You want to ensure that users who access the company’s protected resources present a client certificate before they are allowed to sign in.
What should you configure?
A.
A certificate authentication policy that allows all users and remembers certificate information while the user is signed in.
B.
A certificate authentication policy that only allows users with a client-side certificate signed by a trusted client CA to sign in.
C.
A certificate role restriction that allows all users and remembers certificate information while the user is signed in.
D.
A certificate role restriction that only allows users with a client-side certificate signed by a trusted client CA to sign in.