Salesforce-Platform-Identity-and-Access-Management-Architect Practice Test Questions

Total 255 Questions


Last Updated On : 24-Jul-2025



Preparing with Salesforce-Platform-Identity-and-Access-Management-Architect practice test is essential to ensure success on the exam. This Salesforce SP25 test allows you to familiarize yourself with the Salesforce-Platform-Identity-and-Access-Management-Architect exam questions format and identify your strengths and weaknesses. By practicing thoroughly, you can maximize your chances of passing the Salesforce certification spring 2025 release exam on your first attempt.

Surveys from different platforms and user-reported pass rates suggest Salesforce-Platform-Identity-and-Access-Management-Architect practice exam users are ~30-40% more likely to pass.

What are three capabilities of Delegated Authentication? Choose 3 answers



A. It can be assigned by Custom Permissions.


B. It can connect to SOAP services.


C. It can be assigned by Profiles.


D. It can connect to REST services.





B.
  It can connect to SOAP services.

C.
  It can be assigned by Profiles.

D.
  It can connect to REST services.

Explanation:

Delegated Authentication is a mechanism in Salesforce that allows you to delegate login authentication to an external system (such as an on-premise Active Directory or another identity service). It works by having Salesforce make a web service call (either SOAP or REST) to the external authentication service during the login process.

Here are the correct capabilities:

B. It can connect to SOAP services. ✅
Delegated Authentication traditionally supports SOAP-based services. Salesforce sends a username and password to the delegated authentication endpoint, and expects a Boolean (true/false) response indicating authentication success.

C. It can be assigned by Profiles. ✅
Delegated Authentication is enabled at the Profile level. This allows Salesforce administrators to specify which users must use delegated authentication for login instead of standard Salesforce credentials.

D. It can connect to REST services. ✅
As of recent updates, REST support is also available via custom implementations, although SOAP is the most officially supported and common. Developers can configure a RESTful endpoint for Salesforce to use in delegating the login authentication.

❌ A. It can be assigned by Custom Permissions.
This is incorrect. Delegated Authentication cannot be assigned by Custom Permissions. It is controlled via Profiles, not permission sets or custom permissions.

Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?



A. Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.


B. Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.


C. Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.


D. Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.





C.
  Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.

D.
  Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.

Explanation:

Using the identity provider’s certificate to digitally sign and encrypt the payload, and using a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion are two methods that can ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit. Option A is not a good choice because using Salesforce’s certificate to encrypt the payload may not work, as Salesforce does not support encrypted SAML assertions. Option B is not a good choice because using Salesforce’s certificate to digitally sign the SAML assertion may not be necessary, as Salesforce does not validate digital signatures on SAML assertions. Also, using a mobile device management client on the users’ mobile devices may not be relevant, as it does not affect how the sensitive data is transmitted between the identity provider and Salesforce.

Northern Trail Outfitters (NTO) utilizes a third-party cloud solution for an employee portal. NTO also owns Salesforce Service Cloud and would like employees to be able to login to Salesforce with their third-party portal credentials for a seamless experience. The third- party employee portal only supports OAuth. What should an identity architect recommend to enable single sign-on (SSO) between the portal and Salesforce?



A. Configure SSO to use the third-party portal as an identity provider.


B. Create a custom external authentication provider.


C. Add the third-party portal as a connected app.


D. Configure Salesforce for Delegated Authentication.





A.
  Configure SSO to use the third-party portal as an identity provider.

Explanation:

Configuring SSO to use the third-party portal as an identity provider is the best option to enable SSO between the portal and Salesforce. The portal can use OAuth as the protocol to authenticate users and redirect them to Salesforce. The other options are either not feasible or not relevant for this use case.

References:

Single Sign-On for Desktop and Mobile Applications using SAML and OAuth, Single Sign-On with SAML on Force.com

The CIO of universal containers(UC) wants to start taking advantage of the refresh token capability for the UC applications that utilize Oauth 2.0. UC has listed an architect to analyze all of the applications that use Oauth flows to. See where refresh Tokens can be applied. Which two OAuth flows should the architect consider in their evaluation? (Choose 2 answers)



A. Web server


B. Jwt bearer token


C. User-Agent


D. Username-password





A.
  Web server

C.
  User-Agent

Explanation:

The two OAuth flows that support refresh tokens are Web server and User- Agent. According to the Salesforce documentation2, “The web server authentication flow and user-agent flow both provide a refresh token that can be used to get a new access token.” Therefore, option A and C are the correct answers.

