Identity-and-Access-Management-Architect Exam Questions

Total 255 Questions


Last Updated On : 15-Apr-2025



Preparing with Identity-and-Access-Management-Architect practice test is essential to ensure success on the exam. This Salesforce test allows you to familiarize yourself with the Identity-and-Access-Management-Architect exam questions format and identify your strengths and weaknesses. By practicing thoroughly, you can maximize your chances of passing the Salesforce certification exam on your first attempt.

Universal Containers (UC) implemented SSO to a third-party system for their Salesforce users to access the App Launcher. UC enabled “User Provisioning” on the Connected App so that changes to user accounts can be synched between Salesforce and the third-party system. However, UC quickly notices that changes to user roles in Salesforce are not getting synched to the third-party system. What is the most likely reason for this behavior?


A. User Provisioning for Connected Apps does not support role sync.


B. Required operation(s) was not mapped in User Provisioning Settings.


C. The Approval queue for User Provisioning Requests is unmonitored.


D. Salesforce roles have more than three levels in the role hierarchy.





B.
  Required operation(s) was not mapped in User Provisioning Settings.

A company wants to provide its employees with a custom mobile app that accesses Salesforce. Users are required to download the internal native IOS mobile app from corporate intranet on their mobile device. The app allows flexibility to access other non- Salesforce internal applications once users authenticate with Salesforce. The apps self- authorize, and users are permitted to use the apps once they have logged into Salesforce.
How should an identity architect meet the above requirements with the privately distributed mobile app?


A. Use connected app with OAuth and Security Assertion Markup Language (SAML) to access other non-Salesforce internal apps.


B. Configure Mobile App settings in connected app and Salesforce as identity provider for non-Salesforce internal apps.


C. Use Salesforce as an identity provider (IdP) to access the mobile app and use the external IdP for other non-Salesforce internal apps.


D. Create a new hybrid mobile app and use the connected app with OAuth to authenticate users for Salesforce and non-Salesforce internal apps.





B.
  Configure Mobile App settings in connected app and Salesforce as identity provider for non-Salesforce internal apps.

Explanation: Configuring Mobile App settings in connected app and Salesforce as identity provider for non-Salesforce internal apps is the best way to meet the requirements with the privately distributed mobile app. The Mobile App settings allow users to download the app from a private URL and use it with Salesforce credentials. The identity provider settings allow users to access other internal apps with SSO using Salesforce as the IdP. The other options are either not feasible or not optimal for this use case. References: Mobile App Settings, Single Sign-On for Desktop and Mobile Applications using SAML and OAuth

A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities. Which Salesforce OAuth authorization flow should be used?


A. OAuth 2.0 JWT Bearer How


B. OAuth 2.0 Device Flow


C. OAuth 2.0 User-Agent Flow


D. OAuth 2.0 Asset Token Flow





B.
  OAuth 2.0 Device Flow

Explanation: The OAuth 2.0 Device Flow is a type of authorization flow that allows users to register an IoT device with limited display input or capabilities, such as a smart TV, a printer, or a smart speaker1. The device flow works as follows1:
The device displays or reads out a verification code and a verification URL to the user.
The user visits the verification URL on another device, such as a smartphone or a laptop, and enters the verification code.
The user logs in to Salesforce and approves the device.
The device polls Salesforce for an access token using the verification code. Salesforce returns an access token to the device, which can then access Salesforce APIs.

Universal containers (UC) would like to enable SSO between their existing Active Directory infrastructure and salesforce. The it team prefers to manage all users in Active Directory and would like to avoid doing any initial setup of users in salesforce directly, including the correct assignment of profiles, roles and groups. Which two optimal solutions should UC use to provision users in salesforce? Choose 2 answers


A. Use the salesforce REST API to sync users from active directory to salesforce


B. Use an app exchange product to sync users from Active Directory to salesforce.


C. Use Active Directory Federation Services to sync users from active directory to salesforce.


D. Use Identity connect to sync users from Active Directory to salesforce





B.
  Use an app exchange product to sync users from Active Directory to salesforce.

D.
  Use Identity connect to sync users from Active Directory to salesforce

Containers (UC) has implemented SAML-based single Sign-on for their Salesforce application and is planning to provide access to Salesforce on mobile devices using the Salesforce1 mobile app. UC wants to ensure that Single Sign-on is used for accessing the Salesforce1 mobile App. Which two recommendations should the Architect make? Choose 2 Answers


A. Configure the Embedded Web Browser to use My Domain URL.


B. Configure the Salesforce1 App to use the MY Domain URL.


C. Use the existing SAML-SSO flow along with User Agent Flow.


D. Use the existing SAML SSO flow along with Web Server Flow.





B.
  Configure the Salesforce1 App to use the MY Domain URL.

C.
  Use the existing SAML-SSO flow along with User Agent Flow.

Universal Containers (UC) has decided to use Salesforce as an Identity Provider for multiple external applications. UC wants to use the salesforce App Launcher to control the Apps that are available to individual users. Which three steps are required to make this happen?


