Salesforce Certified Identity and Access Management Designer Exam
Certified Identity and Access Management Designer (Page 5 )

Updated On: 9-Feb-2026

Universal Containers (UC) is considering a Customer 360 initiative to gain a single source of the truth for its customer data across disparate systems and services. UC wants to understand the primary benefits of Customer 360 Identity and how it contributes ato successful Customer 360 Truth project.

What are two are key benefits of Customer 360 Identity as it relates to Customer 360?

Choose 2 answers

  1. Customer 360 Identity automatically integrates with Customer 360 Data Managerand Customer 360 Audiences to seamlessly populate all user data.
  2. Customer 360 Identity enables an organization to build a single login for each of its customers, giving the organization an
    understanding of the user's login activity across all its digital properties and applications.
  3. Customer 360 Identity supports multiple brands so you can deliver centralized identity services and correlation of user activity,
    even if it spans multiple corporate brands and user experiences.
  4. Customer 360 Identity not only provides a unified sign up and sign in experience, but also tracks anonymous user activity prior to signing up so organizations can understand user activity before and after the users identify themselves.

Answer(s): B,C



An identity architect wants to secure Salesforce APIs using Security Assertion Markup Language (SAML). For secunty purposes, administrators will need to authorize the applications that will be consuming the APIs.

Which Salesforce OAuthauthorization flow should be used7

  1. OAuth 2-0 SAML Bearer Assertion Flow
  2. OAuth 2.0 JWT Bearer Flow
  3. SAML Assertion Flow
  4. OAuth 2.0 User-Agent Flow

Answer(s): C



What are three capabilities of Delegated Authentication? Choose 3 answers

  1. It can be assigned by Custom Permissions.
  2. It can connect to SOAP services.
  3. It can be assigned by Permission Sets.
  4. It can be assigned by Profiles.
  5. It can connect to RESTservices.

Answer(s): B,C,E



Universal Containers (UC) is looking to purchase a third-party application as an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice.
Which two capabilitiesof an Identity Provider should the Architect detail to help strengthen the business case? Choose 2 answers

  1. The Identity Provider can authenticate multiple applications.
  2. The Identity Provider can authenticate multiple social media accounts.
  3. The Identity provider can store credentials for multiple applications.
  4. The Identity Provider can centralize enterprise password policy.

Answer(s): A,D



The CIO of universal containers(UC) wants to start taking advantage of the refresh token capability for the UC applications that utilize Oauth 2.0. UC has listed an architect to analyze all of the applications that use Oauth flows to. See where refresh Tokens can be applied.
Which two OAuth flows should the architect consider in their evaluation? Choose 2 answers

  1. Web server
  2. Jwt bearer token
  3. User-Agent
  4. Username-password

Answer(s): A,C






Post your Comments and Discuss Salesforce Certified Identity and Access Management Designer exam prep with other Community members:

Join the Certified Identity and Access Management Designer Discussion