State of Connecticut

11. The solution may be used to implement multi-factor authentication to specific applications designated as requiring more restricted access. 12. The solution can automate synchronization (adds, changes and deletions) of identities to target applications and other repositories. 13. ................
................