Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

Identity-and-Access-Management-Architect Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Questions and Answers

Questions 4

Northern Trail Outfitters (NTO) has a requirement to ensure all user logins include a single multi-factor authentication (MFA) prompt. Currently, users are allowed the choice to login with a username and password or via single sign-on against NTO’s corporate Identity Provider, which includes built-in MFA.

Which configuration will meet this requirement?

Options:

A.

Create and assign a permission set to all employees that includes “MFA for User Interface Logins.”

B.

Create a custom login flow that enforces MFA and assign it to a permission set. Then assign the permission set to all employees.

C.

Enable “MFA for User Interface Logins” for your organization from Setup - > Identity Verification.

D.

For all employee profiles, set the Session Level Required at Login to High Assurance and add the corporate identity provider to the High Assurance list for the org ' s Session Security Levels.

Buy Now
Questions 5

Northern Trail Outfitters (NTO) is planning to roll out a partner portal for its distributors using Experience Cloud. NTO would like to use an external identity provider (IdP) and for partners to register for access to the portal. Each partner should be allowed to register only once to avoid duplicate accounts with Salesforce.

What should a identity architect recomend to create partners?

Options:

A.

Create a custom page in Experience Cloud to self register partner with Experience Cloud and Ping Identity store.

B.

On successful creation of Partners using Self Registration page in Experience Cloud, create Identity in Ping.

C.

Create a custom web page in the Portal and create users in the IdP and Experience Cloud

using published APIs.

D.

Allow partners to register through the IdP and create partner users in Salesforce through an API.

Buy Now
Questions 6

Universal Containers uses Salesforce as an identity provider and Concur as the Employee Expense management system. The HR director wants to ensure Concur accounts for employees are created only after the appropriate approval in the Salesforce org.

Which three steps should the identity architect use to implement this requirement?

Choose 3 answers

Options:

A.

Create an approval process for User object associated with the provisioning flow.

B.

Create an approval process for a custom object associated with the provisioning flow.

C.

Create an approval process for UserProviderRequests object associated with the provisioning flow.

D.

Enable User Provisioning for the connected app.

E.

Create a connected app for Concur in Salesforce.

Buy Now
Questions 7

Northern Trail Outfitters wants to enable single sign-on (SSO) for its Salesforce platform by integrating it with an identity provider (IdP).

Which step should be performed to establish the trust between Salesforce and the identity provider (IdP)?

Options:

A.

Setting up a VPN (Virtual Private Network) tunnel between Salesforce and the identity provider for secure communication.

B.

Embedding the identity provider’s authentication code directly into Salesforce source code.

C.

Configuring a trust relationship by exchanging metadata XML files between Salesforce and the IdP.

D.

Creating a custom login page within the Salesforce platform for user authentication.

Buy Now
Questions 8

Universal Containers (UC) is considering a Customer 360 initiative to gain a single source of the truth for its customer data across disparate systems and services. UC wants to understand the primary benefits of Customer 360 Identity and how it contributes to a successful Customer 360 Truth project.

What are two are key benefits of Customer 360 Identity as it relates to Customer 360?

Choose 2 answers

Options:

A.

Customer 360 Identity automatically integrates with Customer 360 Data Manager and Customer 360 Audiences to seamlessly populate all user data.

B.

Customer 360 Identity supports multiple brands so you can deliver centralized identity services and correlation of user activity, even if it spans multiple corporate brands and user experiences.

C.

Customer 360 Identity enables an organization to build a simple login for each of its customers, giving the organization an understanding of the user’s login activity across all its digital properties and applications.

D.

Customer 360 Identity not only provides a unified sign up and sign in experience, but also tracks anonymous user activity prior to signing up so organizations can understand user activity before and after the users identify themselves.

Buy Now
Questions 9

A technology enterprise is planning to implement single sign-on login for users. When users log in to Salesforce, data should be populated in User object custom fields.

Which two steps should an identity architect recommend?

Choose 2 answers

Options:

A.

Implement Auth.SamJitHandler Interface.

B.

Implement SessionManagement Class.

C.

Create and update methods.

D.

Implement RegistrationHandler Interface.

Buy Now
Questions 10

A large consumer company is planning to create a community and will require login through the customers social identity. The following requirements must be met:

1. The customer should be able to login with any of their social identities, however Salesforce should only have one user per customer.

