Total 255 Questions
Last Updated On : 30-Jun-2025
Preparing with Identity-and-Access-Management-Architect practice test is essential to ensure success on the exam. This Salesforce SP25 test allows you to familiarize yourself with the Identity-and-Access-Management-Architect exam questions format and identify your strengths and weaknesses. By practicing thoroughly, you can maximize your chances of passing the Salesforce certification spring 2025 release exam on your first attempt. Surveys from different platforms and user-reported pass rates suggest Identity-and-Access-Management-Architect practice exam users are ~30-40% more likely to pass.
Universal Containers (UC) implemented SSO to a third-party system for their Salesforce users to access the App Launcher. UC enabled “User Provisioning” on the Connected App so that changes to user accounts can be synched between Salesforce and the third-party system. However, UC quickly notices that changes to user roles in Salesforce are not getting synched to the third-party system. What is the most likely reason for this behavior?
A. User Provisioning for Connected Apps does not support role sync.
B. Required operation(s) was not mapped in User Provisioning Settings.
C. The Approval queue for User Provisioning Requests is unmonitored.
D. Salesforce roles have more than three levels in the role hierarchy.
Explanation:
When User Provisioning is enabled for a Connected App, Salesforce can synchronize user data (such as profiles, roles, and permissions) with a third-party system. However, role synchronization is not automatic—it must be explicitly configured in the User Provisioning Settings.
Here’s why Option B is correct:
👉 Provisioning Requires Explicit Field & Operation Mapping
👉 Under User Provisioning Settings, administrators must define which user attributes (e.g., Role, Profile, Email) should be synced.
👉 If the "Role" field was not mapped or the "Update" operation was not enabled, role changes in Salesforce will not propagate to the third-party system.
Why the Other Options Are Incorrect:
👉 A. User Provisioning does support role sync → But it must be configured manually.
👉 C. An unmonitored Approval queue → Would delay provisioning but not block role sync specifically.
👉 D. Role hierarchy depth → Does not affect provisioning sync capabilities.
Conclusion:
The issue stems from missing field/operation mappings in User Provisioning Settings. To fix this, UC’s admin must:
✔ Map the RoleId field.
✔ Ensure "Update" operations are enabled for role changes.
A company wants to provide its employees with a custom mobile app that accesses Salesforce. Users are required to download the internal native IOS mobile app from corporate intranet on their mobile device. The app allows flexibility to access other non- Salesforce internal applications once users authenticate with Salesforce. The apps self- authorize, and users are permitted to use the apps once they have logged into Salesforce. How should an identity architect meet the above requirements with the privately distributed mobile app?
A. Use connected app with OAuth and Security Assertion Markup Language (SAML) to access other non-Salesforce internal apps.
B. Configure Mobile App settings in connected app and Salesforce as identity provider for non-Salesforce internal apps.
C. Use Salesforce as an identity provider (IdP) to access the mobile app and use the external IdP for other non-Salesforce internal apps.
D. Create a new hybrid mobile app and use the connected app with OAuth to authenticate users for Salesforce and non-Salesforce internal apps.
Explanation:
Configuring Mobile App settings in connected app and Salesforce as identity provider for non-Salesforce internal apps is the best way to meet the requirements with the privately distributed mobile app. The Mobile App settings allow users to download the app from a private URL and use it with Salesforce credentials. The identity provider settings allow users to access other internal apps with SSO using Salesforce as the IdP. The other options are either not feasible or not optimal for this use case.
References:
Mobile App Settings, Single Sign-On for Desktop and Mobile Applications using SAML and OAuth
A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities. Which Salesforce OAuth authorization flow should be used?
A. OAuth 2.0 JWT Bearer How
B. OAuth 2.0 Device Flow
C. OAuth 2.0 User-Agent Flow
D. OAuth 2.0 Asset Token Flow
Explanation:
The OAuth 2.0 Device Flow is a type of authorization flow that allows users to register an IoT device with limited display input or capabilities, such as a smart TV, a printer, or a smart speaker1. The device flow works as follows1:
👉 The device displays or reads out a verification code and a verification URL to the
user.
👉 The user visits the verification URL on another device, such as a smartphone or a laptop, and enters the verification code.
👉 The user logs in to Salesforce and approves the device.
👉 The device polls Salesforce for an access token using the verification code. Salesforce returns an access token to the device, which can then access Salesforce APIs.
Universal containers (UC) would like to enable SSO between their existing Active Directory infrastructure and salesforce. The it team prefers to manage all users in Active Directory and would like to avoid doing any initial setup of users in salesforce directly, including the correct assignment of profiles, roles and groups. Which two optimal solutions should UC use to provision users in salesforce? (Choose 2 answers)
A. Use the salesforce REST API to sync users from active directory to salesforce
B. Use an app exchange product to sync users from Active Directory to salesforce.
C. Use Active Directory Federation Services to sync users from active directory to salesforce.
D. Use Identity connect to sync users from Active Directory to salesforce
Explanation:
B. Use an AppExchange product to sync users from Active Directory to Salesforce.
AppExchange tools like Okta, OneLogin, or Azure AD Enterprise Apps support automated user provisioning (via SCIM or custom APIs) directly from Active Directory. They can handle creating, updating, and deactivating users in Salesforce, including assigning profiles, roles, and permissions, often with minimal coding required.
