Integrated Windows Authentication

Results: 106



#Item
61Integrated Windows Authentication / Two-factor authentication / Password / Operating system / Firefox / Windows / Internet Explorer 8 / Google Chrome / Software / Internet Explorer / Computer network security

Minimum Techinical Requirements for Agencies

Add to Reading List

Source URL: www.finance.gov.au

Language: English - Date: 2013-10-18 02:08:29
62Federated identity / Cloud standards / Identity management / Security Assertion Markup Language / Directory service / Two-factor authentication / Integrated Windows Authentication / OpenID / Single sign-on / Computer security / Security / Computing

Tasmanian Cloud - Networking Tasmania Pre-Tender Consultation NT III - Authentication and Authorisation Service Scoping and implementation approach

Add to Reading List

Source URL: www.tmd.tas.gov.au

Language: English - Date: 2015-01-18 18:51:10
63Computer network security / Contract law / Information technology management / Outsourcing / Service-level agreement / Security token / Information security / Integrated Windows Authentication / Public key infrastructure / Cryptography / Security / Computer security

STANDARD TERMS AND CONDITIONS

Add to Reading List

Source URL: vanguard.business.gov.au

Language: English - Date: 2015-01-22 19:36:59
64Computer network security / Integrated Windows Authentication / Internet Explorer / Two-factor authentication / Password / Operating system / Firefox / Windows / SAP AG / Software / Computing / Microsoft Windows

DOC Document

Add to Reading List

Source URL: www.finance.gov.au

Language: English - Date: 2013-10-18 02:08:29
65Computer network security / Internet protocols / Internet standards / Directory services / Password / Lightweight Directory Access Protocol / Integrated Windows Authentication / Single sign-on / Security token / Computer security / Computing / Software

Siebel Security Guide Siebel Innovation Pack 2013 Version[removed]September 2013 Copyright © 2005, 2013 Oracle and/or its affiliates. All rights reserved.

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2013-09-13 05:03:24
66Internet standards / Directory services / Computer network security / Security / Lightweight Directory Access Protocol / Password / Siebel Systems / Integrated Windows Authentication / Single sign-on / Computing / Computer security / Internet protocols

Security Guide for Siebel Business Applications

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-04-18 05:17:08
67Security / Internet protocols / Cryptographic protocols / Kerberos / Password authentication protocol / Mutual authentication / Integrated Windows Authentication / Authentication server / Security token / Computer network security / Computer security / Computing

LNCS[removed]Peer-to-Peer Authentication with a Distributed Single Sign-On Service

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-12 23:49:30
68Computer network security / Directory services / Distributed computing architecture / MongoDB / NoSQL / Structured storage / Kerberos / Integrated Windows Authentication / PERMIS / Computing / Computer security / Data management

MongoDB Security Guide Release[removed]MongoDB Documentation Project January 23, 2015

Add to Reading List

Source URL: docs.mongodb.org

Language: English - Date: 2015-01-23 18:00:37
69Cryptography / Kerberos / Key distribution center / Ticket Granting Ticket / Generic Security Services Application Program Interface / Integrated Windows Authentication / Authentication server / Ticket / STARTTLS / Computer network security / Computing / Computer security

Shishi Kerberos 5 implementation for the GNU system for version 1.0.2, 3 April 2013 Simon Josefsson

Add to Reading List

Source URL: www.gnu.org

Language: English - Date: 2013-04-03 06:58:02
70Security / Security token / Integrated Windows Authentication / Kerberos / Authentication server / Password authentication protocol / Single sign-on / Digest access authentication / Extensible Authentication Protocol / Computer security / Computer network security / Computing

Peer-to-Peer Authentication with a Distributed Single Sign-On Service ∗ William Josephson Emin G¨un Sirer

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:58:13
UPDATE