A company wants to use a different authentication option than username and password to access the company's web portal. The security deployment professional is in the process of deploying an IBM Security Access Manager 9.0.0 solution for the company to protect its web portal.
Which authentication method should the deployment professional consider?