Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Identity-and-Access-Management-Architect Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Questions and Answers

Questions 4

A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities.

Which Salesforce OAuth authorization flow should be used?

Options:

A.

OAuth 2.0 User-Agent

B.

OAuth 2.0 Asset Token Flow

C.

OAuth 2.0 WiT Bearer Flow

D.

OAuth 2.0 Device Flow

Buy Now
Questions 5

An Identity and Access Management (IAM) architect is tasked with unifying multiple B2C Commerce sites and an Experience Cloud community with a single identity. The solution needs to support more than 1,000 logins per minute.

What should the IAM Architect do to fulfill this requirement?

Options:

A.

Create a default account for capturing all ecommerce contacts registered on the community because personAccount is not supported for this case.

B.

Confirm performance considerations with Salesforce Customer Support due to high peaks.

C.

Configure community as a Security Assertion Markup Language (SAML) identity provider and enable Just-In-Time Provisioning to B2C Commerce.

D.

Configure both the community and the commerce sites as OAuth2 RPs (relying party) with an external identity provider.

Buy Now
Questions 6

Which two things should be done to ensure end users can only use single sign-on (SSO) to login in to Salesforce?

Choose 2 answers

Options:

A.

Enable My Domain and select " Prevent login from https://login.salesforce.com " .

B.

Request Salesforce Support to enable delegated authentication.

C.

Once SSO is enabled, users are only able to login using Salesforce credentials.

D.

Assign user " Is Single Sign-On Enabled " permission via profile or permission set.

Buy Now
Questions 7

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grants an Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

Options:

A.

4, 1, 5, 2, 3

B.

4, 5, 2, 3, 1

C.

1, 4, 5, 2, 3

D.

2, 1, 3, 4, 5

Buy Now
Questions 8

Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wants to allow customers to login using Facebook, Google, and other social sign-on providers.

How should this functionality be enabled for UC, assuming all social sign-on providers support OpenID Connect?

Options:

A.

configure a single sign-on setting and a JTT handler for each social sign-on provider.

B.

configure an authentication provider and a Auto-Time Unit handler for each social sign-on provider.

C.

configure an authentication provider and a registration handler for each social sign-on provider.

D.

configure a single sign-on setting and a registration handler for each social sign-on provider.

Buy Now
Questions 9

Northern Trail Outfitters (NTO) is using Experience Cloud as an Identity Provider for its application on Heroku. The application on Heroku should be able to handle two brands,

Northern Trail Shoes and Northern Trail Shirts.

A user should select either of the two brands in Heroku before logging into the community. The app then performs Authorization using OAuth2.0 with the Salesforce Experience Cloud site.

NTO wants to make sure it renders login page images dynamically based on the user ' s brand

preference selected in Heroku before Authorization.

What should an identity architect do to fulfill the above requirements?

Options:

A.

Create multiple login screens using Experience Builders and use Login Flows at runtime to route to different login screens.

B.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?node=value.

C.

For each brand create different communities and redirect users to the appropriate community using a custom Login controller written in Ages.

D.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?coside_value.

Buy Now
Questions 10

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

Options:

A.

Leverage OpenID Connect Token Introspection.

B.

Query using OpenID Connect discovery endpoint.

C.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

D.

Create a custom OAuth scope.

Buy Now
Questions 11

A consumer products company uses Salesforce to maintain consumer information, including orders. The company implemented a portal solution using Salesforce Experience Cloud for its consumers where the consumers can log in using their credentials. The company is considering allowing users to login with their Facebook or LinkedIn credentials.

Once enabled, what role will Salesforce play?

Options:

A.

Facebook and LinkedIn will be this SPs.

B.

Facebook and LinkedIn will act as the LIPS and SPs.

C.

Salesforce will be the service provider (SP).

D.

Salesforce will be the identity provider (LIP).

Buy Now
Questions 12

Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications. Salesforce users also use Okta to authorize a Forecasting web application to access Salesforce records on their behalf.

Which two roles are being performed by Salesforce?

Choose 2 answers

Options:

A.

OAuth Resource Server

B.

SAML Service Provider

C.

OAuth Client

D.

SAML Identity Provider

Buy Now
Questions 13

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before performing any further operation on the portal.

Which approach will meet this requirement?

Options:

A.

Create a custom landing page and email campaign asking all community members to login and verify their data.

B.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

C.

Create tasks for users who need to update their data or accept the new community rules.

D.

Create a login flow that conditionally prompts users who have not accepted the new community rules and who have missing or outdated information.

