Which of the following presents the GREATEST information security concern when deploying an identity and access management solution?
A. Complying with the human resource policy
B. Supporting multiple user repositories
C. Supporting legacy applications
D. Gaining end user acceptance
A. Complying with the human resource policy
B. Supporting multiple user repositories
C. Supporting legacy applications
D. Gaining end user acceptance