How can an application get authenticated by the Centera?

A.
Connect string contains IP-Address of one or more access nodes, and a valid pair of name and secret
B.
Send IP address of all access nodes and correct subnet mask as part of the connect string
C.
Application sends the PAI-file encrypted to Centera as part of the connection process
D.
System administrator has to set an environment variable, which points to the location of the PAI-module