Salesforce IDENTITY AND ACCESS MANAGEMENT ARCHITECT Exam Questions

Questions for the IDENTITY AND ACCESS MANAGEMENT ARCHITECT were updated on : Dec 01 ,2025

Page 1 out of 17. Viewing questions 1-15 out of 248

Question 1

Northern Trail Outfitters mar ages functional group permissions in a custom security application
supported by a relational database and a REST service layer. Group permissions are mapped as
permission sets in Salesforce.
Which action should an identity architect use to ensure functional group permissions are reflected as
permission set assignments?

  • A. Use a Login Flow to query SAML attributes and set permission sets.
  • B. Use a Login Flow with invocable Apex to callout to the security application and set permission sets.
  • C. Use the Apex Just-in-Time (JIT) handler to query the Security Assertion markup Language (SAML) attributes and set permission sets.
  • D. Use the Apex JIT handler to callout to the security application and set permission sets
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Universal Containers wants to secure its Salesforce APIs by using an existing Security Assertion
Markup Language (SAML) configuration supports the company's single sign-on process to Salesforce,
Which Salesforce OAuth authorization flow should be used?

  • A. OAuth 2.0 SAML Bearer Assertion Flow
  • B. A SAML Assertion Row
  • C. OAuth 2.0 User-Agent Flow
  • D. OAuth 2.0 JWT Bearer Flow
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

An identity architect's client has a homegrown identity provider (IdP). Salesforce is used as the
service provider (SP). The head of IT is worried that during a SP initiated single sign-on (SSO), the
Security Assertion Markup Language (SAML) request content will be altered.
What should the identity architect recommend to make sure that there is additional trust between
the SP and the IdP?

  • A. Ensure that there is an HTTPS connection between IDP and SP.
  • B. Ensure that on the SSO settings page, the "Request Signing Certificate" field has a self-signed certificate.
  • C. Ensure that the Issuer and Assertion Consumer service (ACS) URL is property configured between SP and IDP.
  • D. Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

A public sector agency is setting up an identity solution for its citizens using a Community built on
Experience Cloud and requires the new user registration functionality to capture first name, last
name, and phone number. The phone number will be used for identity verification.
Which feature should an identity architect recommend to meet the requirements?

  • A. Integrate with social websites (Facebook, Linkedin. Twitter)
  • B. Use an external Identity Provider
  • C. Create a custom Lightning Web Component
  • D. Use Login Discovery
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Northern Trail Outfitters would like to use a portal built on Salesforce Experience Cloud for customer
self-service. Guests of the portal be able to self-register, but be unable to automatically be assigned
to a contact record until verified. External Identity licenses have bee purchased for the project.
After registered guests complete an onboarding process, a flow will create the appropriate account
and contact records for the user.
Which three steps should an identity architect follow to implement the outlined requirements?
Choose 3 answers

  • A. Enable "Allow customers and partners to self-register".
  • B. Select the "Configurable Self-Reg Page" option under Login & Registration.
  • C. Set jp an external login page and call Salesforce APIs for user creation.
  • D. Customize the self-registration Apex handler to temporarily associate the user to a shared single contact record.
  • E. Customize me self-registration Apex handler to create only the user record.
Answer:

A, B, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 6

Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO
inactivated the user account and needs U perform a forensic analysis and identify signals that could
Indicate a breach has occurred.
What should NTO's first step be in gathering signals that could indicate account compromise?

  • A. Review the User record and evaluate the login and transaction history.
  • B. Download the Setup Audit Trail and review all recent activities performed by the user.
  • C. Download the Identity Provider Event Log and evaluate the details of activities performed by the user.
  • D. Download the Login History and evaluate the details of logins performed by the user.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

When designing a multi-branded Customer Identity and Access Management solution on the
Salesforce Platform, how should an identity architect ensure a specific brand experience in Salesforce
is presented?

