Salesforce-Platform-Identity-and-Access-Management-Architect Exam Questions With Explanations

The best Salesforce-Platform-Identity-and-Access-Management-Architect practice exam questions with research based explanations of each question will help you Prepare & Pass the exam!

Over 15K Students have given a five star review to SalesforceKing

Why choose our Practice Test

By familiarizing yourself with the Salesforce-Platform-Identity-and-Access-Management-Architect exam format and question types, you can reduce test-day anxiety and improve your overall performance.

Up-to-date Content

Ensure you're studying with the latest exam objectives and content.

Unlimited Retakes

We offer unlimited retakes, ensuring you'll prepare each questions properly.

Realistic Exam Questions

Experience exam-like questions designed to mirror the actual Salesforce-Platform-Identity-and-Access-Management-Architect test.

Targeted Learning

Detailed explanations help you understand the reasoning behind correct and incorrect answers.

Increased Confidence

The more you practice, the more confident you will become in your knowledge to pass the exam.

Study whenever you want, from any place in the world.

Salesforce Salesforce-Platform-Identity-and-Access-Management-Architect Exam Sample Questions 2025

Start practicing today and take the fast track to becoming Salesforce Salesforce-Platform-Identity-and-Access-Management-Architect certified.

22554 already prepared
Salesforce Spring 25 Release
255 Questions
4.9/5.0

Universal containers (UC) has implemented ansp-Initiated SAML flow between an external IDP and salesforce. A user at UC is attempting to login to salesforce1 for the first time and is being prompted for salesforce credentials instead of being shown the IDP login page.
What is the likely cause of the issue?

A. The "Redirect to Identity Provider" option has been selected in the my domain configuration.

B. The user has not configured the salesforce1 mobile app to use my domain for login

C. The "Redirect to identity provider" option has not been selected the SAML configuration.

D. The user has not been granted the "Enable single Sign-on" permission

B.   The user has not configured the salesforce1 mobile app to use my domain for login

Explanation:

When a company implements an SP-Initiated SAML flow with Salesforce, the user typically starts their login journey from a Salesforce-controlled URL (the Service Provider, or SP). For this to work correctly, the Salesforce login page needs to know to redirect the user to the external Identity Provider (IdP) for authentication.

The standard Salesforce login URL (login.salesforce.com) doesn't inherently know about a company's specific SSO configuration. However, a My Domain URL (e.g., uc.my.salesforce.com) is tied directly to the organization and its identity settings. When My Domain is enabled and configured, it provides a centralized and branded login page that can be set up to automatically redirect users to the IdP.

The Salesforce1 mobile app defaults to the standard login URL (login.salesforce.com). If a user attempts to log in for the first time without explicitly telling the app to use the company's My Domain, the app will present the standard Salesforce login screen, asking for a username and password. The user must manually tap the "Use Custom Domain" or similar option and enter the company's My Domain URL to initiate the correct SSO flow.
A. The "Redirect to Identity Provider" option has been selected in the my domain configuration. If this were the case, the flow would work as expected, and the user would be redirected to the IdP's login page, not the Salesforce login page.
C. The "Redirect to identity provider" option has not been selected the SAML configuration. The "Redirect to Identity Provider" setting is part of the My Domain setup, not the SAML configuration itself. The SAML configuration defines the trust relationship and assertion details, but the My Domain setting governs the login page behavior.
D. The user has not been granted the "Enable single Sign-on" permission. This permission is necessary for a user to be able to use SSO. If a user lacked this permission, they would likely receive a different error message, such as "Single Sign-On is not enabled for this user." The fact that they are prompted for Salesforce credentials suggests the system is simply defaulting to the standard login process, not denying them access based on a missing permission.

A company's external application is protected by Salesforce through OAuth. The identity architect for the project needs to limit the level of access to the data of the protected resource in a flexible way.
What should be done to improve security?

A. Select "Admin approved users are pre-authorized" and assign specific profiles.

B. Create custom scopes and assign to the connected app.

C. Define a permission set that grants access to the app and assign to authorized users.

D. Leverage external objects and data classification policies.

B.   Create custom scopes and assign to the connected app.

Explanation:

The company uses Salesforce to protect an external application via OAuth, and the identity architect needs to limit access to the protected resource’s data in a flexible manner. This requires controlling the scope of access granted to the external application through OAuth. Let’s evaluate each option:
A. Select "Admin approved users are pre-authorized" and assign specific profiles: Incorrect.
The “Admin approved users are pre-authorized” setting in a Connected App restricts which users can access the app by requiring them to have specific profiles or permission sets. While this controls who can access the app, it does not provide fine-grained control over the level of access (e.g., specific data or API operations). It’s a user-access restriction, not a data-access control, and thus lacks the flexibility needed.

