These are all of the changes made to these pages. A much shorter list is available in RecentChanges.

23.04.2017
Novell Access Manager 19:40:54 jim
AS-REQ-REP 19:40:18 jim
ULA 11:49:27 jim
Unique Local IPv6 Unicast Addresses 11:49:00 jim
RFC 4193 11:47:09 jim
Private Network 11:45:35 jim
RFC 6598 11:36:06 jim
Carrier-grade NAT 11:35:21 jim
RFC 2640 11:26:05 jim
RFC 2460 11:25:09 jim
Internet Protocol Version 6 11:24:30 jim
IPv6 11:23:23 jim
RFC 791 11:19:35 jim
IPv4 11:18:49 jim
Internet Protocol Version 4 11:18:30 jim
RFC 1918 11:09:44 jim
Network Address Translation 11:01:31 jim
NAT 10:58:00 jim
Transparent Proxy 10:57:30 jim
Proxy 10:50:18 jim
The Onion Router 10:48:15 jim
Tor 10:46:05 jim
Socket Secure 10:41:41 jim
Response 10:34:23 jim
Request 10:32:51 jim
Clients 10:28:13 jim
Server 10:27:21 jim
Protocol Server 10:26:06 jim
Protocol Client 10:20:43 jim
Same Origin Policy 10:05:38 jim
Web Origin 10:05:06 jim
Port 10:03:50 jim
URI Authorities 10:02:57 jim
Hostname 10:01:19 jim
IP Address 10:00:21 jim
RFC 6454 09:55:37 jim
SOP 09:50:50 jim
URI Template 09:50:04 jim
RFC 6570 09:46:25 jim
Uniform Resource Identifier 09:45:17 jim
URI Query 09:43:14 jim
URI Path 09:41:50 jim
RFC 6838 09:35:36 jim
URI Fragment Identifiers 09:34:59 jim
RFC 7320 08:53:03 jim
RFC 6874 08:52:23 jim
URI Schemes 08:44:42 jim
Web Blog_blogentry_230417_1 08:26:59 jim
HOTP 08:20:49 jim
21.04.2017
LSTM 11:41:24 jim
Feedforward Neural network 11:40:32 jim
RNN 11:38:50 jim
Artificial Neuron 11:38:30 jim
ANN 11:38:07 jim
Artificial Neural network 11:30:59 jim
Long Short Term Memory networks 11:26:45 jim
Recurrent Neural networks 11:20:42 jim
Web Blog_blogentry_210417_1 11:03:58 jim
Paradox of Knowability 09:56:10 jim
Responsible 09:19:42 jim
Trust 09:06:57 jim
19.04.2017
Graded Authentication 14:24:18 jim
Single Sign-On 13:38:05 jim
Micro Focus 13:10:06 jim
LDAP Server Implementations 13:08:29 jim
BMC Software 13:05:12 jim
BMC 13:04:38 jim
HP OpenView Select Identity 13:03:24 jim
Hewlett Packard Enterprise 12:55:55 jim
HPE 12:53:53 jim
Web Services Federation 12:52:18 jim
WS-Federation 12:47:40 jim
18.04.2017
Abstraction 12:07:16 jim
Directed Acyclic Graph 11:01:01 jim
Merkle DAG 11:00:03 jim
DAG 10:58:12 jim
Git 10:54:51 jim
Inter-Planetary File System 10:53:34 jim
Object storage 09:55:32 jim
Object-oriented Programming 09:53:19 jim
Object-based 09:52:50 jim
Object 09:49:56 jim Objects ==> Object
Object-oriented 09:46:01 jim
Polymorphism 09:37:27 jim
Inheritance 09:30:45 jim
Encapsulation 09:22:59 jim
OOP 08:55:50 jim
Web Blog_blogentry_180417_1 08:54:21 jim
DIT Chaining 08:48:00 jim
Chaining 08:45:56 jim
Glossary Of LDAP And Directory Terminology 08:28:45 jim DefinitionChaining ==> DIT Chaining
16.04.2017
JSON for Linking Data 10:04:00 jim
Linked Data 10:03:20 jim
Advanced Key Processor 09:55:22 jim
Web Blog_blogentry_160417_1 09:53:51 jim
Active attacker 09:50:39 jim
NISTIR 7298 09:48:04 jim
Accountability 09:46:19 jim
Permission 09:40:50 jim
Protected Resource 09:35:57 jim
Resource 09:35:31 jim
Access Control 09:32:34 jim
Access 09:31:46 jim
Access Authority 09:31:07 jim
Identity Attributes 09:23:26 jim
Digital Identity 09:18:51 jim
14.04.2017
Verifiable Claims 09:19:25 jim
Web Blog_blogentry_140417_1 09:10:52 jim
Certificate Transparency 09:07:59 jim
13.04.2017
Personally Identifiable Information 14:19:54 jim
Account Linking 14:17:04 jim
Password Statistics 14:14:03 jim
Risk 14:08:03 jim
Password Guessing Attacks 13:31:15 jim
Password Dictionary 13:31:10 jim
Best Practices Password 12:27:47 jim
Authenticator App 12:24:29 jim
MAC 10:23:25 jim
Password Quality 10:17:11 jim
10.04.2017
Password Authentication is Broken 14:26:58 jim
Human Limitation 14:13:07 jim
Authentication Challenges 13:42:02 jim
Universal Product Code 13:38:40 jim
Barcode 13:37:51 jim
Shared Secret 13:37:19 jim
Year 1974 13:36:53 jim
UPC 13:36:31 jim
QR-code 13:29:51 jim
Quick Response Code 13:26:50 jim
Time-based One-time Password Algorithm 13:19:03 jim SharedSecret ==> Shared Secret
Mutual TLS Profiles for OAuth Clients 13:19:02 jim SharedSecret ==> Shared Secret
Pre-shared key 13:19:02 jim SharedSecret ==> Shared Secret
Web Blog_blogentry_100417_1 13:06:46 jim
Stateless 06:01:32 jim
status 05:58:24 jim
Replica convergence 05:47:29 jim
Basically Available Soft state Eventual consistency 05:46:23 jim
BASE 05:45:31 jim
Eventual consistency 05:42:01 jim
Replication 05:39:37 jim
Synchronization 05:36:13 jim DefinitionSynchronization ==> Synchronization
Changelog 05:34:48 jim
Attribute Usage Flags 05:33:48 jim
CAP theorem 05:15:01 jim
Node.js 04:46:24 jim
JavaScript 04:42:49 jim
ECMAScript 04:39:06 jim
Privacy 03:48:57 jim
IDM The Manager Dilemma 03:47:07 jim
09.04.2017
Password Reuse 14:46:19 jim
What To Do About Passwords 14:39:12 jim
Password Authentication 14:30:19 jim
08.04.2017
