Identity management systems

Results: 1028



#Item
591Identity management / Identity management systems / Computer security / Extensible Resource Identifier / XRDS / XML / Computing / OASIS

OASIS Specification Template

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2008-07-24 16:19:20
592Password / Cryptographic software / Identity management systems / Password strength / OTPW / Security / Computer security / Access control

HIPAA Security Requirements for REVS Users Providers who use REVS (Recipient Eligibility Verification System) to verify member eligibility, or to verify the status of an adjudicated claim online, must have a user ID and

Add to Reading List

Source URL: www.mass.gov

Language: English - Date: 2013-08-30 22:53:30
593Password / Challenge-response authentication / Identity management systems / Password policy / Password strength / Security / Computer security / Access control

Identity and Access Management (IAM) End User Guide SSRPM

Add to Reading List

Source URL: iam.wisconsin.gov

Language: English - Date: 2012-06-15 09:10:55
594Open standards / Network management / Security Assertion Markup Language / Provisioning / Common Information Model / Information model / XML / XACML / Distributed Management Task Force / Computing / Identity management / Standards organizations

Brainstorming Session Ideas -Getting out of a centralized system, but having seamless interoperable way for provisioning among many systems -o Open automated interface to manage accounts

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-10-03 21:44:26
595Identity management systems / Identity management / Security Assertion Markup Language / XACML / Authorization / Authentication / SAML 2.0 / SAML 1.1 / Computer security / System software / Security

XACML Domain Model draft-xtc-use-domain-01 7-Jun-01 This document directly references the “SAML Domain Model – draft-sstc-use-domain04” by Dave Orchard and Hal Lockhart. The definitions and descriptions contained

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-06-22 15:41:32
596Identity management systems / Password strength / Self-service password reset / Password / Security / Computer security

Self Service: Faculty Quick Reference Guide Claim your CUNYfirst Account In order to utilize CUNYfirst, student must activate or claim their account first through the identity

Add to Reading List

Source URL: www.cuny.edu

Language: English - Date: 2013-04-26 13:56:28
597Computing / Email / Identity management systems / Cryptographic software / Password notification email / Password fatigue / Password / Security / Access control

Adjunct Access to IRSC Web Services and IRSC Email As an IRSC employee, you are assigned an employee identification number (PID). If you are in need of your employee PID, please contact Human Resources at[removed]

Add to Reading List

Source URL: www.irsc.edu

Language: English - Date: 2014-07-15 10:34:22
598Password / Identity management systems / Password policy / Password strength / Security / Cryptography / Computer security

Effective[removed]: As part of our ongoing effort to ensure the highest level of OUTREACH System password security, the Cabinet for Health and Family Services and the KY Division of Laboratory Services conducts routine a

Add to Reading List

Source URL: www.chfs.ky.gov

Language: English - Date: 2014-10-25 23:48:40
599Password / One-time password / Cryptography / Identity management systems / Cryptographic software / Password strength / Password policy / Security / Access control / Computer security

Activating your Creighton account: 1. Go to https://ami.creighton.edu. 2. Click “Activate Account” from the menu. 3. Enter your Creighton NetID, one time Password that was sent to you and your date of birth. 4. Choos

Add to Reading List

Source URL: www.creighton.edu

Language: English - Date: 2012-12-03 16:21:18
600Computing / Identity management systems / Internet standards / Metasearch engine / Shibboleth / Authentication / Security Assertion Markup Language / Athens / Proxy server / Federated identity / Security / Computer security

Ranking of Authentication and Access Methods Available to the Metasearch Environment

Add to Reading List

Source URL: www.niso.org

Language: English - Date: 2008-03-17 14:14:10
UPDATE