1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jasenka [17]
3 years ago
13

How can the connection to salesforce be restricted only to the employee portal server? Universal containers (UC) uses a legacy E

mployee portal for their employees to collaborate and post their ideas. UC decides to use Salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to push ideas posted on the Employee portal to salesforce through API. UC decides to use an API user using OAuth Username - password flow for the connection.
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
4 0

Answer

To restrict the connection only to the employee portal server, the IP address of the application should be added into the list of Trusted IP's.

Explanation:

Trusted IP's are the IP's that are used to identify the users that can be verified easily. Those users whose IP's are not listed in the trusted IP list needs to verify their identity by sending them login code on each transaction.

<em>In above mentioned case, We need to enlist the IP address of employee portal list in trusted IP list to ensure the restriction of login to employee only.</em>

You might be interested in
Kathy would like to export a report that she created into an easy-to-use file format that is supported on multiple
emmasim [6.3K]

Answer:

A) PDF

Explanation:

PDF is an acronym for Portable Document Format. It is utilized in showing documents in an electronic format.

PDF satisfies various functions when documents are saved in its format. These include:

1. It retains the graphic quality that was being saved.

2. It enables users to save several forms of contents such as text, pictures, audio, 3D, hyperlinks, etc

3. It is easier to develop, navigate, and export

4. It supports numerous security options such as passwords, watermarks, etc.

5. It can be compressed to relatively smaller sizes despite the document containing larger files.

6. It can be viewed or access on multiple platforms.

Hence, in this case, the right answer is PDF.

3 0
3 years ago
How is modern technology developed? Explain.
vivado [14]

Answer:

Modern technology has developed

Explanation:

The development of technology may draw upon many fields of knowledge, including scientific, engineering, mathematical, linguistic, and historical knowledge, to achieve some practical result. ... For example, science might study the flow of electrons in electrical conductors by using already-existing tools and knowledge.

4 0
3 years ago
Read 2 more answers
Cual es la definición de grouded ​
pochemuha

Answer:

ben bilanciato e reattivo.

(di un pilota o di un aeromobile) vietato o impedito di volare.

Explanation:

5 0
3 years ago
Read 2 more answers
The appropriate software to use for creating research papers is ________ software. Select one: A. presentation B. word processin
Mademuasel [1]

Answer:

B. word processing

Explanation:

The appropriate software to use for creating research papers is word processing. This refers to any software that is designed with the main function of the production, storage, and manipulation of any kind of text document that is located on a computer or word processor. One of the most popular software example is Microsoft Studio's Word Processor from their Office Software Suite.

4 0
4 years ago
Which of the following are safety guidelines when socializing online?
DochEvi [55]

Answer:

All of them execpt five and three.

Explanation:

It is okay to have social media and receive messages.

3 0
2 years ago
Other questions:
  • If you were asked to subnet a network in such a way as to arrive at 6 network ids you would need to borrow 2 bits.
    7·1 answer
  • In the middle of the iteration, how should a team handle requirement changes from the customer? (1 correct answer)
    7·2 answers
  • Briefly explain the benefits and consequences of technology. //PLEASE ANSWER//
    9·1 answer
  • How to delete a virus that act by restarting u r computer? I am in safe mood to aviod restart.
    10·1 answer
  • What are the different types of firewalls? Which one is best?
    5·1 answer
  • The SPF strategy can be proven to be optimal in the sense that it minimizes average response times. In this problem, you will de
    10·1 answer
  • Techniques that shape material without removing material.​
    6·1 answer
  • Which of the following was (and still is) used by computer programmers as a first test program?
    13·2 answers
  • How do i copy a canvas course from old class to new course.
    12·1 answer
  • Which option best describes top-down design?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!