B. Create custom scopes and assign to the connected app: Correct.
OAuth scopes define the level of access (e.g., specific APIs, objects, or operations) that the external application can perform when it receives an access token. By creating custom scopes in Salesforce (e.g., limiting access to specific standard or custom objects, read-only access, or specific API endpoints), the architect can flexibly control the data and operations available to the external application. Assigning these scopes to the Connected App ensures that the OAuth token grants only the necessary permissions, improving security by adhering to the principle of least privilege.

C. Define a permission set that grants access to the app and assign to authorized users: Incorrect.
Permission sets control user access to objects, fields, and features within Salesforce, including whether users can access a Connected App. However, they do not define the scope of data access for the external application itself during OAuth flows. This option addresses user authorization, not the flexible control of data access for the external app, making it less relevant.

D. Leverage external objects and data classification policies: Incorrect.
External objects are used to map data from external systems into Salesforce via External Data Sources, not to control OAuth access to Salesforce data. Data classification policies (e.g., for Data Loss Prevention or compliance) are unrelated to OAuth scope management. This option does not address the requirement to limit data access for the external application.

Why B:
Custom OAuth scopes allow the architect to define granular access levels (e.g., specific APIs, objects, or actions) for the external application, ensuring it only accesses authorized data. This provides flexibility and enhances security by restricting the application’s permissions, aligning with best practices for OAuth-based integrations.

References:
Salesforce Help: Define Custom OAuth Scopes
Salesforce Help: Connected Apps Overview
Trailhead: Identity for Developers
Salesforce Developer Docs: OAuth Scopes

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for to give its customers the ability to login with their Facebook and Twitter credentials.
Which two actions should an identity architect recommend to meet these requirements? (Choose 2 answers)

A. Create a custom external authentication provider for Facebook.

B. Configure a predefined authentication provider for Facebook.

C. Create a custom external authentication provider for Twitter.

D. Configure a predefined authentication provider for Twitter.

B.   Configure a predefined authentication provider for Facebook.
D.   Configure a predefined authentication provider for Twitter.

Explanation:

B. Configure a predefined authentication provider for Facebook:
Salesforce provides a built-in Facebook authentication provider using OAuth 2.0, enabling customers to log in to the Experience Cloud site with Facebook credentials. Configure it in Setup > Identity > Auth. Providers with Facebook app credentials and add it to the community login page.
D. Configure a predefined authentication provider for Twitter:
Salesforce offers a predefined Twitter (X) authentication provider for OAuth-based login. Set it up in Setup > Identity > Auth. Providers with Twitter app credentials and enable it on the community login page.

Why Not the Others?
A. Custom provider for Facebook:
Unnecessary, as Salesforce’s predefined Facebook provider is optimized and simpler.
C. Custom provider for Twitter:
Redundant, as Salesforce’s predefined Twitter provider meets the need without custom development.

References
Salesforce Help: Authentication Providers
Trailhead: Identity for External Users

Universal containers (UC) would like to enable SSO between their existing Active Directory infrastructure and salesforce. The it team prefers to manage all users in Active Directory and would like to avoid doing any initial setup of users in salesforce directly, including the correct assignment of profiles, roles and groups. Which two optimal solutions should UC use to provision users in salesforce? Choose 2 answers

A. Use the salesforce REST API to sync users from active directory to salesforce

B. Use an app exchange product to sync users from Active Directory to salesforce.

C. Use Active Directory Federation Services to sync users from active directory to salesforce.

D. Use Identity connect to sync users from Active Directory to salesforce

B.   Use an app exchange product to sync users from Active Directory to salesforce.
D.   Use Identity connect to sync users from Active Directory to salesforce

Explanation:

Universal Containers (UC) wants to enable Single Sign-On (SSO) between their existing Active Directory (AD) infrastructure and Salesforce, with user management centralized in AD. They aim to avoid manual user setup in Salesforce, including the assignment of profiles, roles, and groups. This requires a solution that provisions users from AD to Salesforce automatically, including their attributes, and supports SSO. The two optimal solutions are Identity Connect and an AppExchange product designed for AD-Salesforce synchronization. Below, we analyze why B and D are correct and why A and C are not optimal.

