A. Modify sign-in policy.
B. Configure role mapping.
C. Assign authentication server.
D. Configure authentication policy.
参考答案:D
A. Modify sign-in policy.
B. Configure role mapping.
C. Assign authentication server.
D. Configure authentication policy.
参考答案:D