2. Once the customer has been identified with a social identity, they should not be required to authorize Salesforce.

3. The customers personal details from the social sign on need to be captured when the customer logs into Salesforce using their social identity.

3. If the customer modifies their personal details in the social site, the changes should be updated in Salesforce .

Which two options allow the Identity Architect to fulfill the requirements?

Choose 2 answers

Options:

A.

Use Login Flows to call an authentication registration handler to provision the user before logging the user into the community.

B.

Use the custom registration handler to link social identities to Salesforce identifies.

C.

Use authentication providers for social sign-on and use the custom registration handler to insert or update personal details.

D.

Redirect the user to a custom page that allows the user to select an existing social identity for login.

Buy Now
Questions 11

An identity architect ' s client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of IT is worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.

What should the identity architect recommend to make sure that there is additional trust between the SP and the IdP?

Options:

A.

Ensure that there is an HTTPS connection between IDP and SP.

B.

Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.

C.

Ensure that the Issuer and Assertion Consumer Service (ACS) URL is properly configured between SP and IDP.

D.

Ensure that on the SSO settings page, the " Request Signing Certificate " field has a selfsigned certificate.

Buy Now
Questions 12

An identity architect has been asked to recommend a solution that allows administrators to configure personalized alert messages to users before they land on the Experience Cloud site (formerly known as Community) homepage.

What is recommended to fulfill this requirement with the least amount of customization?

Options:

A.

Customize the registration handler Apex class to create a routing logic navigating to different home pages based on the user profile.

B.

Use Login Flows to add a screen that shows personalized alerts.

C.

Create custom metadata that stores user alerts and use a LWC to display alerts.

D.

Build a Lightning Web Component (LWC) for a homepage that shows custom alerts.

Buy Now
Questions 13

Northern Trail Outfitters recently acquired a company. Each company will retain its Identity Provider (IdP). Both companies rely extensively on Salesforce processes that send emails to users to take specific actions in Salesforce.

How should the combined companys ' employees collaborate in a single Salesforce org, yet authenticate to the appropriate IdP?

Options:

A.

Configure unique MyDomains for each company and have generated links use the appropriate MyDomain in the URL.

B.

Have generated links append a quenystring parameter indicating the IdP. The login service will redirect to the appropriate IdP.

C.

Enable each IdP as a login option in the My Domain Authentication Service settings. Users will then click on the appropriate IdP button.

D.

Have generated links be prefixed with the appropriate IdP URL to invoke an idP-initiated Security Assertion Markup Language flow when clicked.

Buy Now
Questions 14

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Amazon credentials.

What should an identity architect recommend to meet these requirements?

Options:

A.

Create a custom external authentication provider for Amazon.

B.

Configure Amazon as & connected app.

C.

Configure an OpenlD Connect Authentication Provider for Amazon.

D.

Configure a predefined authentication provider for Amazon.

Buy Now
Questions 15

Universal Containers (UC) is building a custom employee hub application on Amazon Web Services (AWS) and would like to store their users ' credentials there. Users will also need access to Salesforce for internal operations. UC has tasked an identity architect with evaluating different solutions for authentication and authorization between AWS and Salesforce.

How should an identity architect configure AWS to authenticate and authorize Salesforce users?

Options:

A.

Create a custom external authentication provider.

B.

Develop a custom Auth server in AWS.

C.

Configure the custom employee app as a connected app.

D.

Configure AWS as an OpenID Connect Provider.

Buy Now
Questions 16

An identity professional is working on the configuration of a connected app for Universal Container’s (UC) partner portal. UC wants to allow external users to access certain Salesforce data and perform limited actions. However, they also want to enforce additional security measures, such as IP restrictions and session timeout settings.

Which configuration option should be used to enforce IP restrictions and session timeout

settings for the connected app?

Options:

A.

Session Settings

B.

Login IP Ranges

C.

Custom Permissions

D.

Connected App QAuth policies

Buy Now
Questions 17

Northern Trail Outfitters (NTO) utilizes a third-party cloud solution for an employee portal. NTO also owns Salesforce Service Cloud and would like employees to be able to login to Salesforce with their third-party portal credentials for a seamless experience. The third-party employee portal only supports OAuth.

