Which of the following security mechanisms enables one cloud service consumer to be authenticated by a security broker, so that its security context is persisted when accessing other cloud services?
Select the correct answer.
Limited Time Offer
25%
Off
Currently there are no comments in this discussion, be the first to comment!
Currently there are no comments in this discussion, be the first to comment!