Universal Containers (UC) has decided to use Salesforce as an Identity Provider for multiple external applications. UC wants to use the salesforce App Launcher to control the Apps that are available to individual users. Which three steps are required to make this happen?
Answer(s): A,C,E
An Architect has configured a SAML-based SSO integration between Salesforce and an external Identity provider and is ready to test it. When the Architect attempts to log in to Salesforce using SSO, the Architect receives a SAML error. Which two optimal actions should the Architect take to troubleshoot the issue?
Answer(s): B,C
Universal Containers (UC) is implementing Salesforce and would like to establish SAML SSO for its users to log in. UC stores its corporate user identities in a Custom Database. The UC IT Manager has heard good things about Salesforce Identity Connect as an Idp, and would like to understand what limitations they may face if they decided to use Identity Connect in their current environment. What limitation Should an Architect inform the IT Manager about?
Answer(s): A
Universal Containers (UC) wants to build a few applications that leverage the Salesforce REST API. UChas asked its Architect to describe how the API calls will be authenticated to a specific user. Whichtwo mechanisms can the Architect provide? Choose 2 Answers
Answer(s): C,D
Universal Containers (UC) has implemented SSO according to the diagram below. uses SAML while Salesforce Org 1 uses OAuth 2.0. Users usually start their day by first attempting to log into Salesforce Org 2 and then later in the day, they will log into either the Financial System or CPQ system depending upon their job position. Which two systems are acting as Identity Providers?
Answer(s): B,D
Post your Comments and Discuss Salesforce Certified Identity and Access Management Architect exam dumps with other Community members:
nspk Commented on April 23, 2025 Q11. Ans:- D (SP Initiated SSO Flow will not work) Anonymous
nspk Commented on April 15, 2025 Q10. Ans:- C (Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.) A single login for all users No additional cost from third-party IdPs Automated user management via JIT Low maintenance overhead Anonymous
nsp Commented on April 15, 2025 Q6, Ans:- A, C, E (Key logging attacks, phishing attacks, man in middle attacks) Anonymous
nspk Commented on April 14, 2025 Q6. Ans:- A, C, E (Keylogging, phising, middle man attacks) Anonymous
NSPK Commented on April 14, 2025 Q4. aNS:- B,C (Require High Assurance sessions in order to use the Connected App Set Login IP Ranges to the internal network for all of the app users’ Profiles) Anonymous
nspk Commented on April 14, 2025 Q2. aNS:- b(Enable "Redirect to the Identity Provider") Anonymous