OAuth

Results: 220



#Item
11Microsoft / Computing / Email marketing software / Marketo / Software / OAuth / Outlook.com

Marketo: Integration Overview Create and update contacts through Sprinklr to drive your lead generation program. © 2014 Sprinklr. All rights reserved. © 2014 Sprinklr. All rights reserved.

Add to Reading List

Source URL: launchpoint.marketo.com

Language: English - Date: 2014-12-22 12:19:59
12Computing / Computer access control / Internet protocols / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / OAuth / HTTP cookie / Web portal / HTTPS / World Wide Web / Cross-site scripting

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:49
13Computer access control / Computer security / Computing / Identity management / Federated identity / Metadata standards / Security Assertion Markup Language / SAML 2.0 / Shibboleth / XACML / OpenID / OAuth

Milestone MJRA1.3: Design for the integration of an Attribute Management Tool

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:16
14Computer access control / Computing / Cloud standards / Computer security / OAuth / Access token / Token coin / Token / Federated identity

Application name Concur contact

Add to Reading List

Source URL: developer.concur.com

Language: English - Date: 2016-08-15 15:53:27
15Computing / Cloud standards / Software / Application programming interfaces / Computer access control / OAuth / Mobile app / OpenID / Open API / Mobile backend as a service / Kony /  Inc.

CA Mobile App Services - Data Sheet

Add to Reading List

Source URL: itworldcanada.com

Language: English - Date: 2016-04-14 13:47:19
16Computer access control / Computer security / Computing / Electronic authentication / Security token / Authentication / Multi-factor authentication / OpenID / RSA SecurID / Mutual authentication / OAuth / SQRL

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann  Markus Hertlein  Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertl

Add to Reading List

Source URL: www.xignsys.com

Language: English - Date: 2016-03-13 15:17:18
17Computing / Cloud computing / Web services / Cloud infrastructure / Cloud Foundry / Cloud storage / VMware / OAuth / Pitney Bowes / Web API / UAA

1. Login to the Predix platform using the credentials 2. Run Cloudfoundry markaetplace command 3. Create the instance of the service The service is a UAA secured service and would need Predix UAA details. https://www.pre

Add to Reading List

Source URL: challenges.s3.amazonaws.com

Language: English - Date: 2016-06-27 10:55:52
18Computing / Computer access control / Computer security / Cloud standards / Federated identity / Identity management / User-Managed Access / OAuth / OpenAM / Cloud computing / Authorization / Internet privacy

USER-MANAGED ACCESS DATASHEET ForgeRock Identity Platform: User-Managed Access User-controlled data sharing for privacy and trust

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-01-27 00:48:20
19Computer access control / Computer security / Federated identity / Identity management / Cloud standards / OpenID / Authentication / Single sign-on / Identity provider / Password / Information Card / OAuth

An Investigation into a Usable Identity Binding Service Tristan Lewis William Kim Jill L. Drury

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:32
20Software architecture / Cloud standards / Web API / OAuth / Application programming interface

Web APIs and How They Work Greg Brail, Apigee ©2015 Apigee Corp. All Rights Reserved. Why APIs?

Add to Reading List

Source URL: www.hpts.ws

Language: English - Date: 2015-10-01 08:02:31
UPDATE