A network administrator is setting up a wireless network for a large corporation. The security policy requires that each user authenticates with their unique network credentials rather than using a shared password. Which of the following wireless security configurations should be implemented?