New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Exam - Topic 1 Question 1 Discussion

Actual exam question for Salesforce's Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) exam
Question #: 1
Topic #: 1
[All Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Questions]

An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to authenticate to Salesforce and then make API calls against the REST API.

One of the requirements is that the solution needs to ensure the third party service providers connected app in Salesforce mini need for end user interaction and maximizes security.

Which OAuth flow should be used to fulfill the requirement?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Annice
4 months ago
I’m not sure about the Username-Password Flow, seems risky.
upvoted 0 times
...
Lennie
4 months ago
100% agree, JWT is the way to go for security!
upvoted 0 times
...
Glynda
4 months ago
Wait, can you really avoid user interaction with JWT? Sounds too good to be true.
upvoted 0 times
...
Loren
4 months ago
I think Web Server Flow could work too, but not as secure.
upvoted 0 times
...
Carole
4 months ago
Definitely go with JWT Bearer Flow for this!
upvoted 0 times
...
Katie
5 months ago
The User Agent Flow definitely requires user interaction, so I don't think that's the answer. JWT seems like the most secure option.
upvoted 0 times
...
Mitzie
5 months ago
I practiced a similar question, and I think the Username-Password Flow could work, but it seems less secure than the JWT option.
upvoted 0 times
...
Jessenia
5 months ago
I'm not entirely sure, but I remember the Web Server Flow needing user interaction, which doesn't fit the requirement here.
upvoted 0 times
...
Elmer
5 months ago
I think the JWT Bearer Flow might be the right choice since it allows for server-to-server communication without user interaction.
upvoted 0 times
...
Bettyann
5 months ago
Hmm, I'm not sure if the validation rule is the right choice. While it could block the deletion, it might not be the most flexible solution if there are specific cases where we need to allow deletion.
upvoted 0 times
...
Susy
5 months ago
Ah, I've got this one! The method of encrypting messages by transposing or scrambling the characters is called a transposition cipher. I remember learning about that in class, so I'm feeling good about this.
upvoted 0 times
...
Tresa
5 months ago
I'm a little confused by the technical terms in this question. I'll try to break it down and see if I can figure out the key points.
upvoted 0 times
...
Jacki
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to think through the different options carefully to determine the best configuration.
upvoted 0 times
...

Save Cancel