B. Use an AppExchange product to sync users from Active Directory to Salesforce. (Correct)
Why Optimal: AppExchange offers third-party tools (e.g., Okta, OneLogin, or Ping Identity’s Salesforce connectors) that provide robust, out-of-the-box solutions for syncing users from AD to Salesforce and enabling SSO. These tools:
Automate user provisioning and deprovisioning by syncing AD user attributes (e.g., username, email, group memberships) to Salesforce User records, including profiles, roles, and permission sets.
Support Just-In-Time (JIT) provisioning, where users are created or updated in Salesforce during their first SSO login, based on AD attributes (e.g., mapping AD groups to Salesforce profiles or roles).
Enable SSO via SAML or OpenID Connect, integrating seamlessly with AD through protocols like LDAP or Kerberos.
Offer prebuilt connectors, reducing setup complexity compared to custom development, and provide additional features like MFA, user lifecycle management, and reporting.
Fit for Scenario: An AppExchange product is ideal for UC because it minimizes custom coding, supports automatic user provisioning (avoiding manual setup), and maps AD groups to Salesforce roles/profiles. It’s a scalable, enterprise-grade solution that aligns with IT’s preference to manage users in AD.
Implementation: Install an AppExchange product (e.g., Okta for Salesforce), configure the AD connector to sync user data, map attributes (e.g., AD group to Salesforce profile), and set up SAML-based SSO. Test in a sandbox to ensure proper user creation and role assignment.
Reference: Salesforce AppExchange: Identity Management Solutions; Salesforce Help: External Identity Solutions.

D. Use Identity Connect to sync users from Active Directory to Salesforce. (Correct)
Why Optimal: Salesforce Identity Connect is a purpose-built tool for integrating Salesforce with Microsoft Active Directory to enable SSO and user provisioning. It:
Synchronizes user data from AD to Salesforce, creating or updating User records based on AD attributes (e.g., email, name, group memberships).
Supports automatic mapping of AD groups to Salesforce profiles, roles, or permission sets, meeting UC’s requirement to avoid manual setup of these attributes.
Enables SSO using SAML, allowing users to authenticate via AD credentials and access Salesforce seamlessly.
Provides bidirectional sync (e.g., updating AD when Salesforce attributes change) and supports real-time or scheduled provisioning.
Fit for Scenario: Identity Connect is tailored for AD-Salesforce integration, making it an optimal choice for UC’s IT team to manage users centrally in AD while automating Salesforce user provisioning and SSO. It’s a Salesforce-native solution, ensuring tight integration and support.
Implementation: Install Identity Connect on a server with AD access, configure LDAP mappings to Salesforce User fields, set up group-to-profile/role mappings, and enable SAML SSO. Test user creation and updates in a sandbox.
Reference: Salesforce Help: Identity Connect Overview; Identity Connect Setup.

A. Use the Salesforce REST API to sync users from Active Directory to Salesforce. (Incorrect)
Why Not Optimal: While the Salesforce REST API can be used to create and update User records programmatically (e.g., syncing AD users to Salesforce), it requires custom development to:
Integrate with AD (e.g., via LDAP queries or an AD connector).
Map AD attributes to Salesforce fields (e.g., profiles, roles).
Handle ongoing synchronization, error handling, and security (e.g., OAuth or API authentication).
This approach is time-consuming, error-prone, and requires ongoing maintenance compared to prebuilt solutions like Identity Connect or AppExchange products. It doesn’t align with UC’s goal of avoiding manual setup, as custom code still requires significant configuration and testing.
Clarification: The REST API is better suited for one-off integrations or scenarios where no commercial tools are available, not for enterprise-grade AD-Salesforce sync with SSO.
Reference: Salesforce Developer: REST API User Management.

