Authentication from many different sources

TAC doesn’t restrict you to one authentication repository. You can have multiple ways to validate an end user, and these methods can be combined together to make a much more certain way of distinguishing your users from would-be imposters. For example, you can combine Active Directory username and password with hardware device credentials, certificates, smartcards or even biometric authentication.