Users with Identity Awareness Agent installed on their machines login with __________, so that when the user logs into the domain, that information is also used to meet Identity Awareness credential requests.
A.
ICA Certificates
B.
Key-logging
C.
SecureClient
D.
Single Sign-On
D