Salesforce-Platform-Identity-and-Access-Management-Architect Practice Test Questions

255 Questions


A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities. Which Salesforce OAuth authorization flow should be used?


A. OAuth 2.0 JWT Bearer How


B. OAuth 2.0 Device Flow


C. OAuth 2.0 User-Agent Flow


D. OAuth 2.0 Asset Token Flow





B.
  OAuth 2.0 Device Flow

Explanation:

The OAuth 2.0 Device Flow is a type of authorization flow that allows users to register an IoT device with limited display input or capabilities, such as a smart TV, a printer, or a smart speaker1. The device flow works as follows1:

👉 The device displays or reads out a verification code and a verification URL to the user.
👉 The user visits the verification URL on another device, such as a smartphone or a laptop, and enters the verification code.
👉 The user logs in to Salesforce and approves the device.
👉 The device polls Salesforce for an access token using the verification code. Salesforce returns an access token to the device, which can then access Salesforce APIs.

Universal containers (UC) would like to enable SSO between their existing Active Directory infrastructure and salesforce. The it team prefers to manage all users in Active Directory and would like to avoid doing any initial setup of users in salesforce directly, including the correct assignment of profiles, roles and groups. Which two optimal solutions should UC use to provision users in salesforce? (Choose 2 answers)


A. Use the salesforce REST API to sync users from active directory to salesforce


B. Use an app exchange product to sync users from Active Directory to salesforce.


C. Use Active Directory Federation Services to sync users from active directory to salesforce.


D. Use Identity connect to sync users from Active Directory to salesforce





B.
  Use an app exchange product to sync users from Active Directory to salesforce.

D.
  Use Identity connect to sync users from Active Directory to salesforce

Explanation:

B. Use an AppExchange product to sync users from Active Directory to Salesforce.
AppExchange tools like Okta, OneLogin, or Azure AD Enterprise Apps support automated user provisioning (via SCIM or custom APIs) directly from Active Directory. They can handle creating, updating, and deactivating users in Salesforce, including assigning profiles, roles, and permissions, often with minimal coding required.

D. Use Identity Connect to sync users from Active Directory to Salesforce.
Salesforce's Identity Connect is a managed solution explicitly designed to sync users and their metadata from AD to Salesforce. It supports provisioning, deprovisioning, SSO, and mapping of AD groups to Salesforce roles and profiles—meeting UC’s requirement to avoid manual user setup in Salesforce

❌ Why A and C Are Not Optimal

A. Using custom REST API integration from AD to Salesforce would require building and maintaining a custom middleware layer. This approach is more complex and error-prone than leveraging established provisioning tools.

C. ADFS handles authentication (SSO), not user provisioning. It won’t automatically create or manage Salesforce user records, roles or profiles—only authenticate users.

đź’ˇ Summary Table

Requirement AppExchange Tools Identity Connect Custom REST API ADFS
User provisioning from AD ✅ ✅ ⚠️ Custom Build ❌
Auto role/profile assignment ✅ (some tools) ✅ ⚠️ Custom Build ❌
Avoid manual setup in Salesforce ✅ ✅ ⚠️ Custom Build ❌
SSO with AD ✅ ✅ (optional) ⚠️ Custom Build ✅

Containers (UC) has implemented SAML-based single Sign-on for their Salesforce application and is planning to provide access to Salesforce on mobile devices using the Salesforce1 mobile app. UC wants to ensure that Single Sign-on is used for accessing the Salesforce1 mobile App. Which two recommendations should the Architect make? (Choose 2 Answers)


A. Configure the Embedded Web Browser to use My Domain URL.


B. Configure the Salesforce1 App to use the MY Domain URL.


C. Use the existing SAML-SSO flow along with User Agent Flow.


D. Use the existing SAML SSO flow along with Web Server Flow.





B.
  Configure the Salesforce1 App to use the MY Domain URL.

C.
  Use the existing SAML-SSO flow along with User Agent Flow.

Explanation:

Universal Containers (UC) wants to ensure SAML-based SSO works seamlessly for users accessing Salesforce via the Salesforce1 mobile app. Here’s why Options B and C are the best recommendations:

1. Option B: Configure the Salesforce1 App to Use My Domain URL
👉 For SAML SSO to work on the Salesforce1 mobile app, users must log in via My Domain (e.g., yourcompany.my.salesforce.com).
👉 If users try to log in directly through the app without My Domain, Salesforce defaults to username/password authentication instead of SAML redirection.

