Which of the following authorization models uses a set of protocols designed for passing the authorization and authentication information of a user between different security domains?
Federated identity management
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)