirements?

A.

Configure Salesforce as a SAML service provider, and enable Just-In Time (JIT) provisioning and deprovisioning of users.

B.

Configure central IAM Service as an authentication provider and extend registration handler to manage provisioning and deprovisioning of users.

C.

Configure Salesforce as a SAML Service Provider, and enable SCIM (System for CrossDomain Identity Management) for provisioning and deprovisioning of users.

D.

Deploy Identity Connect component and set up automated provisioning and deprovisioning of users, as well as SAML-based SSO.

An Identity architect works for a multinational, multi-brand organization. As they work with the organization to understand their Customer Identity and Access Management requirements, the identity architect learns that the brand experience is different for each of the customer’s sub-brands and each of these branded experiences must be carried through the login experience depending on which sub-brand the user is logging into.

Which solution should the architect recommend to support scalability and reduce maintenance costs, if the organization has more than 150 sub-brands?

A.

Create a community subdomain for each sub-brand and customize the look and feel of the Login page for each community subdomain to match the brand.

B.

Assign each sub-brand a unique Experience ID and use the Experience ID to dynamically brand the login experience.

C.

Create a separate Salesforce org for each sub-brand so that each sub-brand has complete control over the user experience.

D.

Use Audiences to customize the login experience for each sub-brand and pass an audience ID to the community during the DAuth and Security Assertion Markup Language (SANL) flows.

Northern Trail Outfitters manages application functional permissions centrally as Active Directory groups. The CRM_SuperUser and CRM_Reporting_SuperUser groups should respectively give the user the SuperUser and Reporting_SuperUser permission set in Salesforce. Salesforce is the service provider to a Security Assertion Markup Language (SAML) identity provider.

How should an identity architect ensure the Active Directory groups are reflected correctly

when a user accesses Salesforce?

A.

Use the Apex Just-in-Time handler to query custom SAML attributes and set permission sets.

B.

Use a login flow to query standard SAML attributes and set permission sets.

C.

Use a login flow to query custom SAML attributes and set permission sets.

D.

Use the Apex Just-in-Time handler to query standard SAML attributes and set permission sets.

Northern Trail Outfitters (NTO) is using Experience Cloud as an Identity Provider for its application on Heroku. The application on Heroku should be able to handle two brands,

Northern Trail Shoes and Northern Trail Shirts.

A user should select either of the two brands in Heroku before logging into the community. The app then performs Authorization using OAuth2.0 with the Salesforce Experience Cloud site.

NTO wants to make sure it renders login page images dynamically based on the user ' s brand

preference selected in Heroku before Authorization.

What should an identity architect do to fulfill the above requirements?

A.

Create multiple login screens using Experience Builders and use Login Flows at runtime to route to different login screens.

B.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?node=value.

C.

For each brand create different communities and redirect users to the appropriate community using a custom Login controller written in Ages.

D.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?coside_value.

Universal Containers is building a web application that will connect with the Salesforce API using JWT OAuth Flow.

Which two settings need to be configured in the connect app to support this requirement?

Choose 2 answers

A.

The Use Digital Signature option in the connected app.

B.

The " web " OAuth scope in the connected app.

C.

The " api " OAuth scope in the connected app.

D.

The " eclair_api " OAuth scope in the connected app.

A financial enterprise is planning to set up a user authentication mechanism to login to the Salesforce system. Due to regulatory requirements, the CIO of the company wants user administration, including passwords and authentication requests, to be managed by an external system that is only accessible via a SOAP webservice.

Which authentication mechanism should an identity architect recommend to meet the requirements?

A.

Just-in-Time Provisioning

B.

Delegated Authentication

C.

Security Assertion Markup Language (SANL) Single Sign On

D.

OAuth Web-Server Flow

A farming enterprise offers smart farming technology to its farmer customers, which includes a variety of sensors for livestock tracking, pest monitoring, climate monitoring etc.

They plan to store all the data in Salesforce. They would also like to ensure timely maintenance of the installed sensors. They have engaged a Salesforce Architect to propose an appropriate way to send an alert when something goes wrong.

Which OAuth flow should the architect recommend?

A.

OAuth 2.0 SAML Bearer Assertion Flow

B.

OAuth 2.0 Device Authentication Flow

C.

OAuth 2.0 Asset Token Flow

D.

OAuth 2.0 JWT Bearer Token Flow

Universal Containers want users to be able to log in to the Salesforce mobile app with their Active Directory password. Employees are unable to use mobile VPN.

Which two options should an identity architect recommend to meet the requirement?

Choose 2 answers

A.

Active Directory Password Since Plugin

B.

Salesforce Identity Connect

C.

Salesforce Trigger & Field on Contact Object

D.

Configure Cloud Provider Load Balancer