D. Use Identity Connect to sync users from Active Directory to Salesforce.
Salesforce's Identity Connect is a managed solution explicitly designed to sync users and their metadata from AD to Salesforce. It supports provisioning, deprovisioning, SSO, and mapping of AD groups to Salesforce roles and profiles—meeting UC’s requirement to avoid manual user setup in Salesforce
❌ Why A and C Are Not Optimal
A. Using custom REST API integration from AD to Salesforce would require building and maintaining a custom middleware layer. This approach is more complex and error-prone than leveraging established provisioning tools.
C. ADFS handles authentication (SSO), not user provisioning. It won’t automatically create or manage Salesforce user records, roles or profiles—only authenticate users.
💡 Summary Table
Requirement | AppExchange Tools | Identity Connect | Custom REST API | ADFS |
---|---|---|---|---|
User provisioning from AD | ✅ | ✅ | ⚠️ Custom Build | ❌ |
Auto role/profile assignment | ✅ (some tools) | ✅ | ⚠️ Custom Build | ❌ |
Avoid manual setup in Salesforce | ✅ | ✅ | ⚠️ Custom Build | ❌ |
SSO with AD | ✅ | ✅ (optional) | ⚠️ Custom Build | ✅ |
Containers (UC) has implemented SAML-based single Sign-on for their Salesforce application and is planning to provide access to Salesforce on mobile devices using the Salesforce1 mobile app. UC wants to ensure that Single Sign-on is used for accessing the Salesforce1 mobile App. Which two recommendations should the Architect make? (Choose 2 Answers)
A. Configure the Embedded Web Browser to use My Domain URL.
B. Configure the Salesforce1 App to use the MY Domain URL.
C. Use the existing SAML-SSO flow along with User Agent Flow.
D. Use the existing SAML SSO flow along with Web Server Flow.
Explanation:
Universal Containers (UC) wants to ensure SAML-based SSO works seamlessly for users accessing Salesforce via the Salesforce1 mobile app. Here’s why Options B and C are the best recommendations:
1. Option B: Configure the Salesforce1 App to Use My Domain URL
👉 For SAML SSO to work on the Salesforce1 mobile app, users must log in via My Domain (e.g., yourcompany.my.salesforce.com).
👉 If users try to log in directly through the app without My Domain, Salesforce defaults to username/password authentication instead of SAML redirection.
2. Option C: Use the Existing SAML-SSO Flow Along with User Agent Flow
👉 The User Agent Flow (also called the "WebView" flow) is the recommended OAuth flow for SAML SSO on mobile apps.
👉 It allows the Salesforce1 app to:
✔ Open a browser session (or embedded WebView) for SAML authentication.
✔ Redirect users to the IdP for login, then return them to the app with an OAuth token.
Why Not the Other Options?
A. Embedded Web Browser → While configuring My Domain is necessary, this option alone does not address the OAuth flow requirement for SAML SSO on mobile.
D. Web Server Flow → Designed for server-to-server authentication (not mobile SSO).
Universal Containers (UC) has decided to use Salesforce as an Identity Provider for multiple external applications. UC wants to use the salesforce App Launcher to control the Apps that are available to individual users. Which three steps are required to make this happen?
A. Add each connected App to the App Launcher with a Start URL.
B. Set up an Auth Provider for each External Application.
C. Set up Salesforce as a SAML Idp with My Domain.
D. Set up Identity Connect to Synchronize user data.
E. Create a Connected App for each external application.
Explanation:
These are the steps required to enable Salesforce as a SAML Identity Provider and use the App Launcher to access external applications. According to the Salesforce documentation1, you need to:
Enable Salesforce as a SAML Identity Provider with My Domain2.
Create a Connected App for each external application that you want to integrate with Salesforce3.
Add each Connected App to the App Launcher with a Start URL that points to the external application1.
Option B is incorrect because setting up an Auth Provider is not necessary for SAML SSO. Auth Providers are used for OAuth SSO, which is a different protocol4. Option D is incorrect because Identity Connect is a tool for synchronizing user data between Active Directory and Salesforce, which is not related to SSO or App Launcher5.
References:
👉 1: App Launcher - Salesforce
👉 2: Enable Salesforce as a SAML Identity Provider
👉 3: Connected Apps Overview
👉 4: Identity Providers and Service Providers - Salesforce
👉 5: Identity Connect Overview
Universal Containers (UC) has five Salesforce orgs (UC1, UC2, UC3, UC4, UC5). of Every user that is in UC2, UC3, UC4, and UC5 is also in UC1, however not all users 65* have access to every org. Universal Containers would like to simplify the authentication process such that all Salesforce users need to remember one set of credentials. UC would like to achieve this with the least impact to cost and maintenance. What approach should an Architect recommend to UC?
