What type of transaction is described by the following series of steps? 1. The browser asks the security provider for a resource. 2. The SP provides the browser with an XHTML format. 3. The browser asks the identity provider to validate the user 4. The browser provides the XHTML back to the SP for access

A. authenticated SAMLv2
B. unauthenticated SAMLv2
C. authenticated SAMLv1
D. unauthenticated SAMLv1


B
Explanation: The steps provided describe an unauthenticated SAMLv2 transaction.

Computer Science & Information Technology

You might also like to view...

Items you copy using drag and drop do not get placed on the Windows or Office Clipboard. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Describe Nano Server.

What will be an ideal response?

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. The position of the ampersand in the function header is of no importance to the proper compiling and execution of code that uses call-by-reference parameters. 2. A call-by-value parameter may pass data only into a function.

Computer Science & Information Technology

Cable modems provide

a. a dedicated pipe to the Internet b. switched B-channels to the Internet c. more bandwidth than an analog phone line, but shared with others in the neighborhood d. a high speed bidirectional service

Computer Science & Information Technology