Free Certified Identity and Access Management Architect Exam Braindumps (page: 29)

Page 28 of 62

Universal Containers (UC) is looking to purchase a third-party application as an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose 2 answers

  1. The Identity Provider can authenticate multiple applications.
  2. The Identity Provider can authenticate multiple social media accounts.
  3. The Identity provider can store credentials for multiple applications.
  4. The Identity Provider can centralize enterprise password policy.

Answer(s): A,D



Universal Containers (UC) has implemented a multi-org architecture in their company. Many users have licences across multiple orgs, and they are complaining about remembering which org and credentials are tied to which business process. Which two recommendations should the Architect make to address the Complaints? Choose 2 answers

  1. Activate My Domain to Brand each org to the specific business use case.
  2. Implement SP-Initiated Single Sign-on flows to allow deep linking.
  3. Implement IdP-Initiated Single Sign-on flows to allow deep linking.
  4. Implement Delegated Authentication from each org to the LDAP provider.

Answer(s): A,B



Containers (UC) uses an internal system for recruiting and would like to have the candidates' info available in the Salesforce automatically when they are selected. UC decides to use OAuth to connect to Salesforce from the recruiting system and would like to do the authentication using digital certificates. Which two OAuth flows should be considered to meet the requirement? Choose 2 answers

  1. JWT Bearer Token flow
  2. Refresh Token flow
  3. SAML Bearer Assertion flow
  4. Web Service flow

Answer(s): A,C



Universal Containers (UC) is building an authenticated Customer Community for its customers. UC does not want customer credentials stored in Salesforce and is confident its customers would be willing to use their social media credentials to authenticate to the community. Which two actions should an Architect recommend UC to take?

  1. Use Delegated Authentication to call the Twitter login API to authenticate users.
  2. Configure an Authentication Provider for LinkedIn Social Media Accounts.
  3. Create a Custom Apex Registration Handler to handle new and existing users.
  4. Configure SSO Settings For Facebook to serve as a SAML Identity Provider.

Answer(s): B,C






Post your Comments and Discuss Salesforce Certified Identity and Access Management Architect exam with other Community members:

Certified Identity and Access Management Architect Discussions & Posts