A security administrator is configuring authentication for t…

A security administrator is configuring authentication for technicians accessing wireless access points and switches. Rather than using local accounts, all login requests should be validated against a centralized authentication system. Which of the following would be the BEST solution to implement this requirement?