Password Policy 12:34:26 jim
Password Authentication Policy 12:34:11 jim
Password Expiration Warning 12:29:57 jim
Password-composition Policy 12:26:13 jim
Draft-behera-ldap-password-policy 12:22:53 jim
Usability 12:08:29 jim
Heuristic Attacks 11:59:37 jim
Password Management 11:19:31 jim
Password 11:13:46 jim
Traditional Registration 11:01:34 jim
06.04.2017
Bob 12:27:39 jim
Alice 12:27:27 jim
Alice And Bob 12:26:40 jim
Wendy 12:26:01 jim
Walter 12:24:55 jim
Trent 12:24:29 jim
Victor 12:24:07 jim
Sybil 12:23:53 jim
Peggy 12:22:04 jim
Oscar 12:21:18 jim
Faythe 12:20:25 jim
Craig 12:20:02 jim
Identifier 12:18:25 jim
Personal Name 12:05:48 jim
Identified 12:04:56 jim
Unlinkability 12:01:35 jim
Privacy Considerations 12:00:39 jim
Legal 11:59:38 jim
Real Name 11:56:29 jim
State 11:55:23 jim
Pseudonymity 11:54:03 jim
Pseudonymous 11:53:26 jim
Official Name 11:52:39 jim
Pseudonym 11:52:01 jim
Individual 11:44:38 jim
Identifiable 11:42:42 jim
Identifiability 11:40:59 jim
Anonymity Set 11:37:11 jim
Undetectability 11:35:55 jim
IOI 11:34:40 jim
Item of Interest 11:34:23 jim
PANOPTICLICK 11:32:34 jim
Fingerprinting 11:31:34 jim
Fingerprint 11:26:06 jim
Attack 11:18:03 jim
Observer 11:16:15 jim
Authorized 11:13:23 jim
Intermediary 11:11:20 jim
Recipient 11:09:44 jim
Initiator 11:08:32 jim
Enabler 11:07:15 jim
Telecommunications 11:07:02 jim
Unauthorized 11:05:23 jim
Eavesdropper 11:03:06 jim
RFC 4949 10:58:52 jim
Passive attacker 10:57:23 jim
RFC 6973 10:39:21 jim
NGI 10:22:09 jim
Next Generation Identification 09:42:08 jim
RISC 09:38:49 jim
AFIT 09:38:11 jim
Advanced Fingerprint Identification Technology 09:37:57 jim
Repository for Individuals of Special Concern 09:31:11 jim
Web Blog_blogentry_060417_1 09:18:04 jim
05.04.2017
DSBK 09:40:49 jim
Edirectory Backup Strategy 08:49:06 jim
Edirectory Disaster Recovery 08:29:40 jim
Edirectory Back-Ups And Clones 08:26:05 jim
NICI Configuration Files 08:19:06 jim
EmboxRecovery 08:15:42 jim
04.04.2017
Authentication Context Class vs Authentication Method Reference 12:14:49 jim
Authentication Method 12:06:44 jim
Authentication Context Class Values 11:58:08 jim
Authentication Context Class 11:54:44 jim
Authentication Method Reference Values 11:42:20 jim
Authentication Protocol 11:30:38 jim
Mutual Authentication 11:30:21 jim
Simple Authentication 11:29:30 jim
Internet Protocol Address Location 11:28:34 jim
Closed-Loop Authentication 11:27:27 jim
Open-Loop Authentication 11:25:07 jim
Authentication 11:16:38 jim
FIDO 10:40:09 jim
FIDO Authenticator 10:26:11 jim
U2F device 10:08:32 jim
FIDO Client 10:05:01 jim
FIDO Server 10:02:02 jim
FIDO Relying Party 09:42:29 jim
Authenticator 09:32:25 jim
Password-based 09:23:53 jim
Web Blog_blogentry_040417_1 09:23:02 jim
Credential Enrollment 09:04:20 jim
Level Of Assurance 08:57:40 jim
Identity Proofing 08:53:25 jim
Identity Assurance Level 08:46:19 jim
Identity Assurance 08:41:13 jim
Authenticator Assurance Levels 08:39:38 jim
Assurance 08:38:29 jim
Biometric Data Challenges 08:28:08 jim
03.04.2017
Openid-configuration 19:51:09 jim
HTTP POST 10:03:02 jim
Payment Services Directive 09:35:16 jim
Web Blog_blogentry_030417_1 09:33:36 jim
Banks 09:33:12 jim
AISP 09:30:11 jim
PISP 09:29:53 jim
P2P 09:29:35 jim
Payment Initiation Service Provider 09:29:15 jim
Account Information Service Provider 09:28:53 jim
PSD2 09:26:18 jim
Proffer 09:14:10 jim
02.04.2017
FIDO Standards 11:09:35 jim
Universal Second Factor 10:44:28 jim
Chrome 10:24:20 jim
Universal Second Factor Challenges 10:23:38 jim
Local device 10:08:30 jim
NIST Interagency Report 09:56:24 jim
NISTIR 09:54:03 jim
NIST.IR 7817 09:50:48 jim
Credential Management 09:32:19 jim
Credential Revocation 09:31:25 jim
Credential Issuance 09:22:50 jim
Credential Suspension 09:21:19 jim
Credential Reset 09:18:10 jim
Registration Authority 09:13:13 jim
Credential 08:59:35 jim
GitLab 08:12:42 jim
01.04.2017
Yubikey NEO 19:17:48 jim
Yubico 19:15:36 jim
EAL 19:01:11 jim
Evaluation Assurance Level 19:00:56 jim
SAR 18:58:37 jim
Security Assurance Requirement 18:58:14 jim
SFR 18:56:14 jim
Security Functional Requirements 18:55:47 jim
CC 18:53:59 jim
Common Criteria 18:53:25 jim
Common Criteria for Information Technology Security Evaluation 18:53:03 jim
Smart Card 18:52:26 jim
Universal Authentication Framework 18:35:54 jim
Bluetooth Special Interest Group 18:30:05 jim
Personal Area Networks 18:29:21 jim
Wireless 18:26:49 jim
Bluetooth Low Energy 18:26:32 jim
BLE 18:23:16 jim
Bluetooth 18:22:29 jim
USB 18:15:47 jim
Universal Serial Bus 18:15:31 jim
FIDO protocols 18:09:25 jim
Fast IDentity Online 18:07:35 jim
PKCS 11 17:56:10 jim
Internet Protocol Suite 17:23:11 jim
Communication Layers 17:20:06 jim
OSI-Model 17:19:58 jim
RFC 1122 17:19:18 jim
Internet Layer 17:14:21 jim
Link Layer 17:12:01 jim
Transport Layer 17:09:21 jim
Application Layer 17:05:37 jim
