Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce Exam Identity and Access Management Architect Topic 5 Question 38 Discussion

Actual exam question for Salesforce's Identity and Access Management Architect exam
Question #: 38
Topic #: 5
[All Identity and Access Management Architect Questions]

An identity architect's client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of IT is worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.

What should the identity architect recommend to make sure that there is additional trust between the SP and the IdP?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Angelyn
1 years ago
True, but end-to-end encryption with CA signed certs might ensure trust the most.
upvoted 0 times
...
Rosina
1 years ago
Encryption seems robust but self-signed certificates are pretty common.
upvoted 0 times
...
Arlyne
1 years ago
Option B? A self-signed certificate? What is this, amateur hour? Definitely go with the CA-signed certificate, option D all the way!
upvoted 0 times
Adell
11 months ago
User1
upvoted 0 times
...
Christiane
11 months ago
User2
upvoted 0 times
...
Terina
11 months ago
Definitely go with the CA-signed certificate, option D all the way!
upvoted 0 times
...
Blondell
11 months ago
Option B? A self-signed certificate? What is this, amateur hour?
upvoted 0 times
...
Ernest
12 months ago
Yeah, option D is the way to go for extra security and trust between the SP and IdP.
upvoted 0 times
...
Cecily
12 months ago
Cecily is right, go with option D, the CA-signed certificate for sure.
upvoted 0 times
...
Thaddeus
1 years ago
Option B? A self-signed certificate? What is this, amateur hour?
upvoted 0 times
...
...
Weldon
1 years ago
I am considering the option about encrypting the SAML Request. D, right?
upvoted 0 times
...
Charlena
1 years ago
This is a tricky one, but I'd go with option D. Gotta keep that SAML request secure, even if it means a little more work.
upvoted 0 times
...
Adell
1 years ago
I agree with Aliza. Encryption is the best way to protect the SAML request from being tampered with. Option D is the clear choice here.
upvoted 0 times
Gladys
1 years ago
User B
upvoted 0 times
...
Timothy
1 years ago
User A
upvoted 0 times
...
...
Garry
1 years ago
I think the right answer might be using an HTTPS connection?
upvoted 0 times
...
Annamae
1 years ago
Option C seems like the most straightforward solution. Ensuring the Issuer and ACS URL are properly configured is crucial for a successful SSO integration.
upvoted 0 times
Daryl
12 months ago
Definitely, it's a fundamental step in ensuring the integrity of the SSO process.
upvoted 0 times
...
Justine
12 months ago
So, making sure the configuration is correct is key.
upvoted 0 times
...
Gary
12 months ago
Exactly, it's important for the SAML request content to remain secure.
upvoted 0 times
...
Marget
1 years ago
I agree, it helps establish trust between the SP and IdP.
upvoted 0 times
...
Marleen
1 years ago
Yes, ensuring the Issuer and ACS URL are properly configured is crucial for a successful SSO integration.
upvoted 0 times
...
Dorian
1 years ago
Option C seems like the most straightforward solution.
upvoted 0 times
...
...
Marci
1 years ago
Pretty nervous actually, securing SAML is critical.
upvoted 0 times
...
Aliza
1 years ago
Hmm, I think option D is the way to go. Encrypting the SAML request with a CA-signed certificate provides an extra layer of trust and security.
upvoted 0 times
...
Luther
1 years ago
This question about securing SAML requests, how do you feel about it?
upvoted 0 times
...

Save Cancel