Which of the following is used to map attributes from the claims provider to claims attributes acceptable to the relying party?
A. Acceptance transform rules
B. Authentication policies
C. Multi-factor authentication
D. Data source selection
Answer: A
Computer Science & Information Technology
You might also like to view...
What term is used to describe any device you can use without knowing how it works internally?
A. white box B. interface C. black box D. method
Computer Science & Information Technology
One way of dealing with the PCDATA problem is to use a special construct called a CDATA ____________________, which marks a block of text as CDATA.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology