The services within a domain service inventory provide access to confidential data retrieved from a shared database. These services need to be accessible from outside the domain service inventory. Which of the following design options will preserve the confidentiality of the data when the services are accessed from outside the service inventory?
When using a single sign-on mechanism, security contexts are____________.
Using message-layer security, if a service agent takes possession of a message, it can forward the message to another service.
Username and X.509 token profiles can be combined so that a single message can contain a username token that is digitally signed.