Progress saved locally. Sign in to sync across devices.
Describe common authentication patterns and understand the differences between each one. 0/14
Describe the building blocks that are part of an identity solution (authentication, authorization, and accountability) and how you enable those building blocks using Salesforce features. 0/5
Describe how trust is established between two systems. 0/9
Given a scenario, recommend the appropriate method for provisioning users in Salesforce. 0/6
Given a scenario, troubleshoot common points of failure that may be encountered in a single sign-on (SSO) solution (SAML, OAuth, etc.). 0/6
Given a use case, describe when Salesforce is used as a Service Provider (SP). 0/5
Given a scenario, recommend the most appropriate way to provision users from identity stores in business-to-employer (B2E) and business-to-consumer (B2C) scenarios. 0/5
Given a scenario, recommend the appropriate authentication mechanism when Salesforce needs to accept third-party Identity (Enterprise Directory, Social, Community, etc.). 0/7
Given a scenario, identify the ways to provision users in Salesforce to enable SSO and apply access rights. 0/4
Given a scenario, identify the auditing and monitoring approaches available on the platform, and describe the tools available to diagnose Identity Provider (IdP) issues. 0/5
Given a scenario, identify the most appropriate OAuth flow (Web-based, JWT, User agent, Device auth flow). 0/12
Given a scenario, recommend appropriate Scope and Configuration of the Connected App for Authorization. 0/8
Describe the various implementation concepts of OAuth (scopes, secrets, tokens, refresh tokens, token expiration, token revocation, etc.). 0/8
Given a scenario, recommend the Salesforce technologies that should be used to provide identity to the third-party system (Canvas, Connected Apps, App Launcher, etc.). 0/7
Given a set of requirements, determine the most appropriate methods of multi-factor authentication (MFA) to use, and the right type of session they should yield. 0/12
Given a scenario, determine how to best assign roles, profiles, and permission sets to a user during the SSO process, how to keep these assignments up to date. 0/4
Given a scenario, describe which tools you can apply to audit and verify the activity/user during and after login. 0/6
Given a scenario, identify the configuration settings for a Connected App. 0/13
Given a set of requirements, identify the role Identity Connect plays in a Salesforce Identity implementation. 0/5
Given a scenario, identify if Salesforce Customer 360 Identity fits into a fully-developed Customer 360 solution. 0/5
Give a set of requirements, recommend the most appropriate Salesforce license type(s). 0/4
Describe the capabilities for customizing the user experience for Experience Cloud (Branding options, authentication options, identity verification self-registration, communications, password reset, etc.). 0/10
Given a set of requirements, determine the best way to support external IdPs in communities and leverage the right user/contact model to support community user experience. 0/6
Given a requirement, understand the advantages and limitations of External Identity solutions and associated licenses. 0/5
Given a scenario, determine when to use embedded login. 0/4