What type of transaction is described by the following series of steps? 1. The browser asks the security provider for a resource. 2. The SP provides the browser with an XHTML format. 3. The browser asks the identity provider to validate the user 4. The browser provides the XHTML back to the SP for access
A. authenticated SAMLv2
B. unauthenticated SAMLv2
C. authenticated SAMLv1
D. unauthenticated SAMLv1
B
Explanation: The steps provided describe an unauthenticated SAMLv2 transaction.
You might also like to view...
Items you copy using drag and drop do not get placed on the Windows or Office Clipboard. _________________________
Answer the following statement true (T) or false (F)
Describe Nano Server.
What will be an ideal response?
Answer the following questions true (T) or false (F)
1. The position of the ampersand in the function header is of no importance to the proper compiling and execution of code that uses call-by-reference parameters. 2. A call-by-value parameter may pass data only into a function.
Cable modems provide
a. a dedicated pipe to the Internet b. switched B-channels to the Internet c. more bandwidth than an analog phone line, but shared with others in the neighborhood d. a high speed bidirectional service