Which of the following is used to map attributes from the claims provider to claims attributes acceptable to the relying party?

A. Acceptance transform rules
B. Authentication policies
C. Multi-factor authentication
D. Data source selection

Answer: A

Computer Science & Information Technology

You might also like to view...

What term is used to describe any device you can use without knowing how it works internally?

A. white box B. interface C. black box D. method

Computer Science & Information Technology

One way of dealing with the PCDATA problem is to use a special construct called a CDATA ____________________, which marks a block of text as CDATA.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology