A corporation seeks to enhance security by centralizing authentication for its employees when they access network resources. Which solution should be implemented to best achieve this objective?
Applying a common shared key authentication across wireless networks for streamlined entry
Leveraging a protocol that interfaces with directory services for access to network resources
Setting individual user credentials on each network device to manage access separately
Implementing a protocol typically used for network device command authorization