A company's security assessment noted vulnerabilities on the un managed packages in their Salesforce orgs, notably secrets that are easily accessible and in plain text, such as usernames, passwords, and OAuth tokens used in callouts from Salesforce.
Which two persistence mechanisms should an integration architect require to be used to ensure that secrets are protected from deliberate or inadvertent exposure?
Choose 2 answers
Kristofer
27 days agoAdelina
2 days agoRobt
15 days agoEdgar
1 months agoMelissa
1 months agoBenedict
7 days agoCordelia
8 days agoFelix
16 days agoTerrilyn
1 months agoNickolas
3 days agoLaquita
21 days agoRenea
1 months agoKallie
2 months agoRoselle
11 days agoGearldine
15 days agoWilliam
1 months agoArgelia
1 months agoHester
2 months agoRaina
2 months agoLawana
2 months ago