Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Identity and Access Management Designer Identity-and-Access-Management-Architect Salesforce Study Notes

Page: 6 / 18
Question 24

Which two things should be done to ensure end users can only use single sign-on (SSO) to login in to Salesforce?

Choose 2 answers

Options:

A.

Enable My Domain and select "Prevent login from https://login.salesforce.com ".

B.

Request Salesforce Support to enable delegated authentication.

C.

Once SSO is enabled, users are only able to login using Salesforce credentials.

D.

Assign user "is Single Sign-on Enabled" permission via profile or permission set.

Question 25

Which two statements are capable of Identity Connect? Choose 2 answers

Options:

A.

Synchronization of Salesforce Permission Set Licence Assignments.

B.

Supports both Identity-Provider-Initiated and Service-Provider-Initiated SSO.

C.

Support multiple orgs connecting to multiple Active Directory servers.

D.

Automated user synchronization and de-activation.

Question 26

Universal Containers wants to allow its customers to log in to its Experience Cloud via a third-party authentication provider that supports only the OAuth protocol.

What should an identity architect do to fulfill this requirement?

Options:

A.

Contact Salesforce Support and enable delegate single sign-on.

B.

Create a custom external authentication provider.

C.

Use certificate-based authentication.

D.

Configure OpenID Connect authentication provider.

Question 27

A financial services company uses Salesforce and has a compliance requirement to track information about devices from which users log in. Also, a Salesforce Security Administrator needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

Options:

A.

Use multi-factor authentication (MFA) to meet the compliance requirement to track device information.

B.

Use the Activations feature to meet the compliance requirement to track device information.

C.

Use the Login History object to track information about devices from which users log in.

D.

Use Login Flows to capture device from which users log in and store device and user information in a custom object.

Page: 6 / 18
Exam Name: Salesforce Certified Identity andAccess Management Architect (SU24)
Last Update: Nov 21, 2024
Questions: 243
Identity-and-Access-Management-Architect pdf

Identity-and-Access-Management-Architect PDF

$28  $80
Identity-and-Access-Management-Architect Engine

Identity-and-Access-Management-Architect Testing Engine

$33.25  $95
Identity-and-Access-Management-Architect PDF + Engine

Identity-and-Access-Management-Architect PDF + Testing Engine

$45.5  $130