Users with Identity Awareness Agent installed on their machines login with __________, so that
when the user logs into the domain, that information is also used to meet Identity Awareness
credential requests.
A.
Key-logging
B. ICA Certificates
C.
SecureClient
D.
Single Sign-On
D)
0
0
D)
0
0
{D}
0
0