Internet Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
TCP-IP 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
Transmission Control Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
User Datagram Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
Router 16:45:02 jim
Gateway 16:40:12 jim
CISCO Commands 16:31:27 jim
Data-link Layer 16:30:31 jim
Network Layer 16:26:11 jim
Session Layer 16:22:42 jim
Presentation Layer 16:19:03 jim
Frame 16:12:17 jim
Packet 16:04:34 jim
Bit 16:01:20 jim
Payload 15:59:06 jim
Datagram 15:55:10 jim
RFC 1594 15:48:44 jim
Cable Connections 15:44:48 jim
Physical Layer 15:44:16 jim
Proxy Server 15:19:35 jim
RFC 1928 15:10:27 jim
SOCKS 15:05:51 jim
Logs and File Locations 15:05:06 jim
United States federal government 11:18:24 jim
United States Supreme Court 11:16:42 jim
United States Judiciary 11:13:35 jim
United States House of Representatives 11:02:34 jim
United States Senate 11:02:23 jim
United States Department of Justice 11:02:02 jim
DOJ 11:01:12 jim
FBI 10:59:49 jim
Federal Bureau of Investigation 10:59:26 jim
IAFIS 10:48:02 jim
Integrated Automated Fingerprint Identification System 10:47:42 jim
Fingerprint recognition 10:42:50 jim
Biometric 10:18:58 jim
Biometric Scanner 10:17:06 jim
Biometric Token 10:16:19 jim
Biometric Template 09:55:39 jim
ExtensibleMatch 09:00:12 jim
30.03.2017
Biometric Enrollment 17:41:30 jim
Voice recognition 17:22:40 jim
Bio-political tattooing 17:19:27 jim
United States Department of Veterans Affairs 17:18:40 jim
US-VISIT 17:16:00 jim
United States Department of Homeland Security 17:15:23 jim
DHS 17:14:24 jim
MITRE Corporation 17:13:54 jim
United States Customs and Border Protection 17:06:36 jim
United States Visitor and Immigrant Status Indicator 16:44:56 jim
Retinal recognition 16:27:15 jim
Facial recognition 16:23:46 jim
Tel 16:20:53 jim
Pattern-recognition 16:14:32 jim
Iris recognition 16:13:41 jim
Fpt 16:09:00 jim
Spoofing Attack 15:55:45 jim
FNMR 15:50:50 jim
False Non-Match Rates 15:50:33 jim
FMR 15:47:28 jim
False Match Rates 15:46:29 jim
NIST.SP.800-63B 15:26:43 jim
24.03.2017
Trustmark Scheme 12:48:11 jim
Web Blog_blogentry_170816_1 12:24:13 jim
Token Binding Protocol Negotiation 12:21:50 jim
Token Binding over HTTP 12:14:58 jim
Token Binding ID 12:14:42 jim
Sec-Token-Binding 12:14:24 jim
Token Binding Protocol 12:13:45 jim The Token Binding Protocol ==> Token Binding Protocol
Token Consumer 11:56:20 jim
Token Provider 11:55:31 jim
Web Blog_blogentry_240317_1 09:42:37 jim
General Data Protection Regulation 09:13:57 jim
20.03.2017
Certificate Validation Tools 13:42:17 jim
Badssl.com 13:39:03 jim
TLS Proxy 13:36:34 jim
HTTPS Inspection 13:28:15 jim
ISO 24745 13:09:14 jim
Inherence Factor 12:36:37 jim
Presentation Attack Detection 12:35:32 jim
Presentation Attack 12:34:55 jim
PAD 12:27:26 jim
AAL 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
Federation Models 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
What is missing in OAuth 2.0 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
Someplace You Are 11:21:30 jim
Something You Do 11:20:12 jim
Authentication Factor 10:54:59 jim
Sensitive Authentication Data 10:35:59 jim
Cardholder Data 10:25:30 jim
Payment Card Industry Data Security Standard 10:20:52 jim
Multi-Factor Authentication 10:07:35 jim
CDE 09:59:25 jim
Cardholder Data Environment 09:58:40 jim
18.03.2017
OAuth 2.0 Token Exchange 15:16:04 jim
May_act (May Act For) Claim 15:14:57 jim
Cid (Client Identifier) Claim 15:09:25 jim
Scp (Scopes) Claim 15:06:11 jim
Act (Actor) Claim 15:02:01 jim
Authentication Double-Hop 14:50:04 jim
OAuth 2.0 12:30:17 jim
Logout Process 12:29:08 jim
Access Token 12:08:04 jim
Delegation vs Impersonation 10:09:29 jim
Web Blog_blogentry_180317_1 09:55:11 jim
Client Application 09:43:43 jim
Web Authentication 09:26:59 jim
LDAP Authentication 09:22:34 jim
Password Manager 09:15:18 jim
Password Vault 09:14:16 jim
16.03.2017
Best Practices For Unique Identifiers 15:21:03 jim
AICPA 12:41:28 jim
SSAE 16 12:41:03 jim
American Institute of Certified Public Accountants 12:40:03 jim
Statement on Standards for Attestation Engagements 12:13:08 jim
SOC 1 12:08:42 jim
15.03.2017
RFC 7301 08:36:06 jim
Application-Layer Protocol Negotiation 08:27:39 jim
ALPN 08:25:58 jim
14.03.2017
Acr_values 11:21:37 jim
Authentication Context Class Reference 11:17:42 jim
Mobile Station International Subscriber Directory Number 11:08:16 jim
International Mobile Subscriber Identity 11:03:43 jim
Essential Claim 08:50:27 jim
Voluntary Claim 08:48:54 jim
Acr 08:41:43 jim
13.03.2017
Social Login 11:34:26 jim
Social Identity Provider 11:32:52 jim
12.03.2017
GraphQL schema language 10:55:20 jim
GraphQL 10:48:53 jim
GraphQL Server 10:46:44 jim
GraphQL Client 10:33:11 jim
GraphQL/graphQL-architecutre.png 09:29:38 jim GraphQL-architecture