Buy Now
Questions 14

Users logging into Salesforce are frequently prompted to verify their identity.

The identity architect is required to provide recommendations so that frequency of prompt verification can be reduced.

What should the identity architect recommend to meet the requirement?

Options:

A.

Implement an single sign-on for Salesforce using an external identity provider.

B.

Set trusted IP ranges for the organization.

C.

Implement 2FA authentication for the Salesforce org.

D.

Implement multi-factor authentication for the Salesforce org.

Buy Now
Questions 15

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Facebook and Twitter credentials.

What should an identity architect recommend to meet these requirements?

Options:

A.

create a custom external authentication provider for Facebook.

B.

obtain login icon for Facebook and Twitter.

C.

configure a predefined authentication provider for Facebook and Twitter.

D.

create a custom external authentication provider for Twitter.

Buy Now
Questions 16

An identity professional, responsible for ensuring secure access to the Salesforce platform, needs to audit and verify user activity during and after login. They want to monitor login attempts, track user authentication methods, and identify suspicious behavior or unauthorized access.

Which tool or feature should they leverage to achieve this objective?

Options:

A.

Customer Account Processes

B.

Salesforce Login History

C.

Salesforce Skield

D.

Salesforce Lightning Flow

Buy Now
Questions 17

Universal Containers is building a web application that will connect with the Salesforce API using JWT OAuth Flow.

Which two settings need to be configured in the connect app to support this requirement?

Choose 2 answers

Options:

A.

The Use Digital Signature option in the connected app.

B.

The " web " OAuth scope in the connected app.

C.

The " api " OAuth scope in the connected app.

D.

The " eclair_api " OAuth scope in the connected app.

Buy Now
Questions 18

Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO inactivated the user account and needs to perform a forensic analysis and identify signals that could indicate a breach has occurred.

What should NTO’s first step be in gathering signals that could indicate account compromise?

Options:

A.

download the identity provider Event log and contact the details of activities performed by the user.

B.

download the Login history and evaluate the details of topics performed by the user.

C.

download the Setup Audit Trail and review all recent activities performed by the user.

D.

Review the User record and evaluate the login and transaction history.

Buy Now
Questions 19

Northern Trail Outfitters manages application functional permissions centrally as Active Directory groups. The CRM_SuperUser and CRM_Reporting_SuperUser groups should respectively give the user the SuperUser and Reporting_SuperUser permission set in Salesforce. Salesforce is the service provider to a Security Assertion Markup Language (SAML) identity provider.

How should an identity architect ensure the Active Directory groups are reflected correctly

when a user accesses Salesforce?

Options:

A.

Use the Apex Just-in-Time handler to query custom SAML attributes and set permission sets.

B.

Use a login flow to query standard SAML attributes and set permission sets.

C.

Use a login flow to query custom SAML attributes and set permission sets.

D.

Use the Apex Just-in-Time handler to query standard SAML attributes and set permission sets.

Buy Now
Questions 20

Universal Containers is implementing a new Experience Cloud site and the identity architect wants to use dynamic branding features as part of the login process.

Which two options should the identity architect recommend to support dynamic branding for the site?

Choose 2 answers

Options:

A.

To use dynamic branding, the community must be built with the Audience + Salesforce Tabs template.

B.

Do use dynamic branding, the community must be built with the Customer Account Portal template.

C.

An external content management system (CMS) must be used for dynamic branding on Experience Cloud sites.

D.

An experience ID (expid) or placeholder parameter must be used in the URL to represent the brand.

Buy Now
Questions 21

An Identity architect works for a multinational, multi-brand organization. As they work with the organization to understand their Customer Identity and Access Management requirements, the identity architect learns that the brand experience is different for each of the customer’s sub-brands and each of these branded experiences must be carried through the login experience depending on which sub-brand the user is logging into.

Which solution should the architect recommend to support scalability and reduce maintenance costs, if the organization has more than 150 sub-brands?

Options:

A.

Create a community subdomain for each sub-brand and customize the look and feel of the Login page for each community subdomain to match the brand.

B.

Assign each sub-brand a unique Experience ID and use the Experience ID to dynamically brand the login experience.

C.

Create a separate Salesforce org for each sub-brand so that each sub-brand has complete control over the user experience.

D.

Use Audiences to customize the login experience for each sub-brand and pass an audience ID to the community during the DAuth and Security Assertion Markup Language (SANL) flows.

Buy Now
Questions 22

Universal Containers has multiple Salesforce instances where users receive emails from different instances. Users should be logged into the correct Salesforce instance authenticated by their IdP when clicking on an email link to a Salesforce record.

