Marketing Cloud User Authentication | Exam CMCA | Salesforce

Marketing Cloud User Authentication

Question

What does Marketing Cloud authenticate when a user logs in through the user interface?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C.

C

When a user logs in to Marketing Cloud through the user interface, Marketing Cloud performs an authentication process to ensure the user is authorized to access the system. This process involves verifying multiple factors, including the user's credentials, role, and permissions. However, the specific factors that Marketing Cloud authenticates may vary depending on the security settings and configuration of the account.

The three options given in the question are all potential factors that Marketing Cloud might authenticate during the login process:

A. Business Hours: Marketing Cloud allows administrators to define specific business hours during which users are allowed to access the system. If this feature is enabled, Marketing Cloud will check whether the user is logging in within the defined business hours. If the user is trying to log in outside of business hours, Marketing Cloud may deny access.

B. Role in the Parent Business Unit: Marketing Cloud uses a role-based access control (RBAC) system to manage user permissions. Users are assigned roles that determine what actions they can perform in the system. When a user logs in, Marketing Cloud will check whether the user is assigned a role in the parent business unit. If the user does not have an assigned role, they may not be able to access the system.

C. Allowlisted IP Address: Marketing Cloud allows administrators to create an allowlist of IP addresses from which users are allowed to access the system. If this feature is enabled, Marketing Cloud will check whether the user is logging in from an IP address that is on the allowlist. If the user is trying to log in from an unauthorized IP address, Marketing Cloud may deny access.

In summary, Marketing Cloud authenticates multiple factors when a user logs in through the user interface, including business hours, role in the parent business unit, and allowlisted IP address. The specific factors that are checked may vary depending on the security settings and configuration of the account.