Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)

Last Update 15 hours ago Total Questions : 109

The Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) content is now fully updated, with all current exam questions added 15 hours ago. Deciding to include Identity-and-Access-Management-Architect practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our Identity-and-Access-Management-Architect exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these Identity-and-Access-Management-Architect sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) practice test comfortably within the allotted time.

Question # 11

Northern Trail Outfitters (NTO) has a requirement to ensure all user logins include a single multi-factor authentication (MFA) prompt. Currently, users are allowed the choice to login with a username and password or via single sign-on against NTO’s corporate Identity Provider, which includes built-in MFA.

Which configuration will meet this requirement?

A.

Create and assign a permission set to all employees that includes “MFA for User Interface Logins.”

B.

Create a custom login flow that enforces MFA and assign it to a permission set. Then assign the permission set to all employees.

C.

Enable “MFA for User Interface Logins” for your organization from Setup - > Identity Verification.

D.

For all employee profiles, set the Session Level Required at Login to High Assurance and add the corporate identity provider to the High Assurance list for the org ' s Session Security Levels.

Question # 12

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow. Application users will authenticate using username and password. They should not be forced to approve API access in the mobile app or reauthenticate for 3 months.

Which two connected app options need to be configured to fulfill this use case?

Choose 2 answers

A.

Set the Sealston Timeout value to 3 months.

B.

Set Permitted Users to " All users may self-authorize " .

C.

Set Permitted Users to " Admin approved users are pre-authorized " .

D.

Set the Refresh Token Policy to expire refresh token after 3 months.

Question # 13

An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to be able to authenticate to Salesforce and then make API calls against the REST API.

One of the requirements is that the solution needs to ensure the third party service providers connected app in Salesforce minimizes the need for end user interaction and maximizes security.

Which OAuth flow should be used to fulfill the requirement?

A.

JWT Bearer Flow

B.

Web Server Flow

C.

Username-Razoned Flow

D.

User Agent Flow

Question # 14

Universal Containers want users to be able to log in to the Salesforce mobile app with their Active Directory password. Employees are unable to use mobile VPN.

Which two options should an identity architect recommend to meet the requirement?

Choose 2 answers

A.

Active Directory Password Since Plugin

B.

Salesforce Identity Connect

C.

Salesforce Trigger & Field on Contact Object

D.

Configure Cloud Provider Load Balancer

Question # 15

A large consumer company is planning to create a community and will require login through the customers social identity. The following requirements must be met:

1. The customer should be able to login with any of their social identities, however Salesforce should only have one user per customer.

2. Once the customer has been identified with a social identity, they should not be required to authorize Salesforce.

3. The customers personal details from the social sign on need to be captured when the customer logs into Salesforce using their social identity.

3. If the customer modifies their personal details in the social site, the changes should be updated in Salesforce .

Which two options allow the Identity Architect to fulfill the requirements?

Choose 2 answers

A.

Use Login Flows to call an authentication registration handler to provision the user before logging the user into the community.

B.

Use the custom registration handler to link social identities to Salesforce identifies.

C.

Use authentication providers for social sign-on and use the custom registration handler to insert or update personal details.

D.

Redirect the user to a custom page that allows the user to select an existing social identity for login.

Question # 16

Northern Trail Outfitters (NTO) is planning to roll out a partner portal for its distributors using Experience Cloud. NTO would like to use an external identity provider (IdP) and for partners to register for access to the portal. Each partner should be allowed to register only once to avoid duplicate accounts with Salesforce.

What should a identity architect recomend to create partners?

A.

Create a custom page in Experience Cloud to self register partner with Experience Cloud and Ping Identity store.

B.

On successful creation of Partners using Self Registration page in Experience Cloud, create Identity in Ping.

C.

Create a custom web page in the Portal and create users in the IdP and Experience Cloud

using published APIs.

D.

Allow partners to register through the IdP and create partner users in Salesforce through an API.

Question # 17

An identity professional, responsible for ensuring secure access to the Salesforce platform, needs to audit and verify user activity during and after login. They want to monitor login attempts, track user authentication methods, and identify suspicious behavior or unauthorized access.

Which tool or feature should they leverage to achieve this objective?

A.

Customer Account Processes

B.

Salesforce Login History

C.

Salesforce Skield

D.

Salesforce Lightning Flow

Question # 18

A third-party app provider would like to have users provisioned via a service endpoint before users access their app from Salesforce.

What should an identity architect recommend to configure the requirement with limited changes to the third-party app?

A.

Use a connected app with user provisioning flow.

B.

Redirect users to the third-party app for registration.

C.

Create Canvas app in Salesforce for third-party app to provision users.

D.

Use Salesforce Identity with Security Assertion Markup Language (SAML) for provisioning users.

Question # 19

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

A.

Leverage OpenID Connect Token Introspection.

B.

Query using OpenID Connect discovery endpoint.

C.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

D.

Create a custom OAuth scope.

Question # 20

Universal Containers (UC) rolling out a new Customer Identity and Access Management Solution will be built on top of their existing Salesforce instance. Several service providers have been setup and integrated with Salesforce using OpenID Connect to allow for a seamless single sign-on experience. UC has a requirement to limit users to sign on directly from the Salesforce org to the external Service provider app that accepts OpenID Connect.

Which two steps should be done on the platform to satisfy the requirement?

Choose 2 answers

A.

Manage which connected apps a user has access to by assigning authentication providers to the users profile.

B.

Assign the connected app to the customer community, and enable the users profile in the Community settings.

C.

Set each of the Connected App access settings to Admin Pre-Approved.

D.

Use Profiles and Permission Sets to assign user access to Admin Pre-Approved Connected Apps.

Go to page: