Universal containers is building an integration between salesforce and their accounting system. the integration will utilize outbound messaging with call back pattern to salesforce. the security officer would like to understand the authentication solution. what are the three ways that the call back can authenticate itself to salesforce? choose 3 answers a. utilize the enterprise wsdl login() operation to obtain a new session id. b. utilize an oauth username-password flow to obtain a new oauth token for the session id. c. utilize the rest api login() operation to obtain a new session id d. utilize the session id contained within the outbound message notification as the authorization header. e. utilize the partner wsdl with oauth to obtain a valid oauth token for the session id. a, c,d which mechanism should an integration architect recommend to make a secure, authenticated connection to a remote system that results in the remote system trusting salesforce?
i would check in the references section of the report or the cve listing or database associated with it. cve listings provide definitions for publicly disclosed cybersecurity exposures and vulnerabilities. its goal is easier to share data across separate capabilities with these definitions. cve entries include identification number, a description, and at least a public reference.
click on it and push options, then click reply
if u are on ur computer instead, then there is a comment box under the ans. click, type then press return.