Identity management systems

Results: 1028



#Item
241Computer security / Identity management systems / Password policy / Password strength / Password / Security / Access control

2014 CAASPP Electronic Reporting Manual

Add to Reading List

Source URL: californiatac.org

Language: English - Date: 2014-08-11 13:58:42
242Computer security / Email / Identity management systems / Password strength / Password policy / Password / Security / Access control

ONLINE REGISTRATION Tip Sheet ACCESSING USERNAMES/PASSWORDS

Add to Reading List

Source URL: www.playnrl.com

Language: English - Date: 2014-03-27 03:57:37
243Password / Identity management / Cryptography / One-time password / Single sign-on / Authentication / Hitachi ID Systems / Password manager / Password strength / Security / Computer security / Access control

Password Management Best Practices © 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction

Add to Reading List

Source URL: hitachi-id.com

Language: English - Date: 2015-01-29 09:51:22
244Project management / Information technology / Enterprise architecture / Enterprise content management / Infrastructure optimization / Identity management / Open Text Corporation / Adobe LiveCycle / Information technology management / Content management systems / Enterprise application integration

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: www.perceptivesoftware.com

Language: English - Date: 2015-04-17 19:09:43
245United States Department of Defense / Security / Defense Information Systems Agency / Key management / Security token / Common Access Card / SIPRNet / Public key infrastructure / Defense Enrollment and Eligibility Reporting System / Cryptography / Military communications / Wide area networks

DOD PROGRAMS Public Key Infrastructure (PKI) Executive Summary • DoD Public Key Infrastructure (PKI) Increment 2 provides authenticated identity management via password-protected

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2012-12-27 12:24:07
246Identity management systems / Computer security / Cloud computing / Security Assertion Markup Language / SAML 2.0 / Cloud collaboration / Computing / System software / Identity management

Conceptboard On-Premises Overview Your users get a simple, intuitive web interface for collaboration. Your IT department gets data security and control. Conceptboard Collaboration Benefits

Add to Reading List

Source URL: conceptboard.com

Language: English - Date: 2015-04-15 16:40:26
247Social issues / Law / Privacy / Internet privacy / Library / Bibliomining / Library science / Ethics / Identity management

  Developing  a  Consensus  Framework   to  Support  Patron  Privacy  in   Digital  Library  and  Information  Systems    

Add to Reading List

Source URL: www.niso.org

Language: English
248Federated identity / Identity management / Computing / Security Assertion Markup Language / SAML 2.0 / SAML 1.1 / Shibboleth / Authentication / Identity provider / Computer security / System software / Identity management systems

UK Access Management Federation for Education and Research Technical Recommendations for Participants Ian A. Young

Add to Reading List

Source URL: www.ukfederation.org.uk

Language: English - Date: 2014-10-13 08:06:49
249Password / Identity management systems / Self-service password reset / Transaction authentication number / Cryptographic software / Password strength / Password manager / Security / Access control / Computer security

How to change your IT account password This guide tells you how you can change your password yourself at any time, at the university or remotely. The guide covers: 

Add to Reading List

Source URL: as.exeter.ac.uk

Language: English - Date: 2015-01-09 13:00:12
250Network architecture / System software / Identity management systems / GridFTP / Identity management / Security Assertion Markup Language / Internet standards / PERMIS / Voms / Computing / Grid computing / FTP

Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu1,2, Liu Wantao3,4, Frank Siebenlist1,2, and Ian Foster1,2,3 1 Mathematics and Computer Science Division, Argonne National Laboratory

Add to Reading List

Source URL: toolkit.globus.org

Language: English - Date: 2008-10-27 13:50:24
UPDATE