Identity management systems

Results: 1028



#Item
211Integrated Windows Authentication / Computing / Federated identity / Identity management systems / Software / BMC Remedy Action Request System / Computer security

SSO Plugin Release notes J System Solutions http://www.javasystemsolutions.com Version 3.6

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2013-04-05 12:28:22
212Health informatics / Identity management / Medical informatics / Healthcare in the United States / Identity assurance / Health Insurance Portability and Accountability Act / Patient portal / Healthcare Information and Management Systems Society / Two-factor authentication / Health / Security / Computer security

HIMSS Identity Management Task Force Recommended Identity Assurance for Patient Portals The HIMSS Identity Management Task Force (IDM TF) serves as a multi-stakeholder industry liaison group, and focuses on the developm

Add to Reading List

Source URL: www.himss.org

Language: English - Date: 2015-04-02 13:13:28
213Computer security / Cryptographic software / Identity management systems / Privileged password management / Password synchronization / Password / Security / Access control

Modified January 20, 2014! ! ! www.PestaRoo.com

Add to Reading List

Source URL: pestaroo.com

Language: English - Date: 2014-01-21 16:12:17
214Password policy / Password / Authorize.Net / Identity management systems / Su / Password strength / Password synchronization / Security / Access control / System software

White Paper Password Policy It is imperative that you implement adequate security to protect your payment gateway account from unauthorized activity. One key way to protect your account is to change

Add to Reading List

Source URL: www.authorize.net

Language: English - Date: 2012-07-13 17:55:41
215Identity management systems / Identity management / Password management / Password / Two-factor authentication / Self-service password reset / User provisioning software / Hitachi ID Systems / Security / Computer security / Access control

DATASHEET USER PROFILE MANAGER User Lifecycle Management for IBM i THE CHALLENGE

Add to Reading List

Source URL: static.helpsystems.com

Language: English - Date: 2014-02-04 11:45:29
216Computer security / Cryptography / Identity management systems / Password strength / Password policy / Password / Security / Access control

Guidelines to change your password before its expiry date If after having gone through these guidelines you are still experiencing difficulties with changing your password, please contact the Helpdesk: By Telephone: 020

Add to Reading List

Source URL: www.ioe.ac.uk

Language: English - Date: 2015-04-17 02:02:35
217Access control / Identity management systems / Password policy / Password manager / Password / Security / Cryptography

I want to put a document on the S drive but I don’t want any unauthorised people to view it? Sometimes you might want to save a document onto the S drive but you are worried that someone who is not authorised may be ab

Add to Reading List

Source URL: csu.edu.au

Language: English - Date: 2012-08-26 22:50:47
218Java enterprise platform / Middleware / Oracle Fusion Middleware / BEA Systems / Oracle Database / Oracle Corporation / Oracle WebLogic Server / Oracle Identity Management / Oracle WebCenter / Software / Computing / Proprietary software

Oracle Fusion Middleware Licensing Information

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2014-10-26 12:01:34
219Demography / Survey methodology / Census / Identity document / Geographic information system / Database / Database management systems / Statistics / Security

NRI Commentary: PNG Electronic Identification Program: A misaligned Project that needs to refocus on the essentials By Dr. Thomas Webster* Introduction The Government had initiated an “Identity Card” Project in 2013

Add to Reading List

Source URL: www.nri.org.pg

Language: English - Date: 2014-10-04 23:11:51
220System software / Digital identity / Trust law / Phorm / Security Assertion Markup Language / Law / Identity management / Computer security

Trust Framework Requirements and Guidelines V1 (DRAFT 01) Introduction In the context of digital identity systems, a trust framework is a certification program that enables a party who accepts a digital identity credenti

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
UPDATE