Question 6 of 32

An Architect needs to advise the team that manages the Identity Provider how to differentiate Salesforce from other Service Providers.

What SAML SSO setting in Salesforce provides this capability?

    Correct Answer: C

    To differentiate Salesforce from other Service Providers in a SAML SSO setting, the Entity Id is used. The Entity Id uniquely identifies the Service Provider, which in this case is Salesforce. This identification is essential for managing multiple Service Providers within the Identity Provider.

Question 7 of 32

Universal Containers (UC) uses middleware to integrate multiple systems with Salesforce. UC has a strict, new requirement that usernames and passwords cannot be stored in any UC system.

How can UC's middleware authenticate to Salesforce while adhering to this requirement?

    Correct Answer: B

    To meet the requirement that usernames and passwords cannot be stored, UC should use the JWT Bearer Token OAuth Flow. This flow allows systems to authenticate without needing to store or send user credentials. Instead, it uses a digitally signed JSON Web Token (JWT) that authenticates the identity of the system making the request.

Question 8 of 32

Customer Service Representatives at Universal Containers (UC) are complaining that whenever they click on links to case records and are asked to log in with SAML SSO, they are being redirected to the Salesforce Home tab and not the specific case record.

What item should an Architect advise the identity team at UC to investigate first?

    Correct Answer: D

    When Customer Service Representatives are being redirected to the Salesforce Home tab instead of the specific case record after logging in with SAML SSO, the issue likely lies with the handling of the RelayState parameter. RelayState is used in SAML SSO to maintain the state of the user's session, including the URL they were trying to access before being redirected to the identity provider. If the Identity Provider is not correctly preserving the RelayState, users will not be redirected to the intended record after successfully logging in, but rather to a default location such as the Home tab. Therefore, ensuring that the Identity Provider is correctly preserving the RelayState is crucial in this scenario.

Question 9 of 32

Universal Containers has implemented a multi-org strategy and would like to centralize the management of their Salesforce user profiles.

What should the Architect recommend to allow Salesforce profiles to be managed from a central system of record?

    Correct Answer: A

    To centralize the management of Salesforce user profiles in a multi-org environment, implementing Just-In-Time (JIT) provisioning on the SAML Identity Provider (IdP) is an effective solution. JIT provisioning allows the IdP to create and update Salesforce user profiles dynamically each time a user logs into Salesforce, ensuring that the profiles are always up-to-date without the need for manual intervention. By passing the ProfileID in each assertion, the IdP can specify which profile should be assigned to the user, streamlining the management process across multiple orgs.

Question 10 of 32

Universal Containers (UC) is looking to purchase a third-party application as an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice.

Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? (Choose two.)

    Correct Answer: A, D

    An Identity Provider (IdP) serves the primary role of authenticating and authorizing users across multiple applications, improving security and user convenience. The ability to authenticate multiple applications is crucial because it allows seamless access management from a single source, which simplifies user experience and enhances security across the organization. Additionally, centralizing enterprise password policy helps enforce consistent security policies across all connected applications, reducing the risk of security breaches due to weak passwords or non-compliant password practices.