Access token

Results: 765



#Item
311Security token / SecurID / Two-factor authentication / Software token / Authentication / Access token / Password / Provisioning / Identity management / Security / Computer security / Access control

Two Factor Authentication for your smartphone Software Tokens Key benefits

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-11-08 06:50:04
312EMC Corporation / Advanced Encryption Standard / SecurID / Personal identification number / Password / Authentication / Transaction authentication number / Access token / Identity management / Cryptography / Security / Computer security

The Secure Authentication Service Welcome Guide for RSA SecurID from Signify users www.signify.net

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-05-09 07:37:43
313EMC Corporation / Advanced Encryption Standard / SecurID / Two-factor authentication / Software token / Password / Access token / Identity management / Authentication / Cryptography / Security / Computer security

Token Based Authentication as a Fully Hosted Service Key benefits Reliable •

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-11-07 11:09:46
314Security / OAuth / HTTP / Identity management / Access token / Authorization / Basic access authentication / SAML 2.0 / Security Assertion Markup Language / Computing / Computer security / Internet protocols

draft-ietf-oauth-v2-12 - The OAuth 2.0 Authorization Framework

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-01-11 14:21:43
315Security token / One-time password / Password / Authentication / Cryptography / Password manager / Two-factor authentication / Security / Computer security / Access control

Password Less Authentication (PLA) Srikar Sagi

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-30 09:40:52
316OpenStack / Access token / Security token / CURL / Ubuntu / Google Chrome / Application programming interface / Software / Computing / Cloud infrastructure

OpenStack API Quick Start

Add to Reading List

Source URL: docs.openstack.org

Language: English - Date: 2015-02-13 14:10:20
317Cryptography / NTLM / LM hash / Kerberos / Ticket Granting Ticket / Server Message Block / Access token / Password / Pass the hash / Computer network security / Computing / Computer security

Useful Hacking Series Welcome to the Useful Hacking Series, in this series of 20 Episodes our world-renowned penetration tester/international speaker will share with you the top useful tips used during her security audit

Add to Reading List

Source URL: www.glasspaper.no

Language: English - Date: 2014-05-14 05:19:36
318Access token / Password / Representational state transfer / Computing / Login / Session

PDF Document

Add to Reading List

Source URL: www.abacus.ch

Language: English - Date: 2015-02-06 06:35:11
319Computer security / Identity management / Windows Server / Access Control Service / Windows Identity Foundation / Computing platforms / Security token / Access token / .NET Framework / Computing / System software / Security

Claims-based security for Web applications using WIF 4.5 Alex Thissen Principal Architect, Achmea

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-02-01 14:16:25
320Federated identity / Security token / OpenID / Password / Single sign-on / One-time password / Phishing / Integrated Windows Authentication / JavaScript / Security / Computer security / Access control

The Mobile Browser as a Web-Based Platform for Identity Ben Adida∗ Abstract Mobile devices have long been considered useful in bootstrapping authentication via other channels, including the web. As mobile devices begin

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2007-08-31 23:29:14
UPDATE