Last Updated On : 20-May-2026
Salesforce Certified Platform Identity and Access Management Architect (SP25) Practice Test
Prepare with our free Salesforce Certified Platform Identity and Access Management Architect (SP25) sample questions and pass with confidence. Our Salesforce-Platform-Identity-and-Access-Management-Architect practice test is designed to help you succeed on exam day.
Salesforce 2026
Salesforce User Authentication
The executive sponsor for an organization has asked if Salesforce supports the ability to embed a login widget
into its service providers in order to create a more seamless user experience.
What should be used and considered before recommending it as a solution on the Salesforce Platform?
A. Embedded Login. Identify what level of UI customization will be required to make it match the service providers look and feel.
B. Salesforce REST APIs. Ensure that Secure Sockets Layer (SSL) connection for the integration is used.
C. OpenID Connect Web Server Flow. Determine if the service provider is secure enough to store the client secret on.
D. Embedded Login. Consider whether or not it relies on third party cookies which can cause browser compatibility issues.
Explanation:
The executive wants to embed a login widget into service provider sites for a seamless UX. Salesforce provides “Embedded Login” for Experience Cloud, which lets you place a login form on an external site and authenticate users against Salesforce.
✔️ Correct Option:
D. Embedded Login. Consider whether or not it relies on third party cookies which can cause browser compatibility issues.
Embedded Login uses iframes and relies on Salesforce cookies to maintain session state. Many modern browsers block or restrict third-party cookies by default, especially Safari and browsers with ITP. This breaks Embedded Login unless the login page and the site share the same domain, or you implement custom workarounds. So browser compatibility due to third-party cookie restrictions is the key consideration before recommending it.
❌ Incorrect options:
A. Embedded Login. Identify what level of UI customization will be required to make it match the service providers look and feel.
While UI customization is possible with Embedded Login, it’s not the primary technical risk. The bigger blocker is third-party cookie behavior across browsers. You can style the widget, but if it doesn’t work in Safari/Chrome due to cookie policies, customization is moot.
B. Salesforce REST APIs. Ensure that Secure Sockets Layer (SSL) connection for the integration is used.
REST APIs can be used for custom login, but that requires building and securing your own login form, handling tokens, and you lose Salesforce’s built-in auth flows. SSL is table stakes, not the key differentiator. This isn’t the “login widget” Salesforce provides, and it’s high custom dev.
C. OpenID Connect Web Server Flow. Determine if the service provider is secure enough to store the client secret on.
OIDC Web Server Flow is for server-to-server auth where Salesforce is the IdP and your app is the RP. It’s not a “widget” you embed. Client secret storage is a concern, but this flow doesn’t give you an embeddable login UI. So it doesn’t meet the requirement.
🔧 Reference:
→ Salesforce Help – Embedded Login – Notes that Embedded Login relies on third-party cookies and may be blocked by browsers, which impacts compatibility.
A global fitness equipment manufacturer is planning to sell fitness tracking devices and has the following
requirements:
1) Customer purchases the device.
2) Customer registers the device using their mobile app.
3) A case should automatically be created in Salesforce and associated with the customers
account in cases where the device registers issues with tracking.
Which OAuth flow should be used to meet these requirements?
A. OAuth 2.0 User-Agent Flow
B. OAuth 2.0 Asset Token Flow
C. OAuth 2.0 Device Flow
D. OAuth 2.0 SAVL Server Assertion Flow
Explanation:
This question tests knowledge of OAuth 2.0 flows for IoT and connected device scenarios in Salesforce. The key requirement is that a physical device (fitness tracker) must autonomously communicate with Salesforce to create cases when issues are detected — without user interaction. The correct OAuth flow must support device-to-Salesforce authentication for registered physical assets.
✅ B. OAuth 2.0 Asset Token Flow
The Asset Token Flow is specifically designed for IoT and connected device use cases in Salesforce. It allows a registered physical device — like a fitness tracker — to obtain a token tied to both the device asset and the customer account. The device can then autonomously call Salesforce APIs to create cases when issues are detected, without requiring user interaction during each transaction.
❌ A. OAuth 2.0 User-Agent Flow
The User-Agent Flow (implicit grant) is designed for browser-based applications where a user is actively present and interacting. It requires a user session and browser redirect to obtain tokens. A fitness tracking device operating autonomously in the background cannot use this flow as there is no active user or browser involved.
❌ C. OAuth 2.0 Device Flow
The Device Flow is designed for input-constrained devices such as smart TVs or CLI tools where a user must complete authorization on a separate device. It still requires human interaction to authorize the device initially via a browser. This does not suit an autonomous fitness tracker that must operate independently after initial registration.
❌ D. OAuth 2.0 SAML Server Assertion Flow
The SAML Server Assertion Flow is used when a server-side application exchanges a SAML assertion for an OAuth access token. It is designed for enterprise server-to-server integrations, not IoT device communication. Fitness tracking devices do not generate or manage SAML assertions, making this flow architecturally inappropriate for this use case.
🔧 Reference:
→ OAuth 2.0 Asset Token Flow – Salesforce Help
Confirms that the Asset Token Flow is purpose-built for IoT connected devices to securely authenticate and interact with Salesforce on behalf of registered physical assets linked to customer accounts.
Universal Containers (UC) currently uses Salesforce Sales Cloud and an external billing application. Both
Salesforce and the billing application are accessed several times a day to
manage customers. UC would like to configure single sign-on and leverage Salesforce as the identity
provider. Additionally, UC would like the billing application to be accessible from
Salesforce. A redirect is acceptable.
Which two Salesforce tools should an identity architect recommend to satisfy the requirements?