2. Option C: Use the Existing SAML-SSO Flow Along with User Agent Flow
👉 The User Agent Flow (also called the "WebView" flow) is the recommended OAuth flow for SAML SSO on mobile apps.
👉 It allows the Salesforce1 app to:
âś” Open a browser session (or embedded WebView) for SAML authentication.
âś” Redirect users to the IdP for login, then return them to the app with an OAuth token.

Why Not the Other Options?

A. Embedded Web Browser → While configuring My Domain is necessary, this option alone does not address the OAuth flow requirement for SAML SSO on mobile.

D. Web Server Flow → Designed for server-to-server authentication (not mobile SSO).

Universal Containers (UC) has decided to use Salesforce as an Identity Provider for multiple external applications. UC wants to use the salesforce App Launcher to control the Apps that are available to individual users. Which three steps are required to make this happen?


A. Add each connected App to the App Launcher with a Start URL.


B. Set up an Auth Provider for each External Application.


C. Set up Salesforce as a SAML Idp with My Domain.


D. Set up Identity Connect to Synchronize user data.


E. Create a Connected App for each external application.





A.
  Add each connected App to the App Launcher with a Start URL.

C.
  Set up Salesforce as a SAML Idp with My Domain.

E.
  Create a Connected App for each external application.

Explanation:

These are the steps required to enable Salesforce as a SAML Identity Provider and use the App Launcher to access external applications. According to the Salesforce documentation1, you need to:

Enable Salesforce as a SAML Identity Provider with My Domain2.

Create a Connected App for each external application that you want to integrate with Salesforce3. Add each Connected App to the App Launcher with a Start URL that points to the external application1.

Option B is incorrect because setting up an Auth Provider is not necessary for SAML SSO. Auth Providers are used for OAuth SSO, which is a different protocol4. Option D is incorrect because Identity Connect is a tool for synchronizing user data between Active Directory and Salesforce, which is not related to SSO or App Launcher5.

References:

👉 1: App Launcher - Salesforce
👉 2: Enable Salesforce as a SAML Identity Provider
👉 3: Connected Apps Overview
👉 4: Identity Providers and Service Providers - Salesforce
👉 5: Identity Connect Overview

Universal Containers (UC) has five Salesforce orgs (UC1, UC2, UC3, UC4, UC5). of Every user that is in UC2, UC3, UC4, and UC5 is also in UC1, however not all users 65* have access to every org. Universal Containers would like to simplify the authentication process such that all Salesforce users need to remember one set of credentials. UC would like to achieve this with the least impact to cost and maintenance. What approach should an Architect recommend to UC?


A. Purchase a third-party Identity Provider for all five Salesforce orgs to use and set up JIT user provisioning on all other orgs.


B. Purchase a third-party Identity Provider for all five Salesforce orgs to use, but don't set up JIT user provisioning for other orgs.


C. Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.


D. Configure UC1 as the Identity Provider to the other four Salesforce orgs, but don't set up JIT user provisioning for other orgs.





C.
  Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.

Explanation:

Leverage an existing org: UC1 already contains all users, so making it the Identity Provider (IdP) for the other Salesforce orgs (UC2–UC5) reduces cost and complexity versus purchasing a separate third-party IdP.

Just-In-Time (JIT) provisioning: By enabling SAML-based JIT provisioning in UC2–UC5, the orgs can automatically create or update Salesforce user accounts at first login—based on identity data sent from UC1—eliminating manual setup of users, profiles, and roles .

