Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?
- Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.
- Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.
- Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.
- Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.
Reveal Solution Next Question