What accurately describes the behavior of an access token on an Isilon cluster?

A.
Updated when the client accesses the cluster
B.
One token is generated for every access zone
C.
Cannot contain both an SID and an UID
D.
Requires the use of external authentication providers