Free IDENTITY-AND-ACCESS-MANAGEMENT-DESIGNER Exam Braindumps (page: 5)

Page 4 of 59

What is one of the roles of an Identity Provider in a Single Sign-on setup using SAML?

  1. Validate token
  2. Create token
  3. Consume token
  4. Revoke token

Answer(s): B



Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wantsto allow customers to login using Facebook, Google, and other social sign-on providers.

How should this functionality be enabled for UC, assuming ail social sign-on providers support OpenID Connect?

  1. Configure an authentication provider and a registration handler for each social sign-on provider.
  2. Configure a single sign-on setting and a registration handler for each social sign-on provider.
  3. Configure an authentication provider and a Just-In-Time (JIT) handler for each social sign-on provider.
  4. Configure a single sign-on setting and a JIT handler for each social sign-on provider.

Answer(s): A



Universal Containers (UC) employees have Salesforce access from restricted IP ranges only, to protect against unauthorised access. UC wants to roll out the Salesforce1 mobile app and make it accessible from any location.
Which twooptions should an Architect recommend? Choose 2 answers

  1. Relax the IP restriction with a second factor in the Connect App settings for Salesforce1 mobile app.
  2. Remove existing restrictions on IP ranges for all types of user access.
  3. Relax the IP restrictions in the Connect App settings for the Salesforce1 mobile app.
  4. Use Login Flow to bypass IP range restriction for the mobile app.

Answer(s): A,C





A pharmaceutical company has an on-premise application (see illustration) that it wants to integrate with Salesforce.

The IT director wants to ensure that requests must include a certificate with a trusted certificate chain to access the company's on-premise application endpoint.

What should an Identity architect do to meet this requirement?

  1. Use open SSL to generate a Self-signed Certificateand upload it to the on-premise app.
  2. Configure the company firewall to allow traffic from Salesforce IP ranges.
  3. Generate a certificate authority-signed certificate in Salesforce and uploading it to the on-premise application Truststore.
  4. Upload athird-party certificate from Salesforce into the on-premise server.

Answer(s): B






Post your Comments and Discuss Salesforce IDENTITY-AND-ACCESS-MANAGEMENT-DESIGNER exam with other Community members:

IDENTITY-AND-ACCESS-MANAGEMENT-DESIGNER Discussions & Posts