  • A. The Experience ID, which can be included in OAuth/Open ID flows and Security Assertion Markup Language (SAML) flows as a URL parameter.
  • B. Provide a brand picker that the end user can use to select its sub-brand when they arrive on salesforce.
  • C. Add a custom parameter to the service provider's OAuth/SAML call and implement logic on its login page to apply branding based on the parameters value.
  • D. The Audience ID, which can be set in a shared cookie.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Northern Trail Outfitters (NTO) has an off-boarding process where a terminated employee is first
disabled in the Lightweight Directory Act Protocol (LDAP) directory, then requests are sent to the
various application support teams to finish user deactivations. A terminated employee recently was
able to login to NTO's Salesforce instance 24 hours after termination, even though the user was
disabled in the corporate LDAP directory.
What should an identity architect recommend to prevent this from happening in the future?

  • A. Create a Just-in-Time provisioning registration handler to ensure users are deactivated in Salesforce as they are disabled in LDAP.
  • B. Configure an authentication provider to delegate authentication to the LDAP directory.
  • C. use a login flow to make a callout to the LDAP directory before authenticating the user to Salesforce.
  • D. Setup an identity provider (IdP) to authenticate users using LDAP, set up single sign-on to Salesforce and disable Login Form authentication.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

A university is planning to set up an identity solution for its alumni. A third-party identity provider
will be used for single sign-on Salesforce will be the system of records. Users are getting error
messages when logging in.
Which Salesforce feature should be used to debug the issue?

  • A. Apex Exception Email
  • B. View Setup Audit Trail
  • C. Debug Logs
  • D. Login History
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

An insurance company has a connected app in its Salesforce environment that is used to integrate
with a Google Workspace (formerly knot as G Suite).
An identity and access management (IAM) architect has been asked to implement automation to
enable users, freeze/suspend users, disable users, and reactivate existing users in Google Workspace
upon similar actions in Salesforce.
Which solution is recommended to meet this requirement?

  • A. Configure user Provisioning for Connected Apps.
  • B. Update the Security Assertion Markup Language Just-in-Time (SAML JIT) handler in Salesforce for user provisioning and de-provisioning.
  • C. Build a custom REST endpoint in Salesforce that Google Workspace can poll against.
  • D. Build an Apex trigger on the userlogin object to make asynchronous callouts to Google APIs.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Universal Containers is creating a web application that will be secured by Salesforce Identity using
the OAuth 2.0 Web Server Flow uses the OAuth 2.0 authorization code grant type).
Which three OAuth concepts apply to this flow?
Choose 3 answers

  • A. Verification URL
  • B. Client Secret
  • C. Access Token
  • D. Scopes
Answer:

B, C, D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

An administrator created a connected app for a custom wet) application in Salesforce which needs to
be visible as a tile in App Launcher The tile for the custom web application is missing in the app
launcher for all users in Salesforce. The administrator requested assistance from an identity architect
to resolve the issue.
Which two reasons are the source of the issue?
Choose 2 answers

  • A. StartURL for the connected app is not set in Connected App settings.
  • B. OAuth scope does not include "openid*.
  • C. Session Policy is set as 'High Assurance Session required' for this connected app.
  • D. The connected app is not set in the App menu as 'Visible in App Launcher".
Answer:

A, C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Northern Trail Outfitters (NTO) recently purchased Salesforce Identity Connect to streamline user
provisioning across Microsoft Active Directory (AD) and Salesforce Sales Cloud.
NTO has asked an identity architect to identify which salesforce security configurations can map to
AD permissions.
Which three Salesforce permissions are available to map to AD permissions?
Choose 3 answers

  • A. Public Groups
  • B. Field-Level Security
  • C. Roles
  • D. Sharing Rules
  • E. Profiles and Permission Sets
Answer:

A, C, E

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 14

An identity architect is setting up an integration between Salesforce and a third-party system. The
third-party system needs to authenticate to Salesforce and then make API calls against the REST API.
One of the requirements is that the solution needs to ensure the third party service providers
connected app in Salesforce mini need for end user interaction and maximizes security.
Which OAuth flow should be used to fulfill the requirement?

  • A. JWT Bearer Flow
  • B. Web Server Flow
  • C. User Agent Flow
  • D. Username-Password Flow
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was
recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications.
Salesforce users also use Okta to authorize a Forecasting web application to access Salesforce records
on their behalf.
Which two roles are being performed by Salesforce?
Choose 2 answers

  • A. SAML Identity Provider
  • B. OAuth Client
  • C. OAuth Resource Server
  • D. SAML Service Provider
Answer:

B, D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2