Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Salesforce Identity and Access Management Designer Identity-and-Access-Management-Architect Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

A Salesforce Administrator is tasked with setting up Just-in-Time (JIT) provisioning for SAML to enable Single Sign-On (SSO) for your organization. They have already configured the SAML settings for SSO in Salesforce.

What should be their next steps to enable JIT provisioning?

Options:

A.

Enable Just-in-Time User Provisioning in the SAML Single Sign-On Setting, configure the User Provisioning Type, and provide the SAML JIT Handler.


B.

Create a new permission set with JIT provisioning enabled, configure the necessary permissions, and assign the permission set to relevant users.


C.

Create a new Apex class to handle JIT provisioning, implement the required methods, and assign the class to the appropriate user profiles.


D.

Modify the organization-wide sharing settings to allow JIT provisioning, update the sharing rules for the user object.


Expert Solution
Questions # 12:

An insurance company has a connected app in its Salesforce environment that is used to integrate with a Google Workspace (formerly known as G Suite).

An identity and access management (ZAM) architect has been asked to implement automation to enable users, freeze/suspend users, disable users, and reactivate existing users in Google Workspace upon similar actions in Salesforce.

Which solution is recommended to meet this requirement?

Options:

A.

Build a custom REST endpoint in Salesforce that Google Workspace can pull against.


B.

Build an Asset Trigger on the UserLogin object to make asynchronous callouts to Google APIs.


C.

configure Users Provisioning for Connected Apps.


D.

Update the Security Attention Hadoop Language Just-In-Time (SJAR, LTT) handler in Salesforce for user provisioning and de-provisioning.


Expert Solution
Questions # 13:

A company with 15,000 employees is using Salesforce and would like to take the necessary steps to highlight or curb fraudulent activity.

Which tool should be used to track login data, such as the average number of logins, who logged in more than the average number of times and who logged in during non-business hours?

Options:

A.

Login Inspector


B.

Login Forensics


C.

Login Report


D.

Login History


Expert Solution
Questions # 14:

A financial services company uses Salesforce and has a compliance requirement to track information about devices from which users log in. Also, a Salesforce Security Administrator

needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

Options:

A.

Use multi-factor authentication (MFA) to meet the compliance requirement to track device information.


B.

Use the Login History object to track information about devices from which users log in.


C.

Use Login Flows to capture device from which users log in and store device and user information in a custom object.


D.

Use the Activations feature to meet the compliance requirement to track device information.


Expert Solution
Questions # 15:

Northern Trail Outfitters (NTO) is planning to implement a community for its customers

using Salesforce Experience Cloud. Customers are not able to self-register. NTO would like to have customers set their own passwords when provided access to the community.

Which two recommendations should an identity architect make to fulfill this requirement?

Choose 2 answers

Options:

A.

Enable Welcome emails while configuring the Experience Cloud site.


B.

Use Login Flows to allow users to reset password in Experience Cloud site.


C.

Allow Password reset using the API to update Experience Cloud site membership.


D.

Add customers as contacts and add them to Experience Cloud site.


Expert Solution
Questions # 16:

Northern Trail Outfitters wants to enable single sign-on (SSO) for its Salesforce platform by integrating it with an identity provider (IdP).

Which step should be performed to establish the trust between Salesforce and the identity provider (IdP)?

Options:

A.

Setting up a VPN (Virtual Private Network) tunnel between Salesforce and the identity provider for secure communication.


B.

Embedding the identity provider’s authentication code directly into Salesforce source code.


C.

Configuring a trust relationship by exchanging metadata XML files between Salesforce and the IdP.


D.

Creating a custom login page within the Salesforce platform for user authentication.


Expert Solution
Questions # 17:

Universal Containers wants to allow its customers to log in to its Experience Cloud via a third party authentication provider that supports only the OAuth protocol.

What should an identity architect do to fulfill this requirement?

Options:

A.

Contact Salesforce Support and enable delegate single sign-on.


B.

Configure OpenID Connect authentication provider.


C.

Create a custom external authentication provider.


D.

Use certificate-based authentication.


Expert Solution
Questions # 18:

A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token.

Which authentication mechanism should an identity architect recommend to meet the

requirements?

Options:

A.

User Agent Flow


B.

OpenID Connect


C.

JWT Bearer Token Flow


D.

Web Server Flow


Expert Solution
Questions # 19:

A multinational company is looking to rollout Salesforce globally. The company has a Microsoft Active Directory Federation Services (ADFS) implementation for the Americas, Europe and APAC. The company plans to have a single org and they would like to have all of its users access Salesforce using the ADFS. The company would like to limit its investments and prefer not to procure additional applications to satisfy the requirements.

What is recommended to ensure these requirements are met?

Options:

A.

Implement Identity Connect to provide single sign-on to Salesforce and federated across multiple ADFS systems.


B.

Configure Each ADFS system under single sign-on settings and allow users to choose the system to authenticate during sign on to Salesforce.


C.

Add a central identity system that facilitates between the ADFS systems and integrate with Salesforce for single sign-on.


D.

Use connected apps for each ADFS implementation and implement Salesforce site to authenticate users across the ADFS system applicable to their geo.


Expert Solution
Questions # 20:

An Identity and Access Management (IAM) Architect is recommending Identity Connect to integrate Microsoft Active Directory (AD) with Salesforce for user provisioning, deprovisioning and single sign-on (SSO).

Which feature of Identity Connect is applicable for this scenario?

Options:

A.

Identify Connect can be deployed as a managed package on Salesforce org, leveraging High Availability of Salesforce Platform out-of-the-box.


B.

When configured, Identity Connect acts as an identity provider to both Active Directory and Salesforce, thus providing SSO as a default feature.


C.

If the number of provisioned users exceeds Salesforce licence allowances, Identity Connect will start disabling the existing Salesforce users in First-in, First-out (FIFO) fashion.


D.

When Identity Connect is in place, if a user is deprovisioned in an on-premise AD, the user’s Salesforce session is revoked immediately.


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions