多项选择题

A. Authentication enforcer
B. Directory server
C. Captive authentication
D. Authentication policy
E. Role-mapping rules