Question 71

A university is planning to set up an identity solution for its alumni. A third-party identity provider will be used for single sign-on Salesforce will be the system of records. Users are getting error messages when logging in.
Which Salesforce feature should be used to debug the issue?
  • Question 72

    customer service representatives at Universal containers (UC) are complaining that whenever they click on links to case records and are asked to login with SAML SSO, they are being redirected to the salesforce home tab and not the specific case record. What item should an architect advise the identity team at UC to investigate first?
  • Question 73

    A company wants to provide its employees with a custom mobile app that accesses Salesforce. Users are required to download the internal native IOS mobile app from corporate intranet on their mobile device. The app allows flexibility to access other Non Salesforce internal applications once users authenticate with Salesforce. The apps self-authorize, and users are permitted to use the apps once they have logged into Salesforce.
    How should an identity architect meet the above requirements with the privately distributed mobile app?
  • Question 74

    A large consumer company is planning to create a community and will requ.re login through the customers social identity. The following requirements must be met:
    1. The customer should be able to login with any of their social identities, however salesforce should only have one user per customer.
    2. Once the customer has been identified with a social identity, they should not be required to authonze Salesforce.
    3. The customers personal details from the social sign on need to be captured when the customer logs into Salesforce using their social Identity.
    3. If the customer modifies their personal details in the social site, the changes should be updated in Salesforce
    .
    Which two options allow the Identity Architect to fulfill the requirements?
    Choose 2 answers
  • Question 75

    In a typical SSL setup involving a trusted party and trusting party, what consideration should an Architect take into account when using digital certificates?