Minimal overhead: This architecture requires configuration only in existing Salesforce environments and no integration middleware or third-party tools. It scales easily when adding additional orgs or users.

Alternatives Not Recommended:

A & B (use third-party IdP) introduce extra licensing, integration, and maintenance overhead.

D (no JIT) would force manual user provisioning, defeating UC’s goal to simplify and centralize user management.

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org. What should be done to enable the retrieval of the access token status for the OpenID Connect connection?


A. Query using OpenID Connect discovery endpoint.


B. A Leverage OpenID Connect Token Introspection.


C. Create a custom OAuth scope.


D. Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.





B.
  A Leverage OpenID Connect Token Introspection.

Explanation:

According to the Salesforce documentation1, OpenID Connect Token Introspection allows all OAuth connected apps to check the current state of an OAuth 2.0 access or refresh token. The resource server or connected apps send the client app’s client ID and secret to the authorization server, initiating an OAuth authorization flow. As part of this flow, the authorization server validates, or introspects, the client app’s access token. If the access token is current and valid, the client app is granted access.

In an SP-Initiated SAML SSO setup where the user tries to access a resource on the Service Provider, What HTTP param should be used when submitting a SAML Request to the Idp to ensure the user is returned to the intended resourse after authentication?


A. RedirectURL


B. RelayState


C. DisplayState


D. StartURL





B.
  RelayState

Explanation:

The HTTP parameter that should be used when submitting a SAML request to the IdP to ensure the user is returned to the intended resource after authentication is RelayState. RelayState is an optional parameter that can be used to preserve some state information across the SSO process. For example, RelayState can be used to specify the URL of the resource that the user originally requested on the SP before being redirected to the IdP for authentication. After the IdP validates the user’s identity and sends back a SAML response, it also sends back the RelayState parameter with the same value as it received from the SP. The SP then uses the RelayState value to redirect the user to the intended resource after validating the SAML response. The other options are not valid HTTP parameters for this purpose. RedirectURL, DisplayState, and StartURL are not standard SAML parameters and they are not supported by Salesforce as SP or IdP.

A pharmaceutical company has an on-premise application (see illustration) that it wants to integrate with Salesforce. The IT director wants to ensure that requests must include a certificate with a trusted certificate chain to access the company's on-premise application endpoint. What should an Identity architect do to meet this requirement?


A. Use open SSL to generate a Self-signed Certificate and upload it to the on-premise app.


B. Configure the company firewall to allow traffic from Salesforce IP ranges.


C. Generate a certificate authority-signed certificate in Salesforce and uploading it to the on-premise application Truststore.


D. Upload a third-party certificate from Salesforce into the on-premise server.





C.
  Generate a certificate authority-signed certificate in Salesforce and uploading it to the on-premise application Truststore.

Explanation:

To ensure secure communication between Salesforce and the on-premise application, the Identity Architect must enforce certificate-based authentication, where Salesforce presents a trusted certificate to the on-premise system. Here’s why Option C is the best approach:

1. Certificate Authority (CA)-Signed Certificate Ensures Trust
👉 A CA-signed certificate (unlike a self-signed one) is inherently trusted because it is issued by a recognized Certificate Authority (e.g., DigiCert, GlobalSign).
👉 The on-premise application can validate this certificate via its Truststore, which contains trusted CA root certificates.

2. Steps to Implement This Solution:
👉 Generate a CA-signed certificate in Salesforce (or obtain one from a trusted CA).
👉 Upload the certificate (public key) to the on-premise Truststore, ensuring the app only accepts requests with this certificate.
👉 Configure Salesforce to present this certificate when calling the on-premise endpoint (e.g., in Named Credentials or Apex callouts).

Why Not the Other Options?

👉 A (Self-signed certificate) → Not inherently trusted; requires manual Truststore updates and is less secure.
👉 B (Firewall IP whitelisting) → Does not enforce certificate-based authentication (only network-level security).
👉 D (Third-party certificate from Salesforce) → Misleading; Salesforce does not issue third-party certificates—they must be obtained from a CA.

