Company A has acquired Company B and is in the process of integrating their cloud resources. Company B needs access to Company A's cloud resources while retaining its 1AM solution. Which of the following should be implemented?
A. Multifactor authentication
B. Single sign-on
C. Identity federation
D. Directory service
A. Multifactor authentication
B. Single sign-on
C. Identity federation
D. Directory service