Users with Identity Awareness Agent installed on their machines login with __________, so that
when the user logs into the domain, that information is also used to meet Identity Awareness
credential requests.
A.
Key-logging
B. ICA Certificates
C.
SecureClient
D.
Single Sign-On
D)
D)
{D}