The Open Group 09:26:09 jim
Representational State Transfer 09:09:38 jim
Create Read Update Delete 09:06:19 jim
HTTP Method 09:05:32 jim
1990s 08:59:27 jim
Unix 08:57:58 jim
Common Vulnerabilities and Exposures 08:55:06 jim
1970s 08:52:28 jim
MacOS 08:50:03 jim
Santa Cruz Operation 08:47:57 jim
SCO 08:46:53 jim
UNIX History and More 08:44:19 jim
UNIX 08:30:25 jim
Open Software Foundation 08:29:15 jim
Distributed Computing Environment 08:27:16 jim
DCE 08:20:55 jim
Interface Description Language 08:19:10 jim
Interface Definition Language 08:18:39 jim
IDL 08:17:35 jim
Hypermedia As The Engine Of Application State 08:13:58 jim
HATEOAS 08:10:16 jim
08.03.2017
Anonymity 17:52:48 jim
Web Blog_blogentry_080317_1 17:50:02 jim
B003281 16:37:22 jim
Week 12:01:14 jim
Seconds 11:58:48 jim
Millisecond 11:55:07 jim
Year 11:45:28 jim
Unix Epoch 11:44:11 jim
MacOS Epoch 11:42:07 jim
Time And Epochs 11:35:28 jim
Epoch 11:32:51 jim
Tick 11:31:15 jim
AccountExpires 11:29:34 jim Ticks ==> Tick
Instruction cycle 11:29:24 jim
Year 1904 11:26:12 jim
DirXML Code Snippets 11:24:37 jim Minutes ==> Minute
Minute 11:24:37 jim Minutes ==> Minute
Hour 11:24:10 jim Hours ==> Hour
Day 11:23:44 jim Days ==> Day
Year 1582 11:19:28 jim
Nanosecond 11:19:03 jim
Unix Time 11:15:08 jim
TimeLimit 11:14:37 jim
TimeBeforeExpiration 11:14:25 jim
SearchRequest 11:13:52 jim
SYNC PANE ENTRIES EVAL 11:13:34 jim
PwdMinDelay 11:13:18 jim
PwdMinAge 11:12:58 jim
PwdMaxIdle 11:12:41 jim
PwdMaxDelay 11:12:05 jim
PwdMaxAge 11:11:42 jim
PwdLockoutDuration 11:11:17 jim
PwdGraceExpiry 11:10:57 jim
PwdFailureCountInterval 11:10:22 jim
PwdExpireWarning 11:10:01 jim
LowConvergenceSyncInterval 11:09:33 jim
LdapServerIdleTimeout 11:09:16 jim
LOGIN DELAY ENABLE 11:08:59 jim
Heartbeat Synchronization 11:08:43 jim
FAILED AUTH DELAY 11:08:30 jim
Expires_in 11:08:18 jim
DxPwdFailedTime 11:07:28 jim
Cachecleanupinterval 11:07:10 jim
Cacheadjustinterval 11:06:49 jim
Cache-Control 11:06:39 jim
Account Usability Request Control 11:05:58 jim
Java Time 11:04:02 jim Milliseconds ==> Millisecond
LargeInteger 10:55:38 jim
Year 1601 10:50:24 jim
Microsoft TIME 10:49:56 jim
DateTime 10:24:44 jim
2,147,483,647 10:23:01 jim
ShadowLastChange 10:21:45 jim
NdsServerIntTable 10:20:01 jim
Shadow 10:18:50 jim
Token Introspection Endpoint 10:17:37 jim
Year 1972 10:13:47 jim
Leap seconds 10:13:14 jim
UTC 10:10:17 jim
Coordinated Universal Time 10:09:29 jim
POSIX time 09:56:21 jim
Attribute 00:58:14 jim
07.03.2017
Login_hint_token 12:53:28 jim
Binding_message 12:50:23 jim
OpenID Connect MODRNA Authentication Profile 1.0 12:49:23 jim
NetworkAddress 12:42:11 jim
Internet Protocol Address 12:40:38 jim
IP-Address 12:39:28 jim
OpenID Connect Mobile Discovery Profile 12:39:07 jim
Account Chooser 12:23:57 jim
OpenID.Discovery 11:04:34 jim
UTMS 10:56:04 jim
MSISDN 10:51:10 jim
MODRNA.Discovery 10:43:07 jim
OpenID.Core 10:23:50 jim
MODRNA 10:23:24 jim
Web Blog_blogentry_070317_1 10:10:27 jim
OpenID Connect Account Porting 10:08:50 jim
Mobile Connect 10:06:48 jim
GSMA 10:06:21 jim
05.03.2017
Standards Based SSO 09:27:53 jim
03.03.2017
API Planing 08:57:43 jim
LeftMenu 08:48:21 jim
OAuth 2.0 Use Cases 08:46:19 jim
Public API 08:10:10 jim
Partner API 08:09:53 jim
Internal API 08:09:33 jim
API Consumer 08:05:40 jim
API Provider 08:05:00 jim
02.03.2017
TLS Full Handshake 16:26:28 jim
TLS Full Handshake/tls13-hs-ecdhe.png 16:12:43 jim Improved Handshakes in TLS version 1.3
0-RTT Handshakes 16:10:35 jim
Ephemeral Key 15:53:13 jim
TLS 1.3 15:40:54 jim
TLS Session Resumption 15:38:10 jim
Pre-Shared Key 15:32:23 jim
TLS Renegotiation 14:35:30 jim
Transport Layer Security (TLS) Renegotiation Indication Extension 14:35:04 jim
RFC 5869 14:07:41 jim
HMAC-based Extract-and-Expand Key Derivation Function 14:07:02 jim
HKDF 14:05:04 jim
RFC 3874 14:03:57 jim
SHA-224 14:03:10 jim
EdDSA 14:01:06 jim
Ed25519 14:00:32 jim
Edwards-curve Digital Signature Algorithm 13:59:42 jim
Transport Layer Security 13:44:15 jim
Data Loss Prevention 12:57:27 jim
DLP 12:52:05 jim
Azure 12:48:27 jim
Data Classification 12:45:03 jim
01.03.2017
Web Blog_blogentry_010317_1 16:45:02 jim
Identity and Access Management 13:14:40 jim
Identity State 13:14:16 jim
24.02.2017
Cryptographic Collision 11:03:19 jim
Collision Resistance 11:00:12 jim
SHAttered 10:58:28 jim
Cryptographic Collision/Collision-illustrated.png 10:51:49 jim SHA-1 collision
SHA-1 10:40:08 jim
AEAD_CHACHA20_POLY1305 10:39:00 jim
CHACHA20-POLY1305 10:37:13 jim
Authenticated Encryption with Associated Data (AEAD) Parameters 10:36:04 jim
Authenticated Encryption with Associated Data 10:35:04 jim
RFC 7539 10:28:30 jim
Poly1305 10:24:17 jim
ChaCha20 10:22:56 jim
ChaCha 10:21:10 jim
CBC-MAC 10:18:12 jim
CCM 10:17:01 jim
RFC-5288 10:11:13 jim
AES-GCM 10:10:19 jim
State Cipher 10:00:40 jim
Stream Cipher 09:59:58 jim