A. Purchase a third-party Identity Provider for all five Salesforce orgs to use and set up JIT user provisioning on all other orgs.
B. Purchase a third-party Identity Provider for all five Salesforce orgs to use, but don't set up JIT user provisioning for other orgs.
C. Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.
D. Configure UC1 as the Identity Provider to the other four Salesforce orgs, but don't set up JIT user provisioning for other orgs.
Explanation:
Leverage an existing org: UC1 already contains all users, so making it the Identity Provider (IdP) for the other Salesforce orgs (UC2–UC5) reduces cost and complexity versus purchasing a separate third-party IdP.
Just-In-Time (JIT) provisioning: By enabling SAML-based JIT provisioning in UC2–UC5, the orgs can automatically create or update Salesforce user accounts at first login—based on identity data sent from UC1—eliminating manual setup of users, profiles, and roles .
Minimal overhead: This architecture requires configuration only in existing Salesforce environments and no integration middleware or third-party tools. It scales easily when adding additional orgs or users.
Alternatives Not Recommended:
A & B (use third-party IdP) introduce extra licensing, integration, and maintenance overhead.
D (no JIT) would force manual user provisioning, defeating UC’s goal to simplify and centralize user management.
Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org. What should be done to enable the retrieval of the access token status for the OpenID Connect connection?
A. Query using OpenID Connect discovery endpoint.
B. A Leverage OpenID Connect Token Introspection.
C. Create a custom OAuth scope.
D. Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.
Explanation:
According to the Salesforce documentation1, OpenID Connect Token Introspection allows all OAuth connected apps to check the current state of an OAuth 2.0 access or refresh token. The resource server or connected apps send the client app’s client ID and secret to the authorization server, initiating an OAuth authorization flow. As part of this flow, the authorization server validates, or introspects, the client app’s access token. If the access token is current and valid, the client app is granted access.
In an SP-Initiated SAML SSO setup where the user tries to access a resource on the Service Provider, What HTTP param should be used when submitting a SAML Request to the Idp to ensure the user is returned to the intended resourse after authentication?
A. RedirectURL
B. RelayState
C. DisplayState
D. StartURL
Explanation:
The HTTP parameter that should be used when submitting a SAML request to the IdP to ensure the user is returned to the intended resource after authentication is RelayState. RelayState is an optional parameter that can be used to preserve some state information across the SSO process. For example, RelayState can be used to specify the URL of the resource that the user originally requested on the SP before being redirected to the IdP for authentication. After the IdP validates the user’s identity and sends back a SAML response, it also sends back the RelayState parameter with the same value as it received from the SP. The SP then uses the RelayState value to redirect the user to the intended resource after validating the SAML response. The other options are not valid HTTP parameters for this purpose. RedirectURL, DisplayState, and StartURL are not standard SAML parameters and they are not supported by Salesforce as SP or IdP.
A pharmaceutical company has an on-premise application (see illustration) that it wants to integrate with Salesforce. The IT director wants to ensure that requests must include a certificate with a trusted certificate chain to access the company's on-premise application endpoint. What should an Identity architect do to meet this requirement?
A. Use open SSL to generate a Self-signed Certificate and upload it to the on-premise app.
B. Configure the company firewall to allow traffic from Salesforce IP ranges.
C. Generate a certificate authority-signed certificate in Salesforce and uploading it to the on-premise application Truststore.
D. Upload a third-party certificate from Salesforce into the on-premise server.
Explanation:
To ensure secure communication between Salesforce and the on-premise application, the Identity Architect must enforce certificate-based authentication, where Salesforce presents a trusted certificate to the on-premise system. Here’s why Option C is the best approach:
1. Certificate Authority (CA)-Signed Certificate Ensures Trust
👉 A CA-signed certificate (unlike a self-signed one) is inherently trusted because it is issued by a recognized Certificate Authority (e.g., DigiCert, GlobalSign).
👉 The on-premise application can validate this certificate via its Truststore, which contains trusted CA root certificates.
2. Steps to Implement This Solution:
👉 Generate a CA-signed certificate in Salesforce (or obtain one from a trusted CA).
👉 Upload the certificate (public key) to the on-premise Truststore, ensuring the app only accepts requests with this certificate.
👉 Configure Salesforce to present this certificate when calling the on-premise endpoint (e.g., in Named Credentials or Apex callouts).
Why Not the Other Options?
👉 A (Self-signed certificate) → Not inherently trusted; requires manual Truststore updates and is less secure.
👉 B (Firewall IP whitelisting) → Does not enforce certificate-based authentication (only network-level security).
👉 D (Third-party certificate from Salesforce) → Misleading; Salesforce does not issue third-party certificates—they must be obtained from a CA.
Page 8 out of 26 Pages |
Identity-and-Access-Management-Architect Practice Test Home | Previous |