Which type of authentication should you recommend?
Which authentication method should you recommend?
Which approach should you recommend?
You need to design the solution according to following requirements:
Which approach should your plan recommend?