Which Check Point supported authentication scheme typically requires a user to possess a token?
Bob and Joe both have Administrator Roles on their Gaia Platform. Bob logs in on the WebUI and then Joe logs in through CLI. Choose what BEST describes the following scenario, where Bob and Joe are both logged in:
Fill in the blank: An identity server uses a______________to trust a Terminal Server Identity Agent.