Pre-Summer Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 4
Total 32 questions
Exam Code: Identity-and-Access-Management-Architect                Update: Apr 21, 2026
Exam Name: Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)

Salesforce Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Identity-and-Access-Management-Architect Exam Dumps: Updated Questions & Answers (April 2026)

Question # 1

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the QAuth 2.0 user-agent flow (this flow uses the QAuth 2.0 implicit grant type).

Which three QAuth concepts apply to this flow?

Choose 3 answers

A.

Refresh Token

B.

Client ID

C.

Verification Code

D.

Authorization Code

E.

Scopus

Question # 2

Universal Containers (UC) currently uses Salesforce Sales Cloud and an external billing application. Both Salesforce and the billing application are accessed several times a day to

manage customers. UC would like to configure single sign-on and leverage Salesforce as the identity provider. Additionally, UC would like the billing application to be accessible from

Salesforce. A redirect is acceptable.

Which two Salesforce tools should an identity architect recommend to satisfy the requirements?

Choose 2 answers

A.

Salesforce Canvas

B.

Age Launcher

C.

Identity Connect

D.

Connected Ages

Question # 3

Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO inactivated the user account and needs to perform a forensic analysis and identify signals that could indicate a breach has occurred.

What should NTO’s first step be in gathering signals that could indicate account compromise?

A.

download the identity provider Event log and contact the details of activities performed by the user.

B.

download the Login history and evaluate the details of topics performed by the user.

C.

download the Setup Audit Trail and review all recent activities performed by the user.

D.

Review the User record and evaluate the login and transaction history.

Question # 4

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.

Which action will accomplish this?

A.

Use a HTTP POST to make a call as the reverse token endpoint.

B.

Use a HTTP POST to request any refresh token for this current user.

C.

Enable Single Logout with a secure logout URL.

D.

Use a HTTP POST to file System for Cross-domain Identity Management (SCIPI) endpoint, including the current OAuth token.

Question # 5

A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token.

Which authentication mechanism should an identity architect recommend to meet the

requirements?

A.

User Agent Flow

B.

OpenID Connect

C.

JWT Bearer Token Flow

D.

Web Server Flow

Question # 6

A global fitness equipment manufacturer uses Salesforce to manage its sales cycle. The manufacturer has a custom order fulfillment app that needs to request order data from

Salesforce. The order fulfillment app needs to integrate with the Salesforce API using OAuth 2.0 protocol.

What should an identity architect use to fulfill this requirement?

A.

OAuth Token

B.

Genre Age Integration

C.

Authentication Providers

D.

Connected App and OAuth Scopes

Question # 7

Northern Trail Outfitters (NTO) uses a Security Assertion Markup Language (SANL)-based Identity Provider (IdP) to authenticate employees to all systems. The IdP authenticates users

against a Lightweight Directory Access Protocol (LDAP) directory and has access to user information. NTO wants to minimize Salesforce license usage since only a small percentage

of users need Salesforce.

What is recommended to ensure new employees have immediate access to Salesforce using their current IdP?

A.

Build an Integration that exorcits LDAP periodically and creates new active users in Salesforce.

B.

configure Auto-in-Time provisioning using SANL attributes to create new Salesforce users as necessary when a new user attempts to login to Salesforce.

C.

Define a process where administrators manually create new users in Salesforce.

D.

Build an Integration that exorcist LDAP and creates new inactive users in Salesforce and use a login flow to activate the user at first login.

Question # 8

An identity professional is working on the configuration of a connected app for Universal Container’s (UC) partner portal. UC wants to allow external users to access certain Salesforce data and perform limited actions. However, they also want to enforce additional security measures, such as IP restrictions and session timeout settings.

Which configuration option should be used to enforce IP restrictions and session timeout

settings for the connected app?

A.

Session Settings

B.

Login IP Ranges

C.

Custom Permissions

D.

Connected App QAuth policies

Question # 9

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before performing any further operation on the portal.

Which approach will meet this requirement?

A.

Create a custom landing page and email campaign asking all community members to login and verify their data.

B.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

C.

Create tasks for users who need to update their data or accept the new community rules.

D.

Create a login flow that conditionally prompts users who have not accepted the new community rules and who have missing or outdated information.

Question # 10

An identity architect ' s client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of IT is worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.

What should the identity architect recommend to make sure that there is additional trust between the SP and the IdP?

A.

Ensure that there is an HTTPS connection between IDP and SP.

B.

Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.

C.

Ensure that the Issuer and Assertion Consumer Service (ACS) URL is properly configured between SP and IDP.

D.

Ensure that on the SSO settings page, the " Request Signing Certificate " field has a selfsigned certificate.

Page: 1 / 4
Total 32 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 21 Apr 2026