Pseudorandom 09:58:07 jim
Block Cipher 09:53:47 jim
Salsa20 09:47:35 jim
Web Blog_blogentry_240217_1 09:44:00 jim
HMAC-SHA2 09:41:08 jim
HMAC-SHA1 09:39:45 jim
HMAC-MD5 09:39:20 jim
Keyed-Hash Message Authentication Code 09:36:38 jim
RFC 3174 09:15:28 jim
21.02.2017
ISO 29115 16:49:26 jim
Common Access Card 16:37:41 jim
CAC 16:36:56 jim
Credential Service Provider 16:10:16 jim
Claimant 16:05:30 jim
Vectors of Trust 15:29:40 jim
M-04-04 Level of Assurance (LOA) 15:16:10 jim
NIST Electronic Authentication Guideline 15:15:28 jim
Identity Trust Framework 15:13:21 jim
Trust Framework 15:12:10 jim
Web Blog_blogentry_210217_1 15:03:09 jim
VoT 14:59:02 jim
FAL 14:37:37 jim
Federation Assurance Level 14:37:19 jim
FAL 2 14:35:38 jim
FAL 3 14:34:59 jim
FAL 1 14:29:15 jim
Holder-of-Key 12:20:29 jim
Bearer 12:19:07 jim
Federation 11:26:28 jim
Federation/federation.png 11:22:27 jim Federation Image
Assertion 11:19:23 jim
NIST.SP.800-63C 11:17:25 jim
NIST.SP.800-63A 11:14:13 jim
Authenticated Protected Channel 11:09:43 jim
BCP 195 11:09:08 jim
Identity questions 10:43:52 jim
Password Periodic Changes 10:17:15 jim
Passwords Composition 09:59:33 jim
Password Grace Authentication 09:43:18 jim
Password Expiration 09:42:34 jim
20.02.2017
Web Blog_blogentry_200217_2 18:05:53 jim
Web Blog_blogentry_200217_2/rest-ahead.jpg 18:04:52 jim REST Ahead
Authorization 17:52:16 jim
AuthZ 17:51:52 jim
Industry 4.0 17:38:29 jim
Industry 4.0/Industry-4-framework.jpg 17:32:35 jim industry 4.0 Framework and Contributing digital technologies
Cloud computing 17:31:08 jim
Linux 15:02:31 jim
Domain Logic 14:57:04 jim
Business Logic 14:51:39 jim
Smart endpoints and dumb pipes 14:50:13 jim
Microservice 14:46:38 jim
UI 14:41:13 jim
User Interface 14:40:53 jim
DoD 14:36:59 jim
NetWare 14:23:12 jim
NIS 14:20:57 jim
Phone Line 14:18:30 jim
Secure connection 14:17:23 jim
Peer-to-peer 14:15:05 jim
Multicast 14:13:42 jim
Wireless Access Point 14:12:15 jim
A look at the Network Cable standards 14:11:58 jim
Public Switched Telephone Network 14:10:43 jim
Network Basic Input-Output System 14:09:41 jim
Virtual Private Network 14:08:25 jim
Mobile Network Operators 14:04:48 jim
Mobile Network 14:03:41 jim
Public Land Mobile Network 14:03:22 jim
Payment Network 14:01:18 jim
Network Cables 14:00:12 jim
Year 1994 13:55:36 jim
Intranet 13:55:14 jim
WAN 13:53:00 jim
Wide Area Network 13:52:42 jim
Local Area Network 13:49:18 jim
LAN 13:48:41 jim
Network 13:45:59 jim
Extranet 13:44:01 jim
Web Blog_blogentry_200217_1 13:18:42 jim
Our Approach 12:42:30 jim
Delegation 10:01:39 jim
OAuth-Token-Exchange 09:55:14 jim
16.02.2017
Cardholder Verification Method Condition Code 13:42:57 jim
Edirectory Instance Management 13:40:56 jim
2.16.840.1.113719.1.14.100.59 13:39:09 jim 2.16.840.1.113719.1.14.100.59x ==> 2.16.840.1.113719.1.14.100.59
2.16.840.1.113719.1.14.100.17 13:35:59 jim 2.16.840.1.113719.1.14.100.17x ==> 2.16.840.1.113719.1.14.100.17
2.16.840.1.113719.1.14.100.53 13:34:33 jim 2.16.840.1.113719.1.14.100.53x ==> 2.16.840.1.113719.1.14.100.53
2.16.840.1.113719.1.14.100.39 13:00:38 jim 2.16.840.1.113719.1.14.100.39x ==> 2.16.840.1.113719.1.14.100.39
2.16.840.1.113719.1.14.100.57 12:59:13 jim 2.16.840.1.113719.1.14.100.57x ==> 2.16.840.1.113719.1.14.100.57
2.16.840.1.113719.1.14.100.15 12:58:29 jim 2.16.840.1.113719.1.14.100.15x ==> 2.16.840.1.113719.1.14.100.15
2.16.840.1.113719.1.14.100.55 12:56:56 jim 2.16.840.1.113719.1.14.100.55x ==> 2.16.840.1.113719.1.14.100.55
WikiRPCInterface 12:54:31 jim
UTF-8 12:51:06 jim
Unicode 12:49:22 jim
1.3.6.1.4.1.1466.115.121.1.15 12:48:09 jim
2.5.5.12 12:46:14 jim
ServicePrincipalName 12:43:25 jim
ServiceDNSName 12:40:41 jim
ServiceConnectionPoint 12:33:19 jim
Service Connection Points 12:25:12 jim
SCP 12:23:02 jim
TRUSTED_FOR_DELEGATION 11:28:12 jim
Kerberos Delegation 11:27:03 jim Microsoft Active Directory Delegation ==> Kerberos Delegation
12.02.2017
United States Social Security Administration 11:44:04 jim
Social Security Number 11:39:33 jim
IAM Project Intangibles 11:35:44 jim
IAM Charter 10:59:23 jim
11.02.2017
SEC 21:05:26 jim
United States Securities and Exchange Commission 21:04:56 jim
Financial Industry Regulatory Authority Inc 21:01:36 jim
FinCEN 21:00:02 jim
Year 1789 20:59:27 jim
United States Department of the Treasury 20:59:09 jim
Financial Crimes Enforcement Network 20:55:51 jim
Bank Secrecy Act 20:53:14 jim
Customer Identification Program 20:49:51 jim
KYC 20:31:50 jim
Know Your Customer 20:30:50 jim
AML 20:29:05 jim
CIP 20:28:28 jim
USA PATRIOT Act 20:24:31 jim
Anti-Money Laundering 20:19:30 jim
Year 1970 20:18:08 jim
10.02.2017
Federal Identity, Credential, and Access Management 11:28:31 jim
Web Blog_blogentry_100217_1 09:41:30 jim
Identity Document 09:33:49 jim
IAM Six Stages 09:17:58 jim
API Adoption 08:55:28 jim
09.02.2017
