Federated identity

Results: 1914



#Item
981Identity management / Computing / Standards organizations / OpenID / National Strategy for Trusted Identities in Cyberspace / National Institute of Standards and Technology / Janrain / Digital identity / Privacy / Federated identity / Identity / Computer security

Microsoft Word - Program_IDtrust2012.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-03-01 13:10:22
982Directory services / Identity management / Federated identity / Internet standards / Internet protocols / Lightweight Directory Access Protocol / Authentication / Information security / Federated identity management / Security / Computer security / Computing

Authentication Services Information Technology Services Effective Date: [removed]Reviewed Dates:

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-11-21 12:33:08
983Login / Email / Internet / Federated identity / Web 2.0 / Computing / User / Password

User Guide Content Users  Copibec’s online copyright licensing

Add to Reading List

Source URL: www.copibec.qc.ca

Language: English - Date: 2014-03-26 10:02:06
984Security / Cloud standards / Internet protocols / Identity management / Public-key cryptography / OpenID / OAuth / Social login / Security Assertion Markup Language / Federated identity / Computing / Computer security

Pomcor’s Response to the Notice of Inquiry On NSTIC Governance Structure Francisco Corella, PhD [removed] Karen Lewison, MD

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 18:03:10
985OAuth / Computer security / Security / Federated identity / Access token / OpenID / .tel / Identity management / Social login / Cloud standards / Computing / Internet protocols

Microsoft Word - OAuth-4.docx

Add to Reading List

Source URL: dev.telnic.org

Language: English - Date: 2014-09-26 07:17:27
986Security / System software / Computer network security / Entrust / National security / Security Assertion Markup Language / Federated identity management / Identity management / Identity management systems / Computer security

Entrust GetAccess™ Comprehensive Course Overview … This course introduces participants to the Entrust GetAccess product, and provides the key concepts, skills and experience to integrate and manage Entrust GetAccess

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-11 13:43:02
987Internet / Identity management / Technology / Federated identity / United States Postal Service / Email / Computing

Financial Systems Security Access Request Form must be completed online before it is printed and authorized by Business Unit Financial Contact. Effective Date (YYYY/MM/DD) _________________ _ Security Administration Offi

Add to Reading List

Source URL: www.queensu.ca

Language: English - Date: 2014-09-12 08:46:20
988Social issues / Federated identity / Information Card / Internet privacy / IBM / Technology / Security Assertion Markup Language / Privacy / Database / Identity management / Computing / Ethics

The PrimeLife Policy Language ivacy in ITS workshop, July 20, 2010, Berlin

Add to Reading List

Source URL: www.preciosa-project.org

Language: English - Date: 2010-07-20 08:15:48
989Identity management / Security / OpenID / Liberty Alliance / Information Card / Security Assertion Markup Language / Identity assurance / Kantara Initiative / Digital identity / Federated identity / Identity / Computer security

Open Trust Frameworks for Open Government: Enabling Citizen Involvement through Open Identity Technologies Table of Contents

Add to Reading List

Source URL: openid.net

Language: English - Date: 2009-08-10 11:45:39
990Password / Access control / Email / Computer crimes / Federated identity / Computing / Security / Login

Microsoft Word - WBMS District Login Directions[removed]

Add to Reading List

Source URL: tn.gov

Language: English - Date: 2014-05-30 09:05:26
UPDATE