New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Identity-and-Access-Management-Architect Exam Dumps - Salesforce Identity and Access Management Designer Questions and Answers

Question # 14

An administrator created a connected app for a custom wet) application in Salesforce which needs to be visible as a tile in App Launcher The tile for the custom web application is missing in the app launcher for all users in Salesforce. The administrator requested assistance from an identity architect to resolve the issue.

Which two reasons are the source of the issue?

Choose 2 answers

Options:

A.

StartURL for the connected app is not set in Connected App settings.

B.

OAuth scope does not include "openid*.

C.

Session Policy is set as 'High Assurance Session required' for this connected app.

D.

The connected app is not set in the App menu as 'Visible in App Launcher".

Buy Now
Question # 15

Which two considerations should be made whenimplementing Delegated Authentication?

Choose 2 answers

Options:

A.

The authentication web service can include custom attributes.

B.

It can be used to authenticate API clients and mobile apps.

C.

It requires trusted IP ranges at the User Profile level.

D.

Salesforce servers receive but do not validate a user’s credentials.

E.

Just-in-time Provisioning can be configured for new users.

Buy Now
Question # 16

Universal containers (UC) uses a legacy Employee portal for their employeesto collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides topush ideas posted on the Employee portal to salesforce through API. UC decides to usean API user using Oauth Username - password flow for the connection. How can the connection to salesforce be restricted only to the employee portal server?

Options:

A.

Add the Employee portals IP address to the Trusted IP range for the connected App

B.

Use a digital certificate signed by the employee portal Server.

C.

Add the employee portals IP address to the login IP range on the user profile.

D.

Use a dedicated profile for the user the Employee portal uses.

Buy Now
Question # 17

Universal Containers (UC) is building an authenticated Customer Community for its customers. UC does not want customer credentialsstored in Salesforce and is confident its customers would be willing to use their social media credentials to authenticate to the community. Which two actions should an Architect recommend UC to take?

Options:

A.

Use Delegated Authentication to call the Twitter login API to authenticate users.

B.

Configure an Authentication Provider for LinkedIn Social Media Accounts.

C.

Create a Custom Apex Registration Handler to handle new and existing users.

D.

Configure SSO Settings For Facebook to serve as a SAML Identity Provider.

Buy Now
Question # 18

ON NO: 12

A group of users try to access one of Universal Containers' Connected Apps and receive the following error message: " Failed: Not approved for access." What is the most likely cause of this issue?

Options:

A.

The Connected App settings "All users mayself-authorize" is enabled.

B.

The Salesforce Administrators have revoked the OAuth authorization.

C.

The Users do not have the correct permission set assigned to them.

D.

The User of High Assurance sessions are required for the Connected App.

Buy Now
Question # 19

How should an identity architect automate provisioning and deprovisioning of users into Salesforce from an external system?

Options:

A.

Call SOAP API upsertQ on user object.

B.

Use Security Assertion Markup Language Just-in-Time (SAML JIT) on incoming SAML assertions.

C.

Run registration handler on incoming OAuth responses.

D.

Call OpenID Connect (OIDC)-userinfo endpoint with a valid access token.

Buy Now
Question # 20

Universal containers(UC) has decided to build a new, highly sensitive application on Force.com platform. The security team at UC has decided that they want users toprovide a fingerprint in addition to username/Password to authenticate to this application.How can an architect support fingerprint as a form of identification for salesforce Authentication?

Options:

A.

Use salesforce Two-factor Authentication with callouts to a third-party fingerprint scanning application.

B.

Use Delegated Authentication with callouts to a third-party fingerprint scanning application.

C.

Use an AppExchange product that does fingerprint scanning with native salesforce identity confirmation.

D.

Use custom login flows with callouts to a third-party fingerprint scanning application.

Buy Now
Question # 21

A company wantsto provide its employees with a custom mobile app that accesses Salesforce. Users are required to download the internal native IOS mobile app from corporate intranet on their mobile device. The app allows flexibility to access other non-Salesforce internalapplications once users authenticate with Salesforce. The apps self-authorize, and users are permitted to use the apps once they have logged into Salesforce.

How should an identity architect meet the above requirements with the privately distributed mobile app?

Options:

A.

Use connected app with OAuth and Security Assertion Markup Language (SAML) to access other non-Salesforce internal apps.

B.

Configure Mobile App settings in connected app and Salesforce as identity provider for non-Salesforce internal apps.

C.

Use Salesforce as an identity provider (IdP) to access the mobile app and use the external IdP for other non-Salesforce internal apps.

D.

Create a new hybrid mobile app and use the connected app with OAuth to authenticate users for Salesforce and non-Salesforce internal apps.

Buy Now
Question # 22

A leadingfitness tracker company is getting ready to launch a customer community. The company wants its customers to login to the community and connect their fitness device to their profile. Customers should be able to obtain exercise details and fitness recommendation in the community.

Which should be used to satisfy this requirement?

Options:

A.

Named Credentials

B.

Login Flows

C.

OAuth Device Flow

D.

Single Sign-On Settings

Buy Now
Question # 23

Which two things should be done to ensure end users can only use single sign-on (SSO) to login in to Salesforce?

Choose 2 answers

Options:

A.

Enable My Domain and select "Prevent login from https://login.salesforce.com ".

B.

Request Salesforce Support to enable delegated authentication.

C.

Once SSO is enabled, users are only able to login using Salesforce credentials.

D.

Assign user "is Single Sign-on Enabled" permission via profile or permission set.

Buy Now
Exam Name: Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)
Last Update: Dec 19, 2025
Questions: 243
Identity-and-Access-Management-Architect pdf

Identity-and-Access-Management-Architect PDF

$25.5  $84.99
Identity-and-Access-Management-Architect Engine

Identity-and-Access-Management-Architect Testing Engine

$28.5  $94.99
Identity-and-Access-Management-Architect PDF + Engine

Identity-and-Access-Management-Architect PDF + Testing Engine

$40.5  $134.99