1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
8

Universal Containers is building an integration between Salesforce and their Accounting system. The integration will utilize out

bound messaging with call back pattern to Salesforce. The security officer would like to understand the authentication solution. What are the three ways that the call back can authenticate itself to Salesforce? Choose 3 answers A. Utilize the Enterprise WSDL login() operation to obtain a new session ID. B. Utilize an oAuth Username-Password flow to obtain a new oAuth token for the session ID. C. Utilize the REST API login() operation to obtain a new session ID D. Utilize the session ID contained within the outbound message notification as the authorization header. E. Utilize the partner WSDL with oAuth to obtain a valid oAuth token for the session ID. A,C,D Which mechanism should an Integration Architect recommend to make a secure, authenticated connection to a remote system that results in the remote system trusting Salesforce?
Computers and Technology
1 answer:
SpyIntel [72]3 years ago
4 0

Answer:Utilize the session ID contained within the outbound message notification as the authorization header.

Utilize the Enterprise WSDL login() operation to obtain a new session ID.

Utilize the REST API login() operation to obtain a new session ID.

Explanation:

For the authorization we can utilize the session I in the outbound message notification

Then, we can obtain new session IDs using WSDL login() to exchange information via http and smtp.

For integrating APIs we can utilize the REST API login()to obtain session IDs.

You might be interested in
Select all the correct answers. Which two statements are true about an OS? translates the user's instructions into binary to get
lubasha [3.4K]

Answer:

all

Explanation:

4 0
3 years ago
When a business is using methods that help it use its time and resources the best they can, what are they exercising?
maria [59]
<span>B. Efficiency

(</span><span>effective training </span><span>techniques)</span>
3 0
3 years ago
Read 2 more answers
Which of the following is a domestic business activity?
harkovskaia [24]
What are the options?

7 0
3 years ago
Read 2 more answers
What does the security element of non-repudiation mean in e-commerce cybersecurity? A. Data needs to be available at all times.
VARVARA [1.3K]

Answer:

Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data

Explanation:

8 0
3 years ago
A _____ is a device that helps capture action without losing focus. It stabilizes camera movement by reducing the impact of shak
lyudmila [28]

Answer:crane

Explanation:

4 0
2 years ago
Other questions:
  • Technology offers a variety of rich opportunities available to teachers and students. According to Inan and Lowther (2010), ther
    6·1 answer
  • If my_string = "This is MY string!", why does print (my_string[0:7:5]) return "Ti" and not
    11·1 answer
  • 20 points
    6·2 answers
  • Which programming element is used by a game program to track and display score information
    12·2 answers
  • How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
    6·1 answer
  • Which text features does this section contain? Check all that apply.
    15·1 answer
  • Which of these is NOT an example of a GUI?
    7·1 answer
  • How many parameters can we use in each function?
    15·1 answer
  • Only cool people answer this question.<br><br><br><br><br> are you cool?
    11·2 answers
  • Which language should you use to add functionality to web pages.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!