Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

Identity-and-Access-Management-Architect Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Questions and Answers

Questions 4

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grants an Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

Options:

A.

4, 1, 5, 2, 3

B.

4, 5, 2, 3, 1

C.

1, 4, 5, 2, 3

D.

2, 1, 3, 4, 5

Buy Now
Questions 5

Users logging into Salesforce are frequently prompted to verify their identity.

The identity architect is required to provide recommendations so that frequency of prompt verification can be reduced.

What should the identity architect recommend to meet the requirement?

Options:

A.

Implement an single sign-on for Salesforce using an external identity provider.

B.

Set trusted IP ranges for the organization.

C.

Implement 2FA authentication for the Salesforce org.

D.

Implement multi-factor authentication for the Salesforce org.

Buy Now
Questions 6

A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token.

Which authentication mechanism should an identity architect recommend to meet the

requirements?

Options:

A.

User Agent Flow

B.

OpenID Connect

C.

JWT Bearer Token Flow

D.

Web Server Flow

Buy Now
Questions 7

An identity architect has built a native mobile application and plans to integrate it with a Salesforce Identity solution. The following are the requirements for the solution:

1. Users should not have to login every time they use the app.

2. The app should be able to make calls to the Salesforce REST API.

3. End users should NOT see the OAuth approval page.

How should the identity architect configure the Salesforce connected app to meet the requirements?

Options:

A.

Enable the API Scope and Offline Access Scope on the connected app, and then set the Connected App access settings to " User may self authorize " .

B.

Enable the Full Access Scope and then set the connected app access settings to " Admin Pre-Approved " .

C.

Enable the API Scope and Offline Access Scope on the connected app, and then set the connected app to access settings to " Admin Pre-Approved " .

D.

Enable the API Scope and Offline Access Scope, upload a certificate so JWT Bearer Flow can be used and then set the connected app access settings to " Admin Pre-Approved " .

Buy Now
Questions 8

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.

Which action will accomplish this?

Options:

A.

Use a HTTP POST to make a call as the reverse token endpoint.

B.

Use a HTTP POST to request any refresh token for this current user.

C.

Enable Single Logout with a secure logout URL.

D.

Use a HTTP POST to file System for Cross-domain Identity Management (SCIPI) endpoint, including the current OAuth token.

Buy Now
Questions 9

A client is planning to rollout multi-factor authentication (MFA) to its internal employees and wants to understand which authentication and verification methods meet the Salesforce criteria for secure authentication.

Which three functions meet the Salesforce criteria for secure MFA?

Choose 3 answers

Options:

A.

Username and password = security key

B.

Lightning Login

C.

Username and password = SMS passwords

D.

Third-party single sign-on with Mobile Authenticator app

E.

Username & password = Email Verification Code

Buy Now
Questions 10

Universal Containers (UC) is building a custom employee hub application on Amazon Web Services (AWS) and would like to store their users ' credentials there. Users will also need access to Salesforce for internal operations. UC has tasked an identity architect with evaluating different solutions for authentication and authorization between AWS and Salesforce.

How should an identity architect configure AWS to authenticate and authorize Salesforce users?

Options:

A.

Create a custom external authentication provider.

B.

Develop a custom Auth server in AWS.

C.

Configure the custom employee app as a connected app.

D.

Configure AWS as an OpenID Connect Provider.

Buy Now
Questions 11

An identity architect has been asked to recommend a solution that allows administrators to configure personalized alert messages to users before they land on the Experience Cloud site (formerly known as Community) homepage.

What is recommended to fulfill this requirement with the least amount of customization?

Options:

A.

Customize the registration handler Apex class to create a routing logic navigating to different home pages based on the user profile.

B.

Use Login Flows to add a screen that shows personalized alerts.

C.

Create custom metadata that stores user alerts and use a LWC to display alerts.

D.

Build a Lightning Web Component (LWC) for a homepage that shows custom alerts.

Buy Now
Questions 12

An identity professional is working on the configuration of a connected app for Universal Container’s (UC) partner portal. UC wants to allow external users to access certain Salesforce data and perform limited actions. However, they also want to enforce additional security measures, such as IP restrictions and session timeout settings.

Which configuration option should be used to enforce IP restrictions and session timeout

settings for the connected app?

Options:

A.

Session Settings

B.

Login IP Ranges

C.

Custom Permissions

D.

Connected App QAuth policies

Buy Now
Questions 13

An identity architect ' s client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of IT is worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.

What should the identity architect recommend to make sure that there is additional trust between the SP and the IdP?

Options:

A.

Ensure that there is an HTTPS connection between IDP and SP.

B.

Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.

C.

Ensure that the Issuer and Assertion Consumer Service (ACS) URL is properly configured between SP and IDP.

D.

Ensure that on the SSO settings page, the " Request Signing Certificate " field has a selfsigned certificate.

Buy Now
Questions 14

Universal Container’s (UC) is using Salesforce Experience Cloud site for its container wholesale business. The identity architect wants to use an authentication provider for the new site.