Which two statements are capable of Identity Connect? (Choose 2 answers)



A. Synchronization of Salesforce Permission Set Licence Assignments.


B. Supports both Identity-Provider-Initiated and Service-Provider-Initiated SSO.


C. Support multiple orgs connecting to multiple Active Directory servers.


D. Automated user synchronization and de-activation.





B.
  Supports both Identity-Provider-Initiated and Service-Provider-Initiated SSO.

D.
  Automated user synchronization and de-activation.

Explanation:

The two statements that are capabilities of Identity Connect are:

It supports both identity-provider-initiated and service-provider-initiated SSO. Identity Connect is a desktop application that integrates Salesforce with Microsoft Active Directory (AD) and enables single sign-on (SSO) between the two systems. Identity Connect supports both identity-provider-initiated SSO, which is when the user starts at the AD site and then is redirected to Salesforce with a SAML assertion, and service-provider-initiated SSO, which is when the user starts at the Salesforce site and then is redirected to AD for authentication.

It enables automated user synchronization and deactivation. Identity Connect allows administrators to synchronize user accounts and attributes between AD and Salesforce, either manually or on a scheduled basis. Identity Connect also allows administrators to deactivate user accounts in Salesforce when they are disabled or deleted in AD, which helps maintain security and compliance.

The other options are not capabilities of Identity Connect. Identity Connect does not support synchronization of Salesforce permission set license assignments, as these are not related to AD attributes. Identity Connect does not support multiple orgs connecting to multiple AD servers, as it can only connect one Salesforce org to one AD domain at a time.

Universal Containers would like its customers to register and log in to a portal built on Salesforce Experience Cloud. Customers should be able to use their Facebook or Linkedln credentials for ease of use. Which three steps should an identity architect take to implement social sign-on?
(Choose 3 answers)



A. Register both Facebook and Linkedln as connected apps.


B. Create authentication providers for both Facebook and Linkedln.


C. Check "Facebook" and "Linkedln" under Login Page Setup.


D. Enable "Federated Single Sign-On Using SAML".


E. Update the default registration handlers to create and update users.





B.
  Create authentication providers for both Facebook and Linkedln.

C.
  Check "Facebook" and "Linkedln" under Login Page Setup.

E.
  Update the default registration handlers to create and update users.

Explanation:

To implement Social Sign-On for Salesforce Experience Cloud using providers like Facebook and LinkedIn, an Identity Architect should follow these core steps:

B. Create authentication providers for both Facebook and LinkedIn ✅
Salesforce provides built-in support for popular social identity providers. You must configure Authentication Providers under Setup > Auth. Providers for each service (Facebook and LinkedIn), specifying their client ID, client secret, authorize endpoint, etc.

C. Check "Facebook" and "LinkedIn" under Login Page Setup ✅
After the Auth Providers are set up, you can customize the login page in the Login & Registration section of the Experience Builder to display social login buttons for Facebook and LinkedIn.

E. Update the default registration handlers to create and update users ✅
You need to provide an Apex Registration Handler class to control how new users are created or updated when logging in via social accounts. This is crucial to link the external identity to Salesforce users and define user profiles, roles, etc.

❌ Incorrect Options

A. Register both Facebook and LinkedIn as connected apps
Incorrect: Connected Apps are used for OAuth clients or integrations, not required for social sign-on using Auth Providers.

D. Enable "Federated Single Sign-On Using SAML"
Incorrect: SAML is not used for social login like Facebook or LinkedIn, which use OAuth 2.0.

How should an identity architect automate provisioning and deprovisioning of users into Salesforce from an external system?



A. Call SOAP API upsertQ on user object.


B. Use Security Assertion Markup Language Just-in-Time (SAML JIT) on incoming SAML assertions.


C. Run registration handler on incoming OAuth responses.


D. Call OpenID Connect (OIDC)-userinfo endpoint with a valid access token.





B.
  Use Security Assertion Markup Language Just-in-Time (SAML JIT) on incoming SAML assertions.

Explanation:

To automate user provisioning and deprovisioning into Salesforce from an external system, one of the most scalable and Salesforce-native solutions is SAML Just-in-Time (JIT) provisioning.