IDM and the Organization Dilemma 14:25:54 jim
Why IDM Makes Sense For Eveyone 14:21:43 jim IDMTheOrganizationsDilemma ==> IDM and the Organization Dilemma
FTTx 13:33:50 jim
Local Exchange 13:33:18 jim
Long Distance Provider 13:32:52 jim
Telecommunications Network Chain 13:27:14 jim
Last Mile Loop 13:13:29 jim Local Loop ==> Local Exchange
E.164 13:01:29 jim
Land Line 12:55:42 jim
Phone Number Portability 12:53:11 jim LandLine ==> Land Line
Phone Number 12:35:37 jim
Social Engineering Attacker 12:21:32 jim
SS7 hack 12:19:49 jim
Web Blog_blogentry_090217_1 12:04:56 jim
31.01.2017
Attacker 16:30:14 jim
Unfortunate event 15:37:12 jim
Disclosure-Alteration-Destruction 15:34:15 jim
Trudy 15:06:31 jim
Mallet 15:05:55 jim
Mallory 15:02:49 jim
Elliptic Curve Diffie-Hellman Ephemeral 10:32:34 jim
Supported Groups Registry 10:31:46 jim
RFC 4492 10:21:39 jim
Diffie-Hellman Ephemeral 10:14:56 jim
RFC 7919 10:11:25 jim
ServerKeyExchange 09:58:34 jim
How SSL-TLS Works 09:57:59 jim
DHE 09:57:21 jim
29.01.2017
RFC 4918 21:12:42 jim
Jim 12:39:15 jim
28.01.2017
Obtain a Certificate from Server 10:02:45 jim
27.01.2017
Provenance 12:54:19 jim
Data Provenance 12:42:30 jim
25.01.2017
MAY 13:32:40 jim
MUST 13:32:29 jim
REQUIRED 13:32:05 jim
SHOULD NOT 13:31:47 jim
SHOULD 13:31:14 jim
SHALL 13:30:44 jim
RECOMMENDED 13:30:29 jim
NOT RECOMMENDED 13:30:16 jim
SHALL NOT 13:29:58 jim
MUST NOT 13:29:40 jim
Site Certificate 13:28:25 jim
Certificate Chain 13:24:24 jim
Certificate 13:08:47 jim
Intermediate Certificate 13:07:07 jim
Trust Anchor 13:01:20 jim
Monitoring Edirectory Synchronization 10:39:51 jim
EDirectory Synchronization 10:33:14 jim
Maximum Ring Delta 10:02:53 jim
PartitionStatus 10:01:03 jim
Legal Person 09:39:24 jim
Entity 09:30:22 jim
24.01.2017
Access Control Models 12:06:14 jim
DAC 12:06:02 jim
23.01.2017
Web Blog_blogentry_230117_1 17:09:53 jim
Year 2018 12:09:11 jim
Custodian 12:08:33 jim
RFC 2314 11:54:49 jim
RFC 2986 11:52:20 jim
PKCS10 11:51:39 jim
Certification Request Syntax 11:51:22 jim Certification Request Standard ==> Certification Request Syntax
Automatic Certificate Management Environment 11:48:44 jim
Organization Validated Certificate 11:37:57 jim
Domain Validated Certificate 11:36:29 jim
Certificate Level Of Assurance 11:32:49 jim
Certificate Validation 11:31:11 jim
Certificate Validation Levels 11:30:37 jim
Extended Validation Certificate 11:26:13 jim
Extended Validation Certificate/ev21.jpg 11:23:48 jim EV Display
21.01.2017
Keytool 11:08:50 jim
20.01.2017
Discovery Mechanism 10:35:48 jim
Web Service Security Specifications 10:34:17 jim
Web Service Definition Language 10:32:42 jim
Year 1967 10:31:46 jim
ASCII 10:31:16 jim
ODJFS 10:29:05 jim
PAM on AIX 10:28:38 jim
IBM IDM 10:27:36 jim
OASIS 10:25:51 jim
Organization for the Advancement of Structured Information Standards 10:25:28 jim
SAML 10:21:42 jim
IBM 10:19:02 jim
WS-Security Tokens 10:17:16 jim
Web Services Inspection Language 10:16:40 jim
Web Services Dynamic Discovery 10:16:12 jim
BPEL 10:14:50 jim
WS-BPEL 10:14:21 jim
Business Process Execution Language 10:13:48 jim
ServiceMix 10:11:13 jim
WS-Specifications 10:08:05 jim
Web Services Security 10:02:43 jim
Web Service 09:59:41 jim
WSIL 09:54:47 jim
WS-Inspection 09:54:16 jim
WS-Discovery 09:48:46 jim
Web Services Description Language 09:38:16 jim
WSDL 09:36:40 jim
Universal Description, Discovery, and Integration 09:34:18 jim
UDDI 09:32:42 jim
OpenID.Registration 09:24:21 jim
OAuth 2.0 Discovery 09:21:12 jim
19.01.2017
Groups Are Bad 08:44:52 jim
13.01.2017
Security Considerations 11:39:22 jim
Server-Side Login throttling schemes 11:37:42 jim
PwdLockout 11:24:28 jim
Grace Logins 11:14:09 jim
Password Validity Policy 11:12:56 jim
AD Determining Password Expiration 10:56:28 jim
Password Maximum Age 10:48:43 jim
12.01.2017
IdMA 11:51:45 jim
IAM 11:49:22 jim
IDMA Too Many Names 11:49:06 jim
IDAM 11:42:46 jim
Identity Management 11:38:02 jim
Subject Alternative Name 10:01:22 jim
DNS cache poisoning 09:55:59 jim
SubjectAltName 09:39:03 jim
Certificate Subject 09:37:15 jim
10.01.2017
NSA Suite B Cryptography 11:19:12 jim
FIPS 140 11:17:57 jim
Digital Signature Algorithm 11:06:37 jim
Public Key Algorithm 11:03:05 jim
Certificate Algorithm ID 11:02:41 jim
Certificate Signature Algorithm 11:01:59 jim
Algorithm 11:01:15 jim
Luhn Algorithm 10:59:53 jim
Suite B 10:52:17 jim
RFC 6460 10:51:44 jim
Web Blog_blogentry_100117_1 10:42:31 jim
National Security Agency 10:41:24 jim
NSA 10:39:42 jim
SHA-3 10:39:18 jim
United States Constitution 09:31:34 jim
US 09:30:36 jim
United States of America 09:30:03 jim
Federal Communications Commission 09:21:28 jim
United States Federal Agency 09:21:04 jim
United States Congress 09:20:15 jim
United States Department of Defense 09:12:54 jim
For Official Use Only 09:09:43 jim
NOFORN 09:07:10 jim
Sensitive But Unclassified 09:03:28 jim
