Access token

Results: 765



#Item
11Cryptography / Computer access control / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Multi-factor authentication / One-time password / Authentication / Security token / Identity management system / Public key certificate

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:18:57
12Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
13Domain name system / Internet / Computing / Network architecture / Internet Standards / Internet protocols / Domain registration / Domain name / Name server / Domain name registrar / WHOIS

 SectionQuery domain name details using token addedWhitelist IP addresses for DRS-EPP access moved to Chapter 3 Admin user, in line with the whitelisting functionality being linked to the role of admin

Add to Reading List

Source URL: nic.amsterdam

Language: English - Date: 2016-06-09 09:47:38
14Computer access control / Exonumia / Token coin / Computer security / Access token / Tamper-evident technology / Prevention / Safety / Cryptography / Security token / RSA SecurID

Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

Add to Reading List

Source URL: www.conlog.co.za

Language: English - Date: 2015-11-26 07:18:35
15Computer access control / Computer security / Access token / Token / Security / Access control / Security token / RSA SecurID

Emerald Insight Access Tokens – An Administrator’s Guide This document provides an overview of access tokens, including: ‘what is an access token and why do I need one?’, in addition to guidance on how to activa

Add to Reading List

Source URL: www.emeraldgrouppublishing.com

Language: English - Date: 2015-11-25 03:54:07
16Computer access control / Cryptography / Computer security / Computing / Password / Security token / Login / Session / Password manager / Self-service password reset

Security Measures of Trading System AyersGTS’s underlying software architecture is supported by a Security Server which provides (a) user authentication by login mechanism; (b) maintains session’s validity; (c)functi

Add to Reading List

Source URL: www.hkfoundersc.com

Language: English - Date: 2015-06-22 02:44:30
17Computer access control / Computer security / Computing / Security token / Multi-factor authentication / Authentication / RSA SecurID / Mutual authentication / OAuth / OpenID / Electronic authentication / Extensible Authentication Protocol

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
18Computing / Computer access control / Smartphones / Cloud clients / Personal computing / Information appliances / Security token / Multi-factor authentication / Touchscreen / IPhone / Token / Android

Smartphones Editor: Roy Want n Google n Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2013-04-18 23:09:49
19

Steps for first authentication in Alpha Click using a security device (token) Step 1 Access www.alphaclick.ro and select the option Login.

Add to Reading List

Source URL: www.alphaclick.ro

- Date: 2014-03-26 08:36:50
    20Computer security / Computer access control / Cryptography / Computing / Entrust / Security token / Datacard Group / Authentication / IEEE 802.1X / Smart card / Identity management / Electronic authentication

    +entrust.com/enterprise Entrust IdentityGuard for Enterprise

    Add to Reading List

    Source URL: www.entrustdatacard.com

    Language: English - Date: 2016-02-11 14:34:23
    UPDATE