An organization is moving its human resources system to a cloud services provider.The company plans to continue using internal usernames and passwords with the service provider, but the security manager does not want the service provider to have a company of the passwords.Which of the following options meets all of these requirements?
A. Two-factor authentication
B. Account and password synchronization
C. Smartcards with PINS
D. Federated authentication
Answer: D. Federated authentication
Computer Science & Information Technology
You might also like to view...
The_______ instructs the PSP parser not to evaluate any scriptlets contained within the resource.
a)
Computer Science & Information Technology
The _________ method moves a thread from the waiting state to the ready state.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
It is possible to use POD to print one copy of a book
Indicate whether the statement is true or false
Computer Science & Information Technology
Adjusting the column width of any field to fit the contents is referred to as ________
Fill in the blank(s) with correct word
Computer Science & Information Technology