A company hired an external consultant to assist with required system upgrades to a critical business application. A systems administrator needs to secure the consultant's access without sharing passwords to critical systems. Which of the following solutions should most likely be utilized?
a4e15bd
Highly Voted 8 months, 3 weeks agokalmax5400
Most Recent 2 months, 1 week agoscoobysnack209
8 months, 3 weeks ago