A. Add each connected App to the App Launcher with a Start URL.


B. Set up an Auth Provider for each External Application.


C. Set up Salesforce as a SAML Idp with My Domain.


D. Set up Identity Connect to Synchronize user data.


E. Create a Connected App for each external application.





A.
  Add each connected App to the App Launcher with a Start URL.

C.
  Set up Salesforce as a SAML Idp with My Domain.

E.
  Create a Connected App for each external application.

Explanation: These are the steps required to enable Salesforce as a SAML Identity Provider and use the App Launcher to access external applications. According to the Salesforce documentation1, you need to:

Enable Salesforce as a SAML Identity Provider with My Domain2.
Create a Connected App for each external application that you want to integrate with Salesforce3. Add each Connected App to the App Launcher with a Start URL that points to the external application1.
Option B is incorrect because setting up an Auth Provider is not necessary for SAML SSO. Auth Providers are used for OAuth SSO, which is a different protocol4. Option D is incorrect because Identity Connect is a tool for synchronizing user data between Active Directory and Salesforce, which is not related to SSO or App Launcher5.
References: 1: App Launcher - Salesforce 2: Enable Salesforce as a SAML Identity Provider 3: Connected Apps Overview 4: Identity Providers and Service Providers - Salesforce 5: Identity Connect Overview

Universal Containers (UC) has five Salesforce orgs (UC1, UC2, UC3, UC4, UC5). of Every user that is in UC2, UC3, UC4, and UC5 is also in UC1, however not all users 65* have access to every org. Universal Containers would like to simplify the authentication process such that all Salesforce users need to remember one set of credentials. UC would like to achieve this with the least impact to cost and maintenance. What approach should an Architect recommend to UC?


A. Purchase a third-party Identity Provider for all five Salesforce orgs to use and set up JIT user provisioning on all other orgs.


B. Purchase a third-party Identity Provider for all five Salesforce orgs to use, but don't set up JIT user provisioning for other orgs.


C. Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.


D. Configure UC1 as the Identity Provider to the other four Salesforce orgs, but don't set up JIT user provisioning for other orgs.





C.
  Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.
What should be done to enable the retrieval of the access token status for the OpenID Connect connection?


A. Query using OpenID Connect discovery endpoint.


B. A Leverage OpenID Connect Token Introspection.


C. Create a custom OAuth scope.


D. Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.





B.
  A Leverage OpenID Connect Token Introspection.

Explanation: According to the Salesforce documentation1, OpenID Connect Token Introspection allows all OAuth connected apps to check the current state of an OAuth 2.0 access or refresh token. The resource server or connected apps send the client app’s client ID and secret to the authorization server, initiating an OAuth authorization flow. As part of this flow, the authorization server validates, or introspects, the client app’s access token. If the access token is current and valid, the client app is granted access.

In an SP-Initiated SAML SSO setup where the user tries to access a resource on the Service Provider, What HTTP param should be used when submitting a SAML Request to the Idp to ensure the user is returned to the intended resourse after authentication?


A. RedirectURL


B. RelayState


C. DisplayState


D. StartURL





B.
  RelayState

Explanation: The HTTP parameter that should be used when submitting a SAML request to the IdP to ensure the user is returned to the intended resource after authentication is RelayState. RelayState is an optional parameter that can be used to preserve some state information across the SSO process. For example, RelayState can be used to specify the URL of the resource that the user originally requested on the SP before being redirected to the IdP for authentication. After the IdP validates the user’s identity and sends back a SAML response, it also sends back the RelayState parameter with the same value as it received from the SP. The SP then uses the RelayState value to redirect the user to the intended resource after validating the SAML response. The other options are not valid HTTP parameters for this purpose. RedirectURL, DisplayState, and StartURL are not standard SAML parameters and they are not supported by Salesforce as SP or IdP.

A pharmaceutical company has an on-premise application (see illustration) that it wants to integrate with Salesforce.
The IT director wants to ensure that requests must include a certificate with a trusted certificate chain to access the company's on-premise application endpoint.
What should an Identity architect do to meet this requirement?


A. Use open SSL to generate a Self-signed Certificate and upload it to the on-premise app.


B. Configure the company firewall to allow traffic from Salesforce IP ranges.


C. Generate a certificate authority-signed certificate in Salesforce and uploading it to the on-premise application Truststore.


D. Upload a third-party certificate from Salesforce into the on-premise server.





C.
  Generate a certificate authority-signed certificate in Salesforce and uploading it to the on-premise application Truststore.

Page 8 out of 26 Pages
Identity-and-Access-Management-Architect Practice Test Home Previous