When shared accounts or authenticators are employed, require users to be individually authenticated before granting access to the shared accounts or resources.
When shared accounts or authenticators are employed, require users to be individually authenticated before granting access to the shared accounts or resources.