Which process is being described by the following steps? 1. A user logs into domain A using a PKI certificate on a smartcard protected by an 8-digit PIN. 2. The credential is cached by the authenticating server in domain
A.
3. Later, the user attempts to access a resource in domain B.
4. A request to the original authenticating server is initiated to somehow attest to the resource server in the second domain that the user is in fact who they claim to be.
A. HTML
B. SAML
C. SOAP
D. IPsec
B
Explanation: The steps provided describe the operation of SAML.
Exam 3
You might also like to view...
When drawing with the Pencil tool, what does an asterisk (*) next to the cursor
indicate? What will be an ideal response?
What does the conversion rate of a web site measure? Give an example of “taking action” on an e-commerce site. What would be an example of taking action on a college admissions web site? Many students who are seeking employment will post their rŽsumŽs on their personal web sites. What would be an example of taking action in this case?
What will be an ideal response?