When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?