A company has purchased a new SaaS application and is in the process of configuring it to meet the company's needs. The director of security has requested that the SaaS application be integrated into the company's IAM processes. Which of the following configurations should the security administrator set up in order to complete this request?
Disguy
Highly Voted 5 years, 2 months agoMohawk
4 years agoBristy
3 years, 11 months agocookieexam
Highly Voted 4 years, 11 months agohy_n_bkhool
Most Recent 3 years, 9 months agofonka
3 years, 10 months agofonka
3 years, 10 months agoBorn_Again
3 years, 11 months agoStickyMac
3 years, 11 months agoCryptomike87
4 years agoCryptomike87
4 years agoYettiSpider
4 years agoFunkydave
4 years agoKJ44
4 years, 1 month agolapejor
4 years, 1 month agoKJ44
4 years, 1 month agoKJ44
4 years, 1 month agoMortG7
4 years, 1 month agonakres64
4 years, 2 months agodietrroc
4 years, 2 months agoOrkhann
4 years, 3 months agoDSwizzle
4 years, 3 months agoPoker69
4 years, 3 months agoMichaelLangdon
4 years, 4 months agowho__cares123456789___
4 years, 3 months ago