A network administrator is in the process of developing a new network security infrastructure. One of the requirements for the new system is the ability to perform
advanced authentication, authorization, and accounting. Which of the following technologies BEST meets the stated requirement?
A.
Kerberos
B.
SAML
C.
TACACS+
D.
LDAPS