Name three security benefits of FIdM over requiring users to use a new set of credentials.
What will be an ideal response?
When a user leaves an organization and his/her primary account is deleted, he/she loses access to other services as well; the primary organization can set the authentication requirements (e.g., minimum password length) according to their standards; the primary organization can control user access to outside services in an automated way.
Computer Science & Information Technology
You might also like to view...
What operations were identified for the ADT Stack?
What will be an ideal response?
Computer Science & Information Technology
____________________ orientation prints a worksheet on the page sideways.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology