A software solution must be deployed based on the most granular access level. Which of the following methods should be used to meet the requirements?
A. Group
B. RBAC
C. File-based
D. LDAP
A software solution must be deployed based on the most granular access level. Which of the following methods should be used to meet the requirements?
A. Group
B. RBAC
C. File-based
D. LDAP