What should an Identity architect recommend to enable single sign-on (SSO) between the portal and Salesforce?

Options:

A.

Add the third-party portal as a connected app.

B.

Configure Salesforce for Delegated Authentication.

C.

Create a custom external authentication provider.

D.

Configure SSO with OpenlD Connect and leverage the third party portal as an identity provider.

Buy Now
Questions 18

Northern Trail Outfitters manages application functional permissions centrally as Active Directory groups. The CRM_SuperUser and CRM_Reporting_SuperUser groups should respectively give the user the SuperUser and Reporting_SuperUser permission set in Salesforce. Salesforce is the service provider to a Security Assertion Markup Language (SAML) identity provider.

How should an identity architect ensure the Active Directory groups are reflected correctly

when a user accesses Salesforce?

Options:

A.

Use the Apex Just-in-Time handler to query custom SAML attributes and set permission sets.

B.

Use a login flow to query standard SAML attributes and set permission sets.

C.

Use a login flow to query custom SAML attributes and set permission sets.

D.

Use the Apex Just-in-Time handler to query standard SAML attributes and set permission sets.

Buy Now
Questions 19

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before performing any further operation on the portal.

Which approach will meet this requirement?

Options:

A.

Create a custom landing page and email campaign asking all community members to login and verify their data.

B.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

C.

Create tasks for users who need to update their data or accept the new community rules.

D.

Create a login flow that conditionally prompts users who have not accepted the new community rules and who have missing or outdated information.

Buy Now
Questions 20

A technology enterprise is planning to implement single sign-on login for users. When users log in to Salesforce, data should be populated in User object custom fields.

Which two steps should an identity architect recommend?

Choose 2 answers

Options:

A.

Implement Registration/Handle Interface.

B.

Implement SessionManagement Class.

C.

Implement Auth.SumIDHandler Interface.

D.

Create and update methods.

Buy Now
Questions 21

Universal Containers (UC) is using its production org as the identity provider for a new Experience Cloud site and the identity architect is deciding which login experience to use for the site.

Which two page types are valid login page types for the site?

Choose 2 answers

Options:

A.

Login Discovery Page

B.

Experience Builder Page

C.

Embedded Login Page

D.

Lightning Experience Page

Buy Now
Questions 22

A financial services company uses Salesforce and has a compliance requirement to track information about devices from which users log in. Also, a Salesforce Security Administrator

needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

Options:

A.

Use multi-factor authentication (MFA) to meet the compliance requirement to track device information.

B.

Use the Login History object to track information about devices from which users log in.

C.

Use Login Flows to capture device from which users log in and store device and user information in a custom object.

D.

Use the Activations feature to meet the compliance requirement to track device information.

Buy Now
Questions 23

A leading fitness tracker company is getting ready to launch a customer community. The company wants its customers to login to the community and connect their fitness device to their profile. Customers should be able to obtain exercise details and fitness recommendation in the community.

Which should be used to satisfy this requirement?

Options:

A.

Named Credentials

B.

Login Flows

C.

OAuth Device Flow

D.

OAuth Asset Token flow

Buy Now
Questions 24

A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for passwordless login.

Which feature should an identity architect recommend to meet the requirements?

Options:

A.

Integrate with social websites (Facebook, LinkedIn, Twitter)

B.

Use Login Discovery

C.

Create a custom Lightning Web Component

D.

Use an external Identity Provider

Buy Now
Questions 25

A financial enterprise is planning to set up a user authentication mechanism to login to the Salesforce system. Due to regulatory requirements, the CIO of the company wants user administration, including passwords and authentication requests, to be managed by an external system that is only accessible via a SOAP webservice.

Which authentication mechanism should an identity architect recommend to meet the requirements?

Options:

A.

Just-in-Time Provisioning

B.

Delegated Authentication

C.

Security Assertion Markup Language (SANL) Single Sign On

D.

OAuth Web-Server Flow

Buy Now
Questions 26

Universal Containers want users to be able to log in to the Salesforce mobile app with their Active Directory password. Employees are unable to use mobile VPN.

Which two options should an identity architect recommend to meet the requirement?

Choose 2 answers

Options:

A.

Active Directory Password Since Plugin

B.

Salesforce Identity Connect

C.

