__________ is an extension of identity management to multiple security domains such as autonomous internal business units, external business partners and other third party applications and services with the goal of sharing digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.

A. Identity federation
B. Kerberos
C. Attribute service
D. Data security management


A. Identity federation

Computer Science & Information Technology

You might also like to view...

A ____ is a command that tells Outlook how to process an email message.

A. rule B. stipulation C. dictate D. signature

Computer Science & Information Technology

The current location of a device can be pinpointed on a map through the device's _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Help clarify and emphasize details, so they appeal to audience members with differing backgrounds, reading levels, attention spans, and motivations.

A. Icons
B. Outlines
C. Graphics
D. Typefaces

Computer Science & Information Technology

Which of the following is the path to the Promote button?

A. (SMARTART TOOLS FORMAT tab | Create Graphic group) B. (SMARTART TOOLS LAYOUT tab | Graphics group) C. (SMARTART TOOLS DESIGN tab | Text group) D. (SMARTART TOOLS DESIGN tab | Create Graphic group)

Computer Science & Information Technology