Integrated Windows Authentication

Results: 106



#Item
71Federated identity / Computer network security / Identity management / Identity management systems / Windows Identity Foundation / Single sign-on / ASP.NET / Integrated Windows Authentication / Authentication / Software / Computer security / Computing

Sample Chapters Copyright © 2011 by Vittorio Bertocci All rights reserved. To learn more about this book visit http://go.microsoft.com/fwlink/?Linkid=196688.

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2010-11-04 18:09:20
72Cryptography / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Integrated Windows Authentication / NTLM / Ticket / Authentication server / Computer network security / Computer security / Computing

Microsoft Word - white_paper_draft_2.doc

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
73Computing / NTLM / Pass the hash / LM hash / Integrated Windows Authentication / LAN Manager / Password / Windows / Kerberos / Microsoft Windows / Computer network security / Computer security

PDF Document

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:34
74Cyberwarfare / NTLM / Kerberos / LM hash / Integrated Windows Authentication / Ticket Granting Ticket / Pass the hash / Local Security Authority Subsystem Service / Authentication / Computer network security / Computer security / Cryptography

mimikatz and your credentials ‘you’ll hate your SSO’ Benjamin DELPY `gentilkiwi` `whoami` ?

Add to Reading List

Source URL: www.nosuchcon.org

Language: English - Date: 2014-11-20 03:49:27
75Federated identity / Security token / OpenID / Password / Single sign-on / One-time password / Phishing / Integrated Windows Authentication / JavaScript / Security / Computer security / Access control

The Mobile Browser as a Web-Based Platform for Identity Ben Adida∗ Abstract Mobile devices have long been considered useful in bootstrapping authentication via other channels, including the web. As mobile devices begin

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2007-08-31 23:29:14
76Cyberwarfare / NTLM / Integrated Windows Authentication / Server Message Block / LAN Manager / Cryptographic nonce / Authentication protocol / Challenge-response authentication / Windows / Computing / Computer security / Computer network security

Understanding the Windows SMB NTLM Authentication Weak Nonce Vulnerability Hernan Ochoa

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:52:55
77Key management / Computer network security / Password authentication protocol / Integrated Windows Authentication / Authentication / Revocation list / Digital signature / Parity of a permutation / Cryptography / Public-key cryptography / Notary

PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication Patrick P. Tsang† , Man Ho Au‡ , Apu Kapadia† , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2008-09-15 21:11:07
78Federated identity / Identity management / Computer network security / Single sign-on / Security Assertion Markup Language / SAML 2.0 / Integrated Windows Authentication / Authentication / One-time password / Computer security / Security / Computing

IAM Access Manager I AM Access Manager is one of many services from CGI in the area of Identity and Access Management. Today, a

Add to Reading List

Source URL: www.cgi.se

Language: English - Date: 2014-09-15 05:50:47
79Internet Information Services / Microsoft Windows / Windows / Integrated Windows Authentication / Transport Layer Security / Simple Mail Transfer Protocol / IIS Metabase / HP Universal Print Driver / Computing / Software / System software

UNCLASSIFIED Report Number: C4-057R-00 Guide to the Secure Configuration and Administration of Microsoft

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-10-31 23:49:31
80Internet Explorer / Computer security / Groupware / Microsoft Exchange Server / Integrated Windows Authentication / Proxy server / PUM.bad.proxy / Computing / Internet / Email

Manual configuration of Outlook[removed]NOTE: This document is applicable only for customers using Apps4Rents Hosted Exchange[removed]Please follow the steps below to manually configure Outlook 2010 with Hosted Exchange 2010

Add to Reading List

Source URL: www.apps4rent.com

Language: English - Date: 2014-06-12 01:00:00
UPDATE