How can an application get authenticated by the Centera?
A.
Application sends the Pal-file encrypted to Centera as part of the connection process
B.
Connect string contains IP-Address of one or more access nodes, and a valid pair of name
and secret
C.
Send IP address of all access nodes and correct subnet mask as part of the connect string
D.
System administrator has to set an environment variable, which points to the location of the
PAl-module