Salesforce Trigger & Field on Contact Object

D.

Configure Cloud Provider Load Balancer

Buy Now
Questions 27

Northern Trail Outfitters (NTO) is using Experience Cloud as an Identity Provider for its application on Heroku. The application on Heroku should be able to handle two brands,

Northern Trail Shoes and Northern Trail Shirts.

A user should select either of the two brands in Heroku before logging into the community. The app then performs Authorization using OAuth2.0 with the Salesforce Experience Cloud site.

NTO wants to make sure it renders login page images dynamically based on the user ' s brand

preference selected in Heroku before Authorization.

What should an identity architect do to fulfill the above requirements?

Options:

A.

Create multiple login screens using Experience Builders and use Login Flows at runtime to route to different login screens.

B.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?node=value.

C.

For each brand create different communities and redirect users to the appropriate community using a custom Login controller written in Ages.

D.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?coside_value.

Buy Now
Questions 28

Universal Containers wants to secure its Salesforce APIs by using an existing Security Assertion Markup Language (SAML) configuration that supports the company ' s single signon process to Salesforce.

Which Salesforce OAuth authorization flow should be used?

Options:

A.

OAuth 2.0 JWT Bearer Flow

B.

OAuth 2.0 SAML Bearer Assertion Flow

C.

OAuth 2.0 User-Agent Flow

D.

SAML Assertion Flow

Buy Now
Questions 29

Northern Trail Outfitters (NTO) leverages Microsoft Active Directory (AD) for management of employee usernames, passwords, permissions, and asset access. NTO also owns a third-party single sign-on (SSO) solution. The third-party party SSO solution is used for all corporate applications, including Salesforce.

NTO has asked an architect to explore Salesforce Identity Connect for automatic provisioning and deprovisioning of users in Salesforce.

What role does Identity Connect play in the outlined requirements?

Options:

A.

Single Sign-On

B.

Identity Provider

C.

Service Provider

D.

User Management

Buy Now
Questions 30

A global fitness equipment manufacturer is planning to sell fitness tracking devices and has the following requirements:

1) Customer purchases the device.

2) Customer registers the device using their mobile app.

3) A case should automatically be created in Salesforce and associated with the customers

account in cases where the device registers issues with tracking.

Which OAuth flow should be used to meet these requirements?

Options:

A.

OAuth 2.0 User-Agent Flow

B.

OAuth 2.0 Asset Token Flow

C.

OAuth 2.0 Device Flow

D.

OAuth 2.0 SAVL Server Assertion Flow

Buy Now
Questions 31

Universal Containers is implementing a new Experience Cloud site and the identity architect wants to use dynamic branding features as part of the login process.

Which two options should the identity architect recommend to support dynamic branding for the site?

Choose 2 answers

Options:

A.

To use dynamic branding, the community must be built with the Audience + Salesforce Tabs template.

B.

Do use dynamic branding, the community must be built with the Customer Account Portal template.

C.

An external content management system (CMS) must be used for dynamic branding on Experience Cloud sites.

D.

An experience ID (expid) or placeholder parameter must be used in the URL to represent the brand.

Buy Now
Questions 32

A farming enterprise offers smart farming technology to its farmer customers, which includes a variety of sensors for livestock tracking, pest monitoring, climate monitoring etc.

They plan to store all the data in Salesforce. They would also like to ensure timely maintenance of the installed sensors. They have engaged a Salesforce Architect to propose an appropriate way to send an alert when something goes wrong.

Which OAuth flow should the architect recommend?

Options:

A.

OAuth 2.0 SAML Bearer Assertion Flow

B.

OAuth 2.0 Device Authentication Flow

C.

OAuth 2.0 Asset Token Flow

D.

OAuth 2.0 JWT Bearer Token Flow

Buy Now
Exam Name: Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)
Last Update: Apr 7, 2026
Questions: 109
Identity-and-Access-Management-Architect pdf

Identity-and-Access-Management-Architect PDF

$25.5  $84.99
Identity-and-Access-Management-Architect Engine

Identity-and-Access-Management-Architect Testing Engine

$30  $99.99
Identity-and-Access-Management-Architect PDF + Engine

Identity-and-Access-Management-Architect PDF + Testing Engine

$40.5  $134.99