Certified Information Systems Security Professional – CISSP – Question325

Which of the following BEST describes how access to a system is granted to federated user accounts?

A.
With the federation assurance level
B. Based on defined criteria by the Relying Party (RP)
C. Based on defined criteria by the Identity Provider (IdP)
D. With the identity assurance level