A. Username B. LDAP user C. Certificate D. Custom expressions E. Source y IP
A. Admin logging B. SNMP logging C. Syslog server logging D. Event logging
A. Sign-in Policy B. Role Mapping Rule C. Role Restrictions D. Trusted Server CA