What are three capabilities of Delegated Authentication? Choose 3 answers


A. It can be assigned by Custom Permissions.


B. It can connect to SOAP services.


C. It can be assigned by Profiles.


D. It can connect to REST services.





B.
  It can connect to SOAP services.

C.
  It can be assigned by Profiles.

D.
  It can connect to REST services.

Explanation:

Delegated Authentication is a mechanism in Salesforce that allows you to delegate login authentication to an external system (such as an on-premise Active Directory or another identity service). It works by having Salesforce make a web service call (either SOAP or REST) to the external authentication service during the login process.

Here are the correct capabilities:

B. It can connect to SOAP services. âś…
Delegated Authentication traditionally supports SOAP-based services. Salesforce sends a username and password to the delegated authentication endpoint, and expects a Boolean (true/false) response indicating authentication success.

C. It can be assigned by Profiles. âś…
Delegated Authentication is enabled at the Profile level. This allows Salesforce administrators to specify which users must use delegated authentication for login instead of standard Salesforce credentials.

D. It can connect to REST services. âś…
As of recent updates, REST support is also available via custom implementations, although SOAP is the most officially supported and common. Developers can configure a RESTful endpoint for Salesforce to use in delegating the login authentication.

❌ A. It can be assigned by Custom Permissions.
This is incorrect. Delegated Authentication cannot be assigned by Custom Permissions. It is controlled via Profiles, not permission sets or custom permissions.

Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?


A. Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.


B. Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.


C. Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.


D. Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.





C.
  Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.

D.
  Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.

Explanation:

Using the identity provider’s certificate to digitally sign and encrypt the payload, and using a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion are two methods that can ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit. Option A is not a good choice because using Salesforce’s certificate to encrypt the payload may not work, as Salesforce does not support encrypted SAML assertions. Option B is not a good choice because using Salesforce’s certificate to digitally sign the SAML assertion may not be necessary, as Salesforce does not validate digital signatures on SAML assertions. Also, using a mobile device management client on the users’ mobile devices may not be relevant, as it does not affect how the sensitive data is transmitted between the identity provider and Salesforce.

Northern Trail Outfitters (NTO) utilizes a third-party cloud solution for an employee portal. NTO also owns Salesforce Service Cloud and would like employees to be able to login to Salesforce with their third-party portal credentials for a seamless experience. The third- party employee portal only supports OAuth. What should an identity architect recommend to enable single sign-on (SSO) between the portal and Salesforce?


A. Configure SSO to use the third-party portal as an identity provider.


B. Create a custom external authentication provider.


C. Add the third-party portal as a connected app.


D. Configure Salesforce for Delegated Authentication.





A.
  Configure SSO to use the third-party portal as an identity provider.

Explanation:

Configuring SSO to use the third-party portal as an identity provider is the best option to enable SSO between the portal and Salesforce. The portal can use OAuth as the protocol to authenticate users and redirect them to Salesforce. The other options are either not feasible or not relevant for this use case.

References:

Single Sign-On for Desktop and Mobile Applications using SAML and OAuth, Single Sign-On with SAML on Force.com

The CIO of universal containers(UC) wants to start taking advantage of the refresh token capability for the UC applications that utilize Oauth 2.0. UC has listed an architect to analyze all of the applications that use Oauth flows to. See where refresh Tokens can be applied. Which two OAuth flows should the architect consider in their evaluation? (Choose 2 answers)


A. Web server


B. Jwt bearer token


C. User-Agent


D. Username-password





A.
  Web server

C.
  User-Agent

Explanation:

The two OAuth flows that support refresh tokens are Web server and User- Agent. According to the Salesforce documentation2, “The web server authentication flow and user-agent flow both provide a refresh token that can be used to get a new access token.” Therefore, option A and C are the correct answers.


Page 7 out of 22 Pages
Previous