Universal containers (UC) employees have salesforce access from restricted ip ranges only, to protect against unauthorised access. UC wants to rollout the salesforce1 mobile app and make it accessible from any location. Which two options should an architect recommend? Choose 2 answers
Answer(s): A,B
Universal containers(UC) has a customer Community that uses Facebook for authentication. UC would like to ensure that changes in the Facebook profile are reflected on the appropriate customer Community user. How can this requirement be met?
Answer(s): A
Universal containers(UC) wants to integrate a third-party reward calculation system with salesforce to calculate rewards. Rewards will be calculated on a schedule basis and update back into salesforce. The integration between Salesforce and the reward calculation system needs to be secure. Which are the recommended best practices for using Oauth flows in this scenario? Choose 2 answers
Answer(s): B,C
Universal Containers (UC) is looking to build a Canvas app and wants to use the corresponding Connected App to control where the app is visible. Which two options are correct in regards to where the app can be made visible under the Connected App setting for the Canvas app? Choose 2 answers
Answer(s): A,C
Universal Containers (UC) has an existing Salesforce org configured for SP-Initiated SAML SSO with their Idp. A second Salesforce org is being introduced into the environment and the IT team would like to ensure they can use the same Idp for new org. What action should the IT team take while implementing the second org?
Answer(s): B
Post your Comments and Discuss Salesforce Certified Identity and Access Management Architect exam dumps with other Community members:
nspk Commented on April 23, 2025 Q11. Ans:- D (SP Initiated SSO Flow will not work) Anonymous
nspk Commented on April 15, 2025 Q10. Ans:- C (Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.) A single login for all users No additional cost from third-party IdPs Automated user management via JIT Low maintenance overhead Anonymous
nsp Commented on April 15, 2025 Q6, Ans:- A, C, E (Key logging attacks, phishing attacks, man in middle attacks) Anonymous
nspk Commented on April 14, 2025 Q6. Ans:- A, C, E (Keylogging, phising, middle man attacks) Anonymous
NSPK Commented on April 14, 2025 Q4. aNS:- B,C (Require High Assurance sessions in order to use the Connected App Set Login IP Ranges to the internal network for all of the app users’ Profiles) Anonymous
nspk Commented on April 14, 2025 Q2. aNS:- b(Enable "Redirect to the Identity Provider") Anonymous