Access Authentication

Results: 2034



#Item
711Federated identity / Identity management / Cloud standards / OpenID / OAuth / Roaming / Authentication / Federated identity management / Access Control Service / Computer security / Security / Identity

ATIS-IATIS Trust and Identity (T&I) Focus Group White Paper July 2013 As a leading technology and solutions development organization, ATIS brings together the top global ICT companies to advance the

Add to Reading List

Source URL: access.atis.org

Language: English
712Security / Computer security / Identity assurance / Access control / National Strategy for Trusted Identities in Cyberspace / OpenID / Digital identity / Internet privacy / Authentication / Identity / Identity management / Federated identity

CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:11
713Standards / Access control / Credential / Smart card / Identity document / Biometrics / Identity assurance / Identity theft / Authentication / Security / Identity management / FIPS 201

Microsoft Word - NextgenID_West_Virginia_080914_wp

Add to Reading List

Source URL: www.nextgenid.com

Language: English - Date: 2014-10-22 12:29:00
714Password / Identity management / Cryptography / One-time password / Single sign-on / Authentication / Hitachi ID Systems / Password manager / Password strength / Security / Computer security / Access control

Password Management Best Practices © 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction

Add to Reading List

Source URL: hitachi-id.com

Language: English - Date: 2015-01-29 09:51:22
715Security token / Single sign-on / One-time password / Password / QR code / Authentication / Keystroke logging / Two-factor authentication / Password manager / Security / Computer security / Access control

Strong authentication via QR Code With Evidian QRentry™, your users authenticate with a QR Code™ and their smartphone. The QRentry™ solution allows authenticating with a browser on a web portal or on Windows from

Add to Reading List

Source URL: www.evidian.com

Language: English - Date: 2015-03-09 12:43:08
716Internet / Network architecture / Network management / Wireless networking / Xirrus / Computer network security / RADIUS / Extensible Authentication Protocol / IEEE 802.11ac / Computing / Internet protocols / Internet standards

Xirrus XR-630 Wireless Access Point D ATA S HEET 802.11ac AP Performance Optimized with ACExpress™

Add to Reading List

Source URL: www.brainworks.de

Language: English - Date: 2014-11-25 10:38:09
717Cryptographic protocols / HTTP / Internet protocols / Spring Security / Cross-site request forgery / Lightweight Directory Access Protocol / Java Authentication and Authorization Service / Authentication / WebSocket / Computing / Java enterprise platform / Directory services

Spring Security Reference

Add to Reading List

Source URL: docs.spring.io

Language: English - Date: 2015-03-25 23:19:32
718Identity management / Security token / Password / Authentication / Multi-factor authentication / One-time password / Strong authentication / Two-factor authentication / Password manager / Security / Computer security / Access control

Microsoft Word - Authentication Manager-39 A2 79LV 04.doc

Add to Reading List

Source URL: www.evidian.com

Language: English - Date: 2013-06-26 02:06:21
719Access control / Identity management / Security token / E-Authentication / Single sign-on / Authentication / Security Assertion Markup Language / Email / Security / Computer security / Federated identity

Services Catalogue Department of Industry and Science Contents 1 Introduction

Add to Reading List

Source URL: vanguard.business.gov.au

Language: English - Date: 2015-01-22 19:37:12
720Java Authentication and Authorization Service / Java platform / Computer network security / Java Agent Development Framework / Kerberos / Access control / Privilege / Computing / Security / Computer security

J ADE S ecurit y Add -On GUID E JADE SECURITY GUIDE USAGE RESTRICTED ACCORDING TO LICENSE AGREEMENT. last update: 28-February[removed]JADE 3.3 Authors: JADE Board

Add to Reading List

Source URL: jade.tilab.com

Language: English - Date: 2014-07-11 08:15:22
UPDATE