C. Use Active Directory Federation Services to sync users from Active Directory to Salesforce. (Incorrect)
Why Not Optimal: Active Directory Federation Services (ADFS) is primarily a SAML-based identity provider for SSO, allowing users to authenticate to Salesforce using AD credentials.
However, ADFS does not natively handle user provisioning (e.g., creating or updating Salesforce User records with profiles and roles). While ADFS supports JIT provisioning with SAML assertions to create users on login, it requires additional configuration (e.g., custom attribute mappings) and may not fully automate role/group assignments as seamlessly as Identity Connect or AppExchange products. ADFS focuses on authentication, not full user lifecycle management.
Clarification: ADFS could be part of the SSO solution but doesn’t fully meet UC’s provisioning requirements without additional tools or custom logic.
Reference: Salesforce Help: ADFS for SSO.

Additional Notes

Implementation Steps:
For Identity Connect (D):
Install Identity Connect on a server with AD access.
Configure LDAP queries to pull user data and group memberships.
Map AD attributes to Salesforce fields (e.g., sAMAccountName to Username, AD group to ProfileId or RoleId).
Enable SAML SSO and test user sync and login in a sandbox.

For AppExchange Product (B):
Choose a product like Okta or Ping Identity from AppExchange.
Install and configure the AD connector to sync users and groups.
Set up SAML or OpenID Connect for SSO and JIT provisioning.
Test attribute mappings (e.g., AD group to Salesforce role) and user creation.
SSO Setup: For both solutions, configure Salesforce as the Service Provider (SP) with My Domain enabled and set up SAML SSO settings to trust the AD-based IdP (e.g., ADFS or the AppExchange tool’s IdP).

Architectural Considerations:
Both solutions support JIT provisioning, creating users on first login if real-time sync isn’t needed.
Ensure AD group structures align with Salesforce profiles/roles for accurate mapping.
Monitor sync performance and API limits (for AppExchange tools using Salesforce APIs).

Security Considerations:
Enable MFA for SSO users to enhance security (supported by both solutions).
Use secure LDAP (LDAPS) for AD communication and HTTPS for SAML.
Validate attribute mappings to prevent duplicate users or incorrect role assignments.
Trailhead Reference: Trailhead: Identity Management Basics; External Identity for Provisioning.

Universal Containers (UC) is implementing Salesforce and would like to establish SAML SSO for its users to log in. UC stores its corporate user identities in a Custom Database. The UC IT Manager has heard good things about Salesforce Identity Connect as an Idp, and would like to understand what limitations they may face if they decided to use Identity Connect in their current environment. What limitation Should an Architect inform the IT Manager about?

A. Identity Connect will not support user provisioning in UC's current environment.

B. Identity Connect will only support Idp-initiated SAML flows in UC's current environment.

C. Identity Connect will only support SP-initiated SAML flows in UC's current environment.

D. Identity connect is not compatible with UC's current identity environment.

D.   Identity connect is not compatible with UC's current identity environment.

Explanation:

Why:
Identity Connect only works with Microsoft Active Directory (AD)—it syncs AD users to Salesforce and can help wire SSO from an AD/ADFS-based environment. It is not a general-purpose IdP and doesn’t connect to a custom user database. Since UC’s identities live in a custom DB, Identity Connect isn’t compatible with that setup.

Eliminate the others:
A. Partially true by consequence, but the root problem is broader than provisioning—the product doesn’t support a non-AD source at all, making the environment incompatible, not just provisioning.
B. Incorrect. The limitation isn’t about IdP- vs SP-initiated SAML flows; it’s that Identity Connect requires AD, which UC doesn’t have.
C. Same issue as B—the constraint is directory compatibility, not SAML initiation type.

References:
Salesforce Help: Identity Connect — About (integrates Microsoft Active Directory users with Salesforce).
Salesforce Help: Identify Your Users and Manage Access (again notes Identity Connect integrates AD with Salesforce).
Salesforce Help: User Provisioning for Connected Apps (Identity Connect captures AD events for provisioning—reinforces the AD dependency).

Quick tip:
If you don’t see “Active Directory” in the identity store, Identity Connect isn’t your tool. For custom stores, think standards-based IdPs (AD FS, Ping, Okta, Azure AD, etc.) or build SAML/OIDC with a supported IdP and use Just-in-Time (JIT) provisioning or SCIM where appropriate.

Prep Smart, Pass Easy Your Success Starts Here!

Transform Your Test Prep with Realistic Salesforce-Platform-Identity-and-Access-Management-Architect Exam Questions That Build Confidence and Drive Success!

This is Content Area.