SBU 09:02:58 jim
FVEY 09:00:41 jim
08.01.2017
Identity Lifecycle Management 10:57:04 jim
LDAP Proxy User 10:27:50 jim
HTTP Response 10:20:48 jim
Oracle Unified Directory 10:19:30 jim
HTTP-Server 10:18:09 jim
Proxy-Based WAM 10:15:43 jim
WEB Access Management 10:11:37 jim
07.01.2017
Monetization 12:30:59 jim
API-Gateway 12:24:53 jim
OAuth Scope Example 11:51:21 jim
Application 11:49:04 jim
Software Development Kit 11:47:32 jim
Application Programing Interface 11:45:33 jim
Logjam 11:25:35 jim
Diffie-Hellman key-exchange 11:23:17 jim
Kerberos SSP 11:21:51 jim
Data In Transit 11:20:58 jim
Internet Protocol Security 10:50:33 jim
IPsec 10:48:02 jim
DNSSEC 10:39:58 jim
Domain Name System Security Extensions 10:39:39 jim
Over-the-Air Rekeying 10:36:17 jim
OTAR 10:35:58 jim
NIST.SP.57 10:32:42 jim
FIPS Based Cipher Suites 10:25:13 jim
NIST.SP.52 10:20:27 jim
PCI Data Security Standard v3.2 09:58:21 jim
PCI Data Security Standard v3.1 09:51:30 jim
TLS 1.2 09:38:38 jim
TLS Cipher Suite Registry 09:32:30 jim
PCT 09:29:39 jim
Known Cipher Suites 09:25:27 jim
Cipher Suite 09:17:21 jim
05.01.2017
Thing Explainer 18:06:36 jim
TechBits 12:36:39 jim
LDAP Programing 12:36:18 jim SetupPerlNetLDAPS ==> Setup Perl Net LDAPS
Perl LDAP Samples 12:36:18 jim SetupPerlNetLDAPS ==> Setup Perl Net LDAPS
Setup Perl Net LDAPS 12:36:18 jim SetupPerlNetLDAPS ==> Setup Perl Net LDAPS
SLP For Linux And Solaris 12:34:41 jim
Unix Linux CommandLine Tricks 12:31:46 jim
UnixLinux 12:31:15 jim UnixLinuxCommandTricks ==> Unix Linux CommandLine Tricks
Disaster Recovery 12:30:02 jim EdirectoryBackUpsAndClones ==> Edirectory Back-Ups And Clones
Installing And Configuring Edirectory 12:29:40 jim SnmpAndEdirectory ==> Snmp And Edirectory
Snmp And Edirectory 12:29:40 jim SnmpAndEdirectory ==> Snmp And Edirectory
SSH CommandLine Tips 12:28:53 jim
DefinitionIdentityOracle 12:27:23 jim PeopleAndThingsEveryIDMPersonShouldKnow ==> People And Things Every IDM Person Should Know
Sovereign-source Identity 12:27:23 jim PeopleAndThingsEveryIDMPersonShouldKnow ==> People And Things Every IDM Person Should Know
The Seven Laws Of Identity 12:27:23 jim PeopleAndThingsEveryIDMPersonShouldKnow ==> People And Things Every IDM Person Should Know
ZOOMIT Corporation 12:27:23 jim PeopleAndThingsEveryIDMPersonShouldKnow ==> People And Things Every IDM Person Should Know
People And Things Every IDM Person Should Know 12:27:22 jim PeopleAndThingsEveryIDMPersonShouldKnow ==> People And Things Every IDM Person Should Know
MicrosoftLdapApi 12:24:36 jim
LDAP Schema 12:23:06 jim SchemaModifications ==> Schema Modifications
Schema Modifications 12:23:06 jim SchemaModifications ==> Schema Modifications
PreInstall Check List 12:22:17 jim
IDM 12:18:58 jim
Directory Information Tree Structure 12:17:10 jim
CacheCtl 12:08:50 jim
Cache miss 12:06:06 jim
Cache hit 12:05:25 jim
NSCD 12:04:39 jim
SSSD 12:02:41 jim
Page Cache 12:00:47 jim
FLAIM Cache 12:00:24 jim
Dirty cache 12:00:06 jim
Event Cache 11:59:51 jim
Cache 11:58:27 jim
WEB Agents WAM 11:38:16 jim
SCIM 11:24:32 jim
04.01.2017
Hypertext Transfer Protocol 10:01:05 jim
Hypertext Transfer Protocol (HTTP 1.1) Conditional Requests 09:59:30 jim
HTTPS 09:56:09 jim
Hyperlinks 09:54:51 jim
HTML 09:50:46 jim
CSS 09:48:54 jim
Cascading Style Sheets 09:48:17 jim
Hypertext Markup Language 09:45:16 jim
Hypertext 09:42:35 jim
Website 09:39:10 jim
Secure WEB Page Information 09:36:23 jim
BREACH (security exploit) 09:27:45 jim
Exploit 09:26:25 jim
Vulnerability 09:20:10 jim
03.01.2017
Information security 14:31:27 jim
Risk Management 14:30:30 jim
Cybersecurity 14:28:48 jim
Class-Break 14:23:23 jim
Web Blog_blogentry_030117_1 14:20:10 jim
Neo-Security Stack 10:59:00 jim
Subject 10:47:48 jim
Web Blog_blogentry_020117_1 10:43:16 jim
Device 10:24:10 jim
Partners 10:21:59 jim
Internet of Things 10:17:33 jim
Identity Relation 10:15:33 jim
Employee 10:14:53 jim
Business to Employee 10:13:51 jim
B2E 10:12:54 jim
Business to Business 10:12:28 jim
B2B 10:10:26 jim
Business to Consumer 10:02:32 jim
B2C 10:00:48 jim
What Is IDM 09:59:42 jim
CIM 09:17:52 jim
Common Information Model 09:17:28 jim
RFC 3060 09:13:19 jim
Directory Enabled Networks 09:09:11 jim
DEN 09:07:23 jim
International Electrotechnical Commission 08:59:53 jim
IEC 08:57:43 jim
InterNational Committee for Information Technology Standards 08:55:28 jim
INCITS 08:52:08 jim
NIST RBAC 08:49:15 jim
02.01.2017
NIST RBAC What is Missing 10:44:51 jim
ISO 10181-3 10:38:59 jim
RFC 3198 10:30:24 jim
01.01.2017
NDS Thread Pool 16:42:02 jim
DHost 16:37:54 jim
Event System 16:37:29 jim
Connection Table 16:30:38 jim
N4u.server.idle-threads 16:19:10 jim
Ndsconfig Parameters 16:11:49 jim
NDS Threads 16:09:13 jim
N4u.server.active-interval 16:08:24 jim
NDSD Threads And Processes 15:48:16 jim
Ran Across Today 11:29:35 jim
