Identity and Access Management Designer STUDY GUIDE
IDENTITY MANAGEMENT CONCEPTS 28%
Describe the role(s) an identity provider and service provider play in an access control solution.
Describe common methods for how trust connections are established between two systems and the methodologies used to describe trust between an identity provider and service provider.
Given a scenario, articulate whether it describes an authentication, authorization, or accounting scenario and what Salesforce feature should be used to accomplish the task.
Given a scenario, recommend the appropriate method for provisioning users in Salesforce and other third-party services (SOAP/REST API, SAML JIT, Identity Connect, User Provisioning for Connected Apps, etc.).
Describe the risks to enterprise security that federated Single Sign-on solutions aim to address.
Given a scenario, troubleshoot common points of failure that may be encountered in a Single Sign-on solution (SAML, OAuth, etc.).
Given a scenario, determine the most appropriate flow type to recommend when implementing an OAuth solution where Salesforce is providing identity to a third party (for example, User Agent, Web Server, JWT, etc.).
Describe the various implementation concepts of OAuth (for example; scopes, secrets, tokens, refresh tokens, token expiration, token revocation, etc.).
Describe the role(s) Connected Apps play when Salesforce needs to provide identity to a third-party system.
Given a scenario, recommend the Salesforce technologies that should be used to provide identity to the third-party system (Canvas, Connected Apps, App Launcher, etc.).