What should be enabled in Salesforce as a prerequisite?

Options:

A.

External Identity

B.

My Domain

C.

Multi-Factor Authentication

D.

Identity Provider

Buy Now
Questions 23

An identity professional is working on the configuration of a connected app for Universal Container’s (UC) partner portal. UC wants to allow external users to access certain Salesforce data and perform limited actions. However, they also want to enforce additional security measures, such as IP restrictions and session timeout settings.

Which configuration option should be used to enforce IP restrictions and session timeout

settings for the connected app?

Options:

A.

Session Settings

B.

Login IP Ranges

C.

Custom Permissions

D.

Connected App QAuth policies

Buy Now
Questions 24

The CMO of an advertising company has invited an Identity and Access Management (IAM) specialist to discuss Salesforce out-of-box capabilities for configuring the company ' s login and registration experience on Salesforce Experience Cloud.

The CMO is looking to brand the login page with the company ' s logo, background color, login button color, and dynamic right-frame from an external URL.

Which two solutions should the IAM specialist recommend?

Choose 2 answers:

Options:

A.

Login & Registration pages can be branded in the Community Administration settings.

B.

Build custom site pages for reset and forget password features.

C.

Build custom pages for handling requirements as Experienced Cloud.

D.

Use Experience Builder to build branded Reset and Forget Password pages.

Buy Now
Questions 25

A company with 15,000 employees is using Salesforce and would like to take the necessary steps to highlight or curb fraudulent activity.

Which tool should be used to track login data, such as the average number of logins, who logged in more than the average number of times and who logged in during non-business hours?

Options:

A.

Login Inspector

B.

Login Forensics

C.

Login Report

D.

Login History

Buy Now
Questions 26

Universal Containers (UC) is using its production org as the identity provider for a new Experience Cloud site and the identity architect is deciding which login experience to use for the site.

Which two page types are valid login page types for the site?

Choose 2 answers

Options:

A.

Login Discovery Page

B.

Experience Builder Page

C.

Embedded Login Page

D.

Lightning Experience Page

Buy Now
Questions 27

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type). Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Scopes

B.

Client ID

C.

Authorization Code

D.

Verification Code

E.

Refresh Token

Buy Now
Questions 28

Universal Containers is implementing Salesforce Identity to broker authentication from its enterprise single sign-on (550) solution through Salesforce to third party applications using SAML.

What role does Salesforce Identity play in its relationship with the enterprise S50 system?

Options:

A.

Service Provider {SP)

B.

Identity Provider [IdP)

C.

Resource Server

D.

Client Application

Buy Now
Questions 29

A global company is using the Salesforce Platform as an Identity Provider and needs to integrate a third-party application with its Experience Cloud customer portal.

Which two features should be utilized to provide users with login and identity services for the third-party application?

Choose 2 answers

Options:

A.

Use the App Launcher with single sign-on (SSO).

B.

Use Delegated Authentication.

C.

Use a connected app.

D.

External a Data source with Named Principal identity type.

Buy Now
Questions 30

Northern Trail Outfitters (NTO) is setting up Salesforce to authenticate users with an external identity provider. The NTO Salesforce Administrator is having trouble getting things setup.

What should an identity architect use to show which part of the login assertion is failing?

Options:

A.

Security Assertion Markup Language Validator

B.

Connected App Manager

C.

SAML Metadata file importer

D.

Identity Provider Metadata download

Buy Now
Questions 31

Universal Containers is creating a web application that will be secured by Salesforce Identity using the OAuth 2.0 Web Server Flow (this flow uses the OAuth 2.0 authorization code grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Verification URL

B.

Authentication Token

C.

Scopes

D.

Access Token

E.

Client Secret

Buy Now
Questions 32

The executive sponsor for an organization has asked if Salesforce supports the ability to embed a login widget into its service providers in order to create a more seamless user experience.

What should be used and considered before recommending it as a solution on the Salesforce Platform?

Options:

A.

Embedded Login. Identify what level of UI customization will be required to make it match the service providers look and feel.

B.

Salesforce REST APIs. Ensure that Secure Sockets Layer (SSL) connection for the integration is used.

C.

OpenID Connect Web Server Flow. Determine if the service provider is secure enough to store the client secret on.

D.

Embedded Login. Consider whether or not it relies on third party cookies which can cause browser compatibility issues.

Buy Now
Exam Name: Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)
Last Update: Apr 20, 2026
Questions: 109

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90