When using Captive Portal to send unidentified users to a Web portal for authentication, which of
the following is NOT a recommended use for this method?
A.
Identity-based enforcement for non-AD users (non-Windows and guest users)
B.
For deployment of Identity Agents
C.
Basic identity enforcement in the internal network
D.
Leveraging identity in Internet application control