A company has purchased an application that integrates into their enterprise user directory for
account authentication. Users are still prompted to type in their usernames and passwords. Which
of the following types of authentication is being utilized here?
A.
Separation of duties
B.
Least privilege
C.
Same sign-on
D.
Single sign-on