Choose 2 answers
A. Salesforce Canvas
B. Age Launcher
C. Identity Connect
D. Connected Ages
D. Connected Ages
Explanation:
This question is about making an external billing app accessible from Salesforce with a redirect while also using Salesforce as the identity provider. The best fit is to expose the billing app through a connected app and use Salesforce Canvas when the app should be launched inside Salesforce with a seamless user experience.
Option A
✔️ Salesforce Canvas
Canvas is designed to surface external web apps inside Salesforce while still allowing authentication and a redirect-based experience. It fits the requirement that the billing app should be accessible from Salesforce.
Option B
❌ Age Launcher
This is not a Salesforce identity or app-integration tool. It does not provide SSO or app embedding for an external billing application.
Option C
❌ Identity Connect
Identity Connect is used mainly to synchronize Salesforce users with Active Directory, not to make an external billing app accessible from Salesforce through SSO and redirect.
Option D
✔️ Connected Apps
Connected apps are the correct Salesforce mechanism for integrating external applications with Salesforce using standard protocols such as SAML, OAuth, or OpenID Connect. They support SSO and external app access from Salesforce.
🔧 Reference:
→
Connected Apps
— Confirms connected apps are used to integrate third-party applications with Salesforce using SSO and standard protocols.
Universal Containers is implementing Salesforce Identity to broker authentication from its enterprise single
sign-on (550) solution through Salesforce to third party applications using SAML.
What role does Salesforce Identity play in its relationship with the enterprise S50 system?
A. Service Provider {SP)
B. Identity Provider [IdP)
C. Resource Server
D. Client Application
Explanation:
This question tests identity brokering architecture. Salesforce is placed between the enterprise SSO system and third-party applications. When Salesforce receives authentication from the enterprise IdP and then passes it onward, it acts differently in each relationship.
🟢 Correct Option:
A. Service Provider (SP)
Salesforce acts as a Service Provider to the enterprise SSO (IdP). It relies on the enterprise identity system to authenticate users via SAML. Once authenticated, Salesforce can then act as an Identity Provider to downstream apps. This makes Salesforce an identity broker, but specifically in relation to the enterprise SSO, it is the SP consuming authentication assertions.
🔴 Incorrect options:
B. Identity Provider (IdP)
This would be correct only in relation to downstream third-party applications. In this question, the relationship is specifically with the enterprise SSO system, where Salesforce is not issuing assertions but consuming them.
C. Resource Server
A resource server is part of OAuth architecture where APIs are protected by tokens. This scenario is SAML-based authentication, not API access control, so this role is not relevant.
D. Client Application
A client application is typically an OAuth concept representing an app requesting access tokens. Salesforce is not acting as a client here; it is participating in SAML-based federation.
🔧 Reference:
→ SAML Single Sign-On – Salesforce as Service Provider
This documentation explains how Salesforce acts as a Service Provider (SP) when it relies on an external enterprise Identity Provider for authentication, which is a key part of identity brokering architectures.
Universal Containers (UC) uses Salesforce for its customer service agents. UC has a proprietary system for
order tracking which supports Security Assertion Markup Language (SAML) based single sign-on. The VP of
customer service wants to ensure only active Salesforce users should be able to access the order tracking
system which is only visible within Salesforce.
What should be done to fulfill the requirement?
Choose 2 answers
A. Set up the Corporate Identity store as an identity provider (IdP) for Order Tracking.
B. Customize Order Tracking to initiate a REST call to validate users in Salesforce after login.
C. Setup Salesforce as an identity provider (IdP) for Order Tracking.
D. Setup Order Tracking as a Canvas app in Salesforce to POST IdP initiated SAML assertion.
D. Setup Order Tracking as a Canvas app in Salesforce to POST IdP initiated SAML assertion.
Explanation:
The VP wants only active Salesforce users to access the Order Tracking system, and it should be visible only within Salesforce. The order tracking system supports SAML SSO. To enforce Salesforce as the source of truth for user status and embed the app inside Salesforce, you use Salesforce as IdP + Canvas.
✔️ Correct Option:
C. Setup Salesforce as an identity provider (IdP) for Order Tracking.
With Salesforce as IdP, users authenticate to Salesforce first. Salesforce issues a SAML assertion to the Order Tracking system only for active users. If a user is deactivated in Salesforce, they can’t get an assertion and can’t access Order Tracking. This satisfies the “only active Salesforce users” requirement without custom code.
D. Setup Order Tracking as a Canvas app in Salesforce to POST IdP initiated SAML assertion.
Canvas apps let you embed external apps inside Salesforce and pass identity via Signed Request or SAML. Using IdP-initiated SAML from Salesforce into a Canvas app ensures the Order Tracking system is only accessible from within Salesforce and leverages the active Salesforce session. This meets the “only visible within Salesforce” requirement.
❌ Incorrect options:
A. Set up the Corporate Identity store as an identity provider (IdP) for Order Tracking.
If a corporate IdP is used, users could SSO directly to Order Tracking outside Salesforce. That bypasses Salesforce user status and visibility. The requirement is that access be controlled by Salesforce and only visible inside Salesforce, so using an external IdP fails both conditions.
B. Customize Order Tracking to initiate a REST call to validate users in Salesforce after login.
This is a custom integration that adds complexity and latency. It also doesn’t prevent initial access to Order Tracking outside Salesforce. SAML IdP already validates user status before issuing the assertion, so REST validation is unnecessary and doesn’t enforce the “only within Salesforce” rule.
🔧 Reference:
→ Salesforce Help – SAML Single Sign-On Flows – Explains using Salesforce IdP to control access to external apps via SAML.
→ Salesforce Developer Guide – Introducing Canvas – Shows how Canvas can embed external apps and pass SAML assertions for SSO inside Salesforce.
| Page 1 out of 22 Pages |