Translate needs to Integration Requirements (22%) Flashcards
What is SSL or TLS?
Mutual authentication certificate
Better SSL or TLS?
TLS (Transport Layer Security) is more secure and is improved version from SSL.
What are API client certificate types?
Self-signed, CA-signed, mutual authentication (SSL or TLS)
What is the difference between one-way and two-way authentication?
Two-way is more secure because both the server and client perform validation by verifying each other’s identities. In one-way authentication, only client does that.
What are 3 protocols for authorization & authentication?
SAML, OAuth 2.0, OpenID Connect
SAML:
- what is
- what language based
- where used?
Security Assertion Markup Language (SAML) is an XML-based standard for exchanging authentication and authorization data used in single-sign on.
OAuth 2.0
The Open Authorization (OAuth) 2.0 protocol is the industry standard for authorization to allow secure sharing of data between systems.
OpenID Connect
Used in social sign-on that adds an authentication layer on top of OAuth 2.0 for the secure exchange of user information.
To implement SSO, what standards are supported by Salesforce? (3)
SAML, Delegated Authentication, OpenID Connect
To create a Connected App, what protocols should the external application support? (3)
SAML, OAuth, OpenID Connect
Can a Connected App be created to integration service providers when SF acts as the identity provider?
Yes
Can Salesforce run as an OAuth authorization server?
Yes, SF can authorize and authenticate connected apps, which can be dynamically created from an external system
How can we manage Connected App’s access? (3)
- By setting security policies
- Defining which users have access by assigning profiles
- A refresh token policy can be scheduled to automatically revoke a connected app’s access
- etc
What are 3 roles in SSO flows?
- User
- Identity provider
- Service provider
What is SAML Assertion?
A proof of the user’s identity provided by the identity provider. It is an XML document.
What is Access Token?
It represents the user’s permission to access resources
(and so authenticates requests sent to designated API endpoints)
Can OAuth 2.0 acquire access token for a client application?
Yes
Can external applications see user’s password or credentials when using OAuth 2.0?
No, they are not revealed nor exposed.
In an OAUth 2.0 flow, what are 4 key roles involved?
- Resource Server (hosts the protected resources)
- Resource Owner (entity or end user who grants access to the protected resource)
- Authorization Server (issues access tokens)
- Client (application requesting resource access on behalf of the resource owner)
What are 4 types of tokens in OAuth 2.0?
- Authorization Code
- Access Token
- Refresh Token
- ID Token
What is authorization code?
Temporary code that will be exchanged for an access token
What is refresh token?
Token that is long-lived and used to acquire a new access token
What is ID Token?
Security token that contains information related to the end user
Access Token?
Token used by client to access protected resources in the resource server
Bearer Token?
An access token is used as a bearer token, meaning the entity who bears the token can access protected resources without further identification requirements