Free Identity-and-Access-Management-Architect Exam Braindumps

Pass your Salesforce Certified Identity and Access Management Architect (SU23) exam with these free Questions and Answers

Page 3 of 50
QUESTION 6

Which three are features of federated Single sign-on solutions? Choose 3 Answers

  1. A. It establishes trust between Identity Store and Service Provider.
  2. B. It federates credentials control to authorized applications.
  3. C. It solves all identity and access management problems.
  4. D. It improves affiliated applications adoption rates.
  5. E. It enables quick and easy provisioning and deactivating of users.

Correct Answer: ADE
The three features of federated single sign-on (SSO) solutions are:
Identity-and-Access-Management-Architect dumps exhibit It establishes trust between identity store and service provider. Federated SSO is a process that allows users to access multiple applications or systems with one set of credentials by using a common identity provider (IdP) that authenticates the user and issues a security token to the service provider (SP) that grants access. This process requires a trust relationship between the IdP and the SP, which is established by exchanging metadata and certificates.
Identity-and-Access-Management-Architect dumps exhibit It improves affiliated applications adoption rates. Federated SSO improves the user experience and satisfaction by reducing the number of login prompts, passwords, and authentication failures that users have to deal with when accessing multiple applications or systems. This can increase the usage and adoption rates of the affiliated applications or systems, as users can access them more easily and conveniently.
Identity-and-Access-Management-Architect dumps exhibit It enables quick and easy provisioning and deprovisioning of users. Federated SSO enables centralized management of user accounts and access rights by using the IdP as the source of truth for user identity and attributes. This can simplify and automate the provisioning and deprovisioning of users across multiple applications or systems, as changes made in the IdP can be reflected in the SPs without requiring manual intervention or synchronization.
The other option is not a feature of federated SSO solutions. Federated SSO does not solve all identity and access management problems, as it still faces challenges such as security risks, compatibility issues, governance policies, and user education. References: [Federated Single Sign-On], [Set Up Federated Authentication Using SAML], [Benefits of Single Sign-On], [How Single Sign-On Improves Application Adoption Rates], [User Provisioning for Federated Single Sign-On], [Just-in-Time Provisioning for SAML], [Challenges of Single Sign-On]

QUESTION 7

Northern Trail Outfitters (NTO) wants to improve its engagement with existing customers to boost customer loyalty. To get a better understanding of its customers, NTO establishes a single customer view including their buying behaviors, channel preferences and purchasing history. All of this information exists but is spread across different systems and formats.
NTO has decided to use Salesforce as the platform to build a 360 degree view. The company already uses Microsoft Active Directory (AD) to manage its users and company assets.
What should an Identity Architect do to provision, deprovision and authenticate users?

  1. A. Salesforce Identity is not needed since NTO uses Microsoft AD.
  2. B. Salesforce Identity can be included but NTO will be required to build a custom integration with Microsoft AD.
  3. C. Salesforce Identity is included in the Salesforce licenses so it does not need to be considered separately.
  4. D. A Salesforce Identity can be included but NTO will require Identity Connect.

Correct Answer: D
Identity Connect is a Salesforce product that integrates Microsoft Active Directory with Salesforce user records. It allows provisioning, deprovisioning, and authentication of users based on AD data. The other options are either incorrect or irrelevant for this use case. References: Get to Know Identity Connect, Identit
Connect

QUESTION 8

Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wants to allow customers to login using Facebook, Google, and other social sign-on providers.
How should this functionality be enabled for UC, assuming ail social sign-on providers support OpenID Connect?

  1. A. Configure an authentication provider and a registration handler for each social sign-on provider.
  2. B. Configure a single sign-on setting and a registration handler for each social sign-on provider.
  3. C. Configure an authentication provider and a Just-In-Time (JIT) handler for each social sign-on provider.
  4. D. Configure a single sign-on setting and a JIT handler for each social sign-on provider.

Correct Answer: A
To allow customers to login using Facebook, Google, and other social sign-on providers, the identity architect should configure an authentication provider and a registration handler for each social sign-on provider. Authentication providers are configurations that enable users to authenticate with an external identity provider and access Salesforce resources. OpenID Connect is a protocol that allows users to sign in with an external identity provider, such as Facebook or Google, and access Salesforce resources. To enable this, the identity architect needs to configure an OpenID Connect Authentication Provider in Salesforce and link it to a connected app. A registration handler is a class that implements the Auth.RegistrationHandler interface and defines how to create or update users in Salesforce based on the information from the external identity provider. The registration handler can also be used to link the user’s social identity with their Salesforce identity and prevent duplicate accounts. References: OpenID Connect Authentication Providers, Social Sign-On with OpenID Connect, Create a Custom Registration Handler

QUESTION 9

In a typical SSL setup involving a trusted party and trusting party, what consideration should an Architect take into account when using digital certificates?

  1. A. Use of self-signed certificate leads to lower maintenance for trusted party because multiple self-signed certs need to be maintained.
  2. B. Use of self-signed certificate leads to higher maintenance for trusted party because they have to act as the trusted CA
  3. C. Use of self-signed certificate leads to lower maintenance for trusting party because there is no trusted CA cert to maintain.
  4. D. Use of self-signed certificate leads to higher maintenance for trusting party because the cert needs to be added to their truststore.

Correct Answer: D
D is correct because using a self-signed certificate leads to higher maintenance for the trusting party, which is the client or browser that connects to the server. The trusting party needs to add the self-signed certificate to their truststore, which is a repository of trusted certificates, in order to establish a secure connection with the server. Otherwise, the trusting party will see a warning message or an error when accessing the server.
A is incorrect because using a self-signed certificate leads to higher maintenance for the trusted party, not lower. The trusted party needs to maintain multiple self-signed certificates from different servers in their truststore.
B is incorrect because using a self-signed certificate does not make the trusted party act as the trusted CA (Certificate Authority). The trusted CA is the entity that issues and validates certificates for servers. The trusted party only needs to trust the CA’s root certificate, which is usually pre-installed in their truststore.
C is incorrect because using a self-signed certificate leads to higher maintenance for the trusting party, not lower. The trusting party still needs to maintain a trusted CA cert in their truststore, which is the self-signed certificate itself.
References: 1: SSL Certificate Installation Instructions & Tutorials - DigiCert 2: How To Install an SSL Certificate from a Commercial … - DigitalOcean 3: Setup SSL CSR Creation and SSL Certificate Installatio
- DigiCert

QUESTION 10

Universal Containers (UC) wants to use Salesforce for sales orders and a legacy of system for order fulfillment. The legacy system must update the status of orders in 65* Salesforce in real time as they are fulfilled. UC decides to use OAuth for connecting the legacy system to Salesforce. What OAuth flow should be considered that doesn't require storing credentials, client secret or refresh tokens?

  1. A. Web Server flow
  2. B. JWT Bearer Token flow
  3. C. Username-Password flow
  4. D. User Agent flow

Correct Answer: B
The JWT Bearer Token flow is an OAuth flow in which an external app (also called client or consumer app) sends a signed JSON string to Salesforce called JWT to obtain an access token. The access token can then be used by the external app to read & write data in Salesforce1. This flow does not require storing credentials, client secret or refresh tokens, as the JWT is self-contained and includes information about the app and the user2. The other flows require either user interaction (Web Server flow and User Agent flow) or storing credentials (Username-Password flow)3.
References: Salesforce OAuth : JWT Bearer Flow, Accessing Salesforce with JWT OAuth Flow, OAuth Authorization Flows - Salesforce

Page 3 of 50

Post your Comments and Discuss Salesforce Identity-and-Access-Management-Architect exam with other Community members: