A company wants to reduce the amount of different login IDs and passwords their employees need to access the different company resources. What type of authentication scheme would you recommend they implement to provide that functionality?
|Architecture and Design|
|Operations and Incident Response|
|Governance, Risk, and Compliance|
|Attacks, Threats, and Vulnerabilities|