Using third party PKI involves creating a certificate for the user and:
A.
A certificate for the User Group
B.
A certificate for the NT Server
C.
A certificate for the Security Management Server
D.
A certificate for the gateway
E.
A certificate for the Policy Server