Your company requires storage administrators to use a second authentication method when accessing OnCommand System Manager and OnCommand Unified
Manager. After entering their user name and password, administrators must enter a personal identify Verification (PIV) code from a smart card or a mobile device.
With which resource would you accomplish this objective?
A. a third-party key manager
B. an Active Directory server
C. the ONTAP onboard key manager
D. a third-party identity provider