APICS CPIM-8.0 Question Answer
The Information Technology (IT) manager of a large organization has been tasked with implementing a distributed third-party Identity As A Service (IDaaS). The local security team is concerned that the Identity Provider (IdP) and resource provider have direct connectivity outside of enterprise control. Which of the following authentication methods BEST address this concern?
APICS CPIM-8.0 Summary
- Vendor: APICS
- Product: CPIM-8.0
- Update on: Sep 19, 2025
- Questions: 552