Which two options should be utilized in creating an authentication provider?

Choose 2 answers

Options:

A.

The default login user can be set.

B.

A custom error URL can be set.

C.

The default authentication provider certificate can be set.

D.

A custom registration handler can be set.

Buy Now
Questions 15

Universal Containers wants to allow its customers to log in to its Experience Cloud via a third party authentication provider that supports only the OAuth protocol.

What should an identity architect do to fulfill this requirement?

Options:

A.

Contact Salesforce Support and enable delegate single sign-on.

B.

Configure OpenID Connect authentication provider.

C.

Create a custom external authentication provider.

D.

Use certificate-based authentication.

Buy Now
Questions 16

Northern Trail Outfitters (NTO) wants its customers to use phone numbers to log in to their new digital portal, which was designed and built using Salesforce Experience Cloud. In order to access the portal, the user will need to do the following:

1. Enter a phone number and/or email address

2. Enter a verification code that is to be sent via email or text.

What is the recommended approach to fulfill this requirement?

Options:

A.

create an authentication provider and implement a self-registration handler class.

B.

Create a custom login page with an Apex controller. The controller has tips to send and verify the identity.

C.

create a Login Discoverer page and provide a Login Discovery Handler Apex class.

D.

Create a custom login flow that uses an Apex controller to verify the phone numbers with the company’s verification service.

Buy Now
Questions 17

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before performing any further operation on the portal.

Which approach will meet this requirement?

Options:

A.

Create a custom landing page and email campaign asking all community members to login and verify their data.

B.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

C.

Create tasks for users who need to update their data or accept the new community rules.

D.

Create a login flow that conditionally prompts users who have not accepted the new community rules and who have missing or outdated information.

Buy Now
Questions 18

A company ' s external application is protected by Salesforce through OAuth. The identity architect for the project needs to limit the level of access to the data of the protected resource in a flexible way.

What should be done to improve security?

Options:

A.

Select " Admin approved users are pre-authorized " and assign specific profiles.

B.

Create custom scopes and assign to the connected app.

C.

Leverage external objects and data classification policies.

D.

Define a permission set that grants access to the app and assign to authorized users.

Buy Now
Questions 19

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Amazon credentials.

What should an identity architect recommend to meet these requirements?

Options:

A.

Create a custom external authentication provider for Amazon.

B.

Configure Amazon as & connected app.

C.

Configure an OpenlD Connect Authentication Provider for Amazon.

D.

Configure a predefined authentication provider for Amazon.

Buy Now
Questions 20

A security architect is rolling out a new multi-factor authentication (MFA) mandate, where all employees must go through a secure authentication process before accessing Salesforce. There are multiple Identity Providers (IdP) in place and the architect is considering how the " Authentication Method Reference " ” field (AMR) in the Login History can help.

Which two considerations should the architect keep in mind?

Choose 2 answers

Options:

A.

Both OIDC and Security Assertion Markup Language (SAML) are supported but AMR must be implemented at IdP.

B.

High-assurance sessions must be configured under Session Security Level Policies.

C.

AMR field shows the authentication methods used at IdP.

D.

Dependency on what is supported by OpenID Connect (OIDC) implementation at IdP.

Buy Now
Questions 21

An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to be able to authenticate to Salesforce and then make API calls against the REST API.

One of the requirements is that the solution needs to ensure the third party service providers connected app in Salesforce minimizes the need for end user interaction and maximizes security.

Which OAuth flow should be used to fulfill the requirement?

Options:

A.

JWT Bearer Flow

B.

Web Server Flow

C.

Username-Razoned Flow

D.

User Agent Flow

Buy Now
Questions 22

Which two things should be done to ensure end users can only use single sign-on (SSO) to login in to Salesforce?

Choose 2 answers

Options:

A.

Enable My Domain and select " Prevent login from https://login.salesforce.com " .

B.

Request Salesforce Support to enable delegated authentication.

C.

Once SSO is enabled, users are only able to login using Salesforce credentials.

D.

Assign user " Is Single Sign-On Enabled " permission via profile or permission set.

Buy Now
Questions 23

Universal Containers (UC) has decided to replace the homegrown customer portal with Salesforce Experience Cloud. UC will continue to use Its third-party single sign-on (SSO) solution that stores all of its customer and partner credentials.

The first time a customer logs in to the Experience Cloud site through SSO, a user record needs to be created automatically.

Which solution should an identity architect recommend in order to automatically provision users in Salesforce upon login?

Options:

A.

Third-party AppExchange solution

B.

Custom middleware and web services

C.

Just-in-Time (JIT) provisioning

D.

Custom login flow and Apex handler

Buy Now
Questions 24

Northern Trail Outfitters wants to enable single sign-on (SSO) for its Salesforce platform by integrating it with an identity provider (IdP).

Which step should be performed to establish the trust between Salesforce and the identity provider (IdP)?

