Valid Identity-and-Access-Management-Designer Dumps shared by ExamDiscuss.com for Helping Passing Identity-and-Access-Management-Designer Exam! ExamDiscuss.com now offer the newest Identity-and-Access-Management-Designer exam dumps, the ExamDiscuss.com Identity-and-Access-Management-Designer exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Identity-and-Access-Management-Designer dumps with Test Engine here:
Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?