Which two methods should an Architect consider to ensure that the - ProProfs Discuss
Topics
Products
Follow Us:

Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, or accessible to anyone while in transit? Universal Containers (UC) is using a custom application that will Act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate users. The assertions are submitted to Salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices.

This question is part of Identity and Access Management Designer
Asked by T, Last updated: Aug 11, 2020

+ Answer
Request

1 Answer

t

T

Answered Dec 09, 2018

Use Salesforce s Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users mobile devices.
 

Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer

Email Sent
We have sent an email to your address "" with instructions to reset your password.