RAT 11:28:40 jim
Web Blog_blogentry_010117_1 11:01:48 jim
Releasability 10:45:19 jim
Disclosure 10:44:32 jim
Company Confidential 10:43:58 jim
CUI 10:40:16 jim
Controlled Unclassified Information 10:39:57 jim
United States 10:19:03 jim
FOUO 10:14:20 jim
Unclassified 10:12:07 jim
AAA 09:47:34 jim
Accounting 09:46:44 jim
Authentication Authorization and Accounting 09:44:36 jim
30.12.2016
Lsss 19:16:30 jim
DClient 19:09:54 jim
Spmdclnt 19:05:05 jim
Graded Authentication Management Service 18:53:34 jim
Gams 18:49:37 jim
Imon 18:48:48 jim
Nldap 18:48:01 jim
Ssldp 18:47:11 jim
Ssncp 18:46:21 jim
Sss 18:45:36 jim
Statuslg 18:44:08 jim
Security Domain Infrastructure 11:55:59 jim
W0 Servers 11:51:24 jim
Niciext 11:44:46 jim
KAP 11:35:12 jim
Key Access Partition 11:34:43 jim
SDI Key 11:32:24 jim
SASDFM 11:23:48 jim
NDSD Loadable Module 11:21:44 jim
Ncpengine 11:16:50 jim
Novell Certificate Server 11:14:46 jim
Novell Modular Authentication Service 11:11:55 jim
Novell International Cryptographic Infrastructure 11:10:18 jim
NICI 11:07:28 jim
SDI 11:05:35 jim
NICISDI 11:05:12 jim
HTTPServerObject 11:03:53 jim
NCP 10:55:55 jim
NetWare Core Protocol 10:55:27 jim
Ndsmodules.conf 09:50:33 jim
Loadable Module 09:44:45 jim
29.12.2016
Blockcachepercent 17:30:22 jim
FLAIM checkpoint 17:17:16 jim
Lowdirtycache 17:13:33 jim
Maxdirtycache 17:11:57 jim
_ndsdb.ini 17:06:48 jim
Preallocatecache 17:06:29 jim
Hard cache limit 17:02:22 jim
Dynamic Cache Mode 16:57:46 jim
Static Cache Mode 16:48:50 jim
EDirectory Performance Tuning 16:35:13 jim
Ndstrace 16:34:11 jim
TransitiveVector 15:58:30 jim
NDS Authentication 15:57:10 jim
ConfigFilesHosts.nds 15:54:18 jim
NICITreeKeyProvider 15:50:00 jim
Ndsconfig 15:45:00 jim
N4u.base.tree-name 15:44:30 jim
NDS Tree-name 15:44:24 jim
Files In Dib Directory 15:39:53 jim
Https.server.cached-server-dn 15:37:47 jim
Https.server.cached-cert-dn 15:37:44 jim
Http.server.module-base 15:37:39 jim
Https.server.interfaces 15:37:36 jim
Http.server.interfaces 15:37:31 jim
Http.server.auth-req-tls 15:37:28 jim
Http.server.tls-port 15:37:24 jim
Http.server.clear-port 15:37:04 jim
Http.server.bind-restrictions 15:36:57 jim
Http.server.session-exp-seconds 15:36:45 jim
Http.server.threads-per-processor 15:36:42 jim
Http.server.trace-level 15:36:39 jim
Http.server.keep-timeout-seconds 15:36:14 jim
Http.server.request_timeout-seconds 15:36:04 jim
Http.server.request-io-buffer-size 15:35:55 jim
N4u.ldap.lburp.transize 15:35:30 jim
N4u.nds.server-context 15:35:22 jim
N4u.nds.bindery-context 15:35:07 jim
N4u.nds.synchronization-restrictions 15:34:58 jim
N4u.nds.server-guid 15:34:47 jim
N4u.nds.preferred-server 15:34:27 jim
N4u.nds.dibdir 15:33:48 jim
N4u.nds.server-name 15:29:41 jim
N4u.nds.dofsync 15:27:41 jim
N4u.nds.server-state-up-threshold 15:26:20 jim
N4u.nds.flatcleaning-interval 15:26:08 jim
N4u.nds.drl-interval 15:25:38 jim
Distributed Reference Links 15:25:16 jim
N4u.nds.purger-interval 15:22:01 jim
N4u.nds.janitor-interval 15:21:04 jim
N4u.nds.inactivity-synchronization-interval 15:19:35 jim
N4u.server.log-levels 15:19:13 jim
N4u.nds.advertise-life-time 15:17:42 jim
N4u.server.signature-level 15:16:48 jim
N4u.server.xdas-conf 15:16:11 jim
N4u.server.log-file 15:14:45 jim
N4u.server.sid-caching 15:14:28 jim
N4u.server.libdir 15:14:10 jim
N4u.server.vardir 15:06:58 jim
N4u.server.mask-port-number 15:06:44 jim
N4u.server.thread-stack-size 15:03:24 jim
N4u.server.log-file-size 15:03:06 jim
N4u.server.start-threads 15:02:54 jim
N4u.server.max-threads 15:01:10 jim
N4u.server.max-interfaces 15:01:02 jim
N4u.server.max-openfiles 15:00:50 jim
N4u.server.udp-port 15:00:41 jim
N4u.base.slp.max-wait 15:00:28 jim
N4u.base.dclient.use-udp 15:00:05 jim
N4u.server.tcp-port 14:59:57 jim
Service Location Protocol 14:51:19 jim
SLP 14:51:00 jim
Nds.conf 14:40:34 jim
EDirectory DIB 14:08:46 jim
DIB 14:08:21 jim
Ndsrepair 13:47:16 jim
Roll-Forward Log 13:38:18 jim
Rfldirectory 13:27:46 jim
Logstreamfiles 13:25:18 jim
Stream File 13:23:10 jim
Rflkeepfiles 13:19:26 jim
Disablemovetoattrcontainer 13:14:56 jim
Preventing eDirectory from Auto Adding Indexes 13:13:54 jim
Cpinterval 13:13:16 jim
EdirectoryLoginUpdate 12:54:43 jim
Memory 12:48:22 jim
2.16.840.1.113719.1.1.4.1.52 12:45:55 jim
Random Access Memory 12:45:31 jim
RAM 12:41:15 jim
FLAIM Block Cache 12:21:40 jim
FLAIM Entry Cache 11:58:45 jim
FLAIM 11:53:36 jim
RFL 10:24:50 jim
28.12.2016
Swap Space 21:26:24 jim
Virtual Memory 21:24:09 jim
NDSD 20:59:55 jim
Scrum 12:24:30 jim
Kanban 12:06:30 jim
Lean 12:03:55 jim
TPS 12:02:28 jim
Toyota Production System 12:02:08 jim
Backlog 11:47:46 jim
Agile 11:44:37 jim
Agile Principles 11:42:02 jim
Agile Manifesto 11:36:36 jim
Scrum Master 11:30:41 jim
Iteration Backlog 11:22:43 jim
Velocity 11:21:33 jim
Story Point 11:19:50 jim
Fibonacci 11:17:56 jim
User Story 11:10:