Just passed my last required certification which is the Identity and Access Management Designer to finally become Salesforce Certified System Architect. What a journey and accomplishment. My study method seems to be working and would like to share my methods and notes.
The method :
At the start of the 2nd part of thIs year(2018) I made a goal to start the Technical Architect journey and get certified every month . The method I’ve been doing is really easy, I book a date one month in advance and spend at least an hour or two reading the materials I need. I use a technique called Pomodoro using an online tool kanbanflow.com and concentrate on learning a concept. I try to do this at least everyday either before bed or if I missed it for that evening I try to get up early in the morning. So far this has worked great for me as this made me consistent.
Exam takeaways
Now about the Identity and Access Management exam. This is like the rest of the exam which is 60 + 5 extra multiple choice question. You are given 120 minutes and passing is 65%.
Honestly this was a hard exam. Best if you have done implementation of it. I wasn’t that confident I would pass the exam when I hit the Submit button.
Trailhead: Identity and Access Management Designer
Go over this trialmix and nail down it to 100%. – https://trailhead.salesforce.com/users/00550000006yDdKAAU/trailmixes/architect-identity-and-access-management
-
User Agent Flow
-
Web Server Flow
-
JWT Bearer Token Flow
-
Heaps of questions on IDP initiated and SP Initiated Flow (3-4)
-
Idp Initiated SAML is when from the IDP system you are trying to access the system enabled for SSO
-
SP Initiated SAML is when you are coming from the service provider and asking authorization from the Idp.
-
Which SSO flow can be used for deep Linking
-
Use of Entity Id and Login URLs
-
Different types of scopes for OAuth and when to use them
-
Refresh Token Policy
-
User Provisioning – keeping users in sync
-
Custom Connected App Handler
-
When to use 2 factor and how login flows can be used for different scenarios
-
JIT User Provisioning
-
Login
-
Auth Providers
-
Login IP ranges
-
Trusted IP uses