Which of the following regarding authentication protocols is a PRIMARY consideration when designing an authentication and key management system?
Refresh
Visibility
Authorization
Integrity
Submit