Users are reporting that they are entering the correct credentials into the Junos Pulse Access
Control Service, but are receiving the message “You are not allowed to sign in.”
Which three configuration elements would cause this issue? (Choose three.)
A.
role-mapping rules
B.
auth-table mapping
C.
authentication policies
D.
role restrictions
E.
resource access policies