With SAML JIT:
👉 When a user attempts to log in via SAML Single Sign-On, Salesforce receives a SAML assertion from the Identity Provider (IdP).
👉 If the user does not exist in Salesforce, it is automatically created with the attributes provided in the assertion (e.g., username, email, profile, role).
👉 If the user already exists, the user record is updated with new values as defined in the mapping rules.
👉 It requires no pre-setup of user records in Salesforce—perfect for real-time provisioning and maintenance

❌ Incorrect Options

A. Call SOAP API upsert on User object
Technically possible, but not the best practice for real-time identity lifecycle integration. Also requires custom integration and higher maintenance.

C. Run registration handler on incoming OAuth responses
Registration handlers are used with Auth Providers, but not standard for automated enterprise provisioning. This is better suited for social login or Experience Cloud.

D. Call OpenID Connect (OIDC)-userinfo endpoint with a valid access token
This fetches user information from an IdP—it doesn’t provision users into Salesforce.

Which two considerations should be made when implementing Delegated Authentication? Choose 2 answers



A. The authentication web service can include custom attributes.


B. It can be used to authenticate API clients and mobile apps.


C. It requires trusted IP ranges at the User Profile level.


D. Salesforce servers receive but do not validate a user’s credentials.


E. Just-in-time Provisioning can be configured for new users.





A.
  The authentication web service can include custom attributes.

D.
  Salesforce servers receive but do not validate a user’s credentials.

Explanation:

Delegated Authentication allows Salesforce to offload user authentication to an external web service (typically hosted on-premises or in a private cloud). Here are the two key considerations:

A. Custom Attributes in Authentication Web Service
👉 The external authentication service can include custom attributes (e.g., department, role) in its response.
👉 These attributes can be mapped to Salesforce user fields (e.g., Profile, Permission Sets) for dynamic access control.

D. Salesforce Does Not Validate Credentials
👉 Salesforce forwards the user’s credentials to the external service but does not validate them itself.
👉 The external service must return a true/false response to confirm authentication.

Why Not the Other Options?

B. Delegated Auth is not for API/mobile apps (use OAuth instead).

C. Trusted IP ranges are not required at the Profile level (but may be needed for the auth service).

E. JIT provisioning is not part of Delegated Auth (it’s for SAML/OAuth).

Universal containers (UC) have a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured as a connected App in salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app. Which two are recommendations to make the UC? Choose 2 answers



A. Disallow the use of single Sign-on for any users of the mobile app.


B. Require high assurance sessions in order to use the connected App


C. Use Google Authenticator as an additional part of the logical processes.


D. Set login IP ranges to the internal network for all of the app users profiles.





B.
  Require high assurance sessions in order to use the connected App

C.
  Use Google Authenticator as an additional part of the logical processes.

Explanation:

High assurance sessions are sessions that require a stronger level of identity verification, such as two-factor authentication or SAML assertions1. Google Authenticator is an app that generates verification codes on your mobile device that you can use as a second factor of authentication2. These measures can help prevent unauthorized access to the connected app by ensuring that the user is who they claim to be and that they have access to their mobile device. Disallowing the use of single sign-on (SSO) for the mobile app is not a recommendation because SSO can provide a seamless and secure user experience across multiple applications3. Setting login IP ranges to the internal network for the app users profiles is not a recommendation because it can limit the mobility and flexibility of the users who are commonly out of the office.

Universal Containers want users to be able to log in to the Salesforce mobile app with their Active Directory password. Employees are unable to use mobile VPN.
Which two options should an identity architect recommend to meet the requirement? Choose 2 answers



A. Active Directory Password Sync Plugin


B. Configure Cloud Provider Load Balancer


C. Salesforce Trigger & Field on Contact Object


D. Salesforce Identity Connect





A.
  Active Directory Password Sync Plugin

D.
  Salesforce Identity Connect

Explanation:

Active Directory Password Sync Plugin allows users to log in to Salesforce with their Active Directory password without using a VPN. Salesforce Identity Connect synchronizes users and groups between Active Directory and Salesforce and enables single sign-on.

References: Active Directory Password Sync Plugin, Salesforce Identity Connect

Page 9 out of 26 Pages
Salesforce-Platform-Identity-and-Access-Management-Architect Practice Test Home Previous