IAM Flashcards

1
Q

Authentication

A

Your Username + Your Password (who you are)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorization

A

Your Permissions (what you are allowed to do)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Service Provider (SP)

A

An application that provides some service to the end user. It accepts identity from an identity provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identity Provider (IdP)

A

A trusted service that enables users to access other websites and services without logging in again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OAuth (Open Authorization)

A

An open protocol to allow secure API authorization in a simple and standardized way from desktop and web applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Force.com platform implements the OAuth 2.0 Authorization Framework so that users can…

A

Authorize applications to access Force.com resources (via the Force.com REST and SOAP Web Service APIs) or Chatter resources (via the Chatter REST API) on their behalf without revealing their passwords or other credentials to those applications. Alternatively, applications can directly authenticate to access the same resources without the presence of an end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Web Server OAuth Flow

A

Users can authorize your web application to access their data. Typically used for web applications where server-side code needs to interact with Force.com APIs on the user’s behalf. A critical aspect of the web server flow is that the server must be able to protect the consumer secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

User Agent OAuth Flow

A

Users can authorize your desktop or mobile application to access their data, leveraging an external or embedded browser (or user-agent) for authentication. Difference with web server flow is that client cannot keep consumer secret confidential and is used for desktop & mobile applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OAuth 2.0 Refresh Token OAuth Flow

A

Renews tokens issued by the web server or user-agent flows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

JWT Bearer Token OAuth Flow

A

An app can re-use an existing authorization by supplying a signed JSON Web Token (JWT) and this flow does not use a refresh token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Token

A

Used by the client to make authenticated requests on behalf of the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refresh Token

A

May have an indefinite lifetime, persisting for an admin-configured interval or until explicitly revoked by the end-user. The client application can store the refresh token, using it to periodically obtain fresh access tokens, but should be careful to protect it against unauthorized access, since, like a password, it can be repeatedly used to gain access to the resource server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

redirect_uri

A

The end user’s browser will be redirected to this URI with the authorization code. This must match your application’s configured callback URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

state

A

If a value was provided for the state parameter in the request, then that same value will be returned here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Connected Apps

A

Designed to be run independently of the user interface. Either the app is hosted on an external website that interfaces with salesforce.com, or is a desktop or mobile app that runs on a client. Authentication for a connected app is client-initiated and must be done per-client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OAuth Policies of a Connected App is used to…

A

Gives you control over how a connected app connects and who’s allowed to use it. You can specify:

  • Which users have access to the app
  • Relax or enforce your organization’s IP restrictions for Salesforce1 users
  • Determine how long a mobile user’s token is valid before requiring them to reenter their credentials
17
Q

Permitted Users

A

Determines who can access the Connected App.