A company has purchased a new SaaS application and is in the process of configuring it to meet the company's needs. The director of security has requested that the SaaS application be integrated into the company's IAM processes. Which of the following configurations should the security administrator set up in order to complete this request?
Disguy
Highly Voted 5 years, 3 months agoMohawk
4 years, 1 month agoBristy
3 years, 11 months agocookieexam
Highly Voted 4 years, 12 months agohy_n_bkhool
Most Recent 3 years, 9 months agofonka
3 years, 10 months agofonka
3 years, 10 months agoBorn_Again
3 years, 11 months agoStickyMac
3 years, 12 months agoCryptomike87
4 years, 1 month agoCryptomike87
4 years, 1 month agoYettiSpider
4 years, 1 month agoFunkydave
4 years, 1 month agoKJ44
4 years, 2 months agolapejor
4 years, 2 months agoKJ44
4 years, 2 months agoKJ44
4 years, 2 months agoMortG7
4 years, 2 months agonakres64
4 years, 2 months agodietrroc
4 years, 2 months agoOrkhann
4 years, 3 months agoDSwizzle
4 years, 3 months agoPoker69
4 years, 4 months agoMichaelLangdon
4 years, 5 months agowho__cares123456789___
4 years, 4 months ago