Options:

A.

Setting up a VPN (Virtual Private Network) tunnel between Salesforce and the identity provider for secure communication.

B.

Embedding the identity provider’s authentication code directly into Salesforce source code.

C.

Configuring a trust relationship by exchanging metadata XML files between Salesforce and the IdP.

D.

Creating a custom login page within the Salesforce platform for user authentication.

Buy Now
Questions 25

Universal Containers (UC) currently uses Salesforce Sales Cloud and an external billing application. Both Salesforce and the billing application are accessed several times a day to

manage customers. UC would like to configure single sign-on and leverage Salesforce as the identity provider. Additionally, UC would like the billing application to be accessible from

Salesforce. A redirect is acceptable.

Which two Salesforce tools should an identity architect recommend to satisfy the requirements?

Choose 2 answers

Options:

A.

Salesforce Canvas

B.

Age Launcher

C.

Identity Connect

D.

Connected Ages

Buy Now
Questions 26

Universal Containers would like its customers to register and log in to a portal built on

Salesforce Experience Cloud. Customers should be able to use their Facebook or LinkedIn

credentials for ease of use.

Which three steps should an identity architect take to implement social sign-on?

Choose 3 answers

Options:

A.

Update the default registration handlers to create and update users.

B.

Enable " Federated Single Sign-On Using SAML " .

C.

Enable " Facebook " and " LinkedIn " under Login Page Setup.

D.

Create authentication providers for both Facebook and LinkedIn.

E.

Register both Facebook and LinkedIn as connected apps.

Buy Now
Questions 27

A multinational company is looking to rollout Salesforce globally. The company has a Microsoft Active Directory Federation Services (ADFS) implementation for the Americas, Europe and APAC. The company plans to have a single org and they would like to have all of its users access Salesforce using the ADFS. The company would like to limit its investments and prefer not to procure additional applications to satisfy the requirements.

What is recommended to ensure these requirements are met?

Options:

A.

Implement Identity Connect to provide single sign-on to Salesforce and federated across multiple ADFS systems.

B.

Configure Each ADFS system under single sign-on settings and allow users to choose the system to authenticate during sign on to Salesforce.

C.

Add a central identity system that facilitates between the ADFS systems and integrate with Salesforce for single sign-on.

D.

Use connected apps for each ADFS implementation and implement Salesforce site to authenticate users across the ADFS system applicable to their geo.

Buy Now
Questions 28

When designing a multi-branded Customer Identity and Access Management solution on the Salesforce Platform, how should an identity architect ensure a specific brand experience in Salesforce is presented?

Options:

A.

The Experience ID, which can be included in OAuth/Open ID flows and Security Assertion

Markup Language (SAML) flows as a URL parameter.

B.

The Audience ID, which can be set in a shared cookie.

C.

Add a custom parameter to the service provider’s OAuth/SAML call and implement logic on its login page to apply branding based on the parameters value.

D.

Provide a brand picker that the end user can use to select its sub-brand when they arrive on Salesforce.

Buy Now
Questions 29

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Facebook and Twitter credentials.

What should an identity architect recommend to meet these requirements?

Options:

A.

create a custom external authentication provider for Facebook.

B.

obtain login icon for Facebook and Twitter.

C.

configure a predefined authentication provider for Facebook and Twitter.

D.

create a custom external authentication provider for Twitter.

Buy Now
Questions 30

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type). Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Scopes

B.

Client ID

C.

Authorization Code

D.

Verification Code

E.

Refresh Token

Buy Now
Questions 31

The executive sponsor for an organization has asked if Salesforce supports the ability to embed a login widget into its service providers in order to create a more seamless user experience.

What should be used and considered before recommending it as a solution on the Salesforce Platform?

Options:

A.

Embedded Login. Identify what level of UI customization will be required to make it match the service providers look and feel.

B.

Salesforce REST APIs. Ensure that Secure Sockets Layer (SSL) connection for the integration is used.

C.

OpenID Connect Web Server Flow. Determine if the service provider is secure enough to store the client secret on.

D.

Embedded Login. Consider whether or not it relies on third party cookies which can cause browser compatibility issues.

Buy Now
Questions 32

Universal Containers (UC) has built a custom time tracking app for its employees on a third party system. UC wants to leverage Salesforce Identity to control access to the custom app.

At a minimum, which Salesforce license is required to support this requirement?

Options:

A.

Identity Only

B.

D External Identity

C.

Identity Connect

D.

Identity Verification

Buy Now
Exam Name: Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)
Last Update: Apr 7, 2026
Questions: 109
Identity-and-Access-Management-Architect pdf

Identity-and-Access-Management-Architect PDF

$25.5  $84.99
Identity-and-Access-Management-Architect Engine

Identity-and-Access-Management-Architect Testing Engine

$30  $99.99
Identity-and-Access-Management-Architect PDF + Engine

Identity-and-Access-Management-Architect PDF + Testing Engine

$40.5  $134.99