Which Salesforce OAuth authorization flow should be used?
A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities. Which Salesforce OAuth authorization flow should be used?A . OAuth 2.0 JWT Bearer How B. OAuth 2.0 Device Flow C. OAuth 2.0 User-Agent Flow D. OAuth 2.0 Asset Token FlowView AnswerAnswer:...
What implementation should an Architect recommend to UC?
Universal Containers (UC) has an existing web application that it would like to access from Salesforce without requiring users to re-authenticate. The web application is owned UC and the UC team that is responsible for it is willing to add new javascript code and/or libraries to the application . What...
What Authorization flow should the Architect recommend?
Universal Containers (UC) has a desktop application to collect leads for marketing campaigns. UC wants to extend this application to integrate with Salesforce to create leads. Integration between the desktop application and Salesforce should be seamless. What Authorization flow should the Architect recommend?A . JWT Bearer Token Flow B. Web...
Which Salesforce feature should be used to debug the issue?
A university is planning to set up an identity solution for its alumni. A third-party identity provider will be used for single sign-on Salesforce will be the system of records. Users aregetting error messages when logging in. Which Salesforce feature should be used to debug the issue?A . Apex Exception...
What mechanism should an architect put in place to enable a trusted connection between the login services and salesforce?
Universal containers (UC) is setting up Delegated Authentication to allow employees to log inusing their corporate credentials. UC's security team is concerned about the risk of exposing the corporate login service on the Internet and has asked that a reliable trust mechanism be put in place between the login service...
Which two optimal actions should the Architect take to troubleshoot the issue?
An Architect has configured a SAML-based SSO integration between Salesforce and an external Identity provider and is ready to test it. When the Architect attempts to log in to Salesforce using SSO, the Architect receives a SAML error . Which two optimal actions should the Architect take to troubleshoot the...
What is the recommended approach to fulfill this requirement?
Enter a verification code that is to be sent via email or text . What is the recommended approach to fulfill this requirement?A . Create a Login Discovery page and provide a Login Discovery Handler Apex class. B. Create a custom login page with an Apex controller. The controller has...
Which three are capabilities of SAML-based Federated authentication? Choose 3 answers
Which three are capabilities of SAML-based Federated authentication? Choose 3 answersA . Trust relationships between Identity Provider and Service Provider are required. B. SAML tokens can be in XML or JSON format and can be used interchangeably. C. Web applications with no passwords are more secure and stronger against attacks....
What would be the recommended solution to grant mobile app access to sales users?
universal container plans to develop a custom mobile app for the sales team that will use salesforce for authentication and access management. The mobile app access needs to be restricted to only the sales team . What would be the recommended solution to grant mobile app access to sales users?A...
Which two are valid choices for digital certificates when setting up two-way SSL between Salesforce and an external system. Choose 2 answers
Which two are valid choices for digital certificates when setting up two-way SSL between Salesforce and an external system. Choose 2 answersA . Use a trusted CA-signed certificate for salesforce and a trusted CA-signedcert for the external system B. Use a trusted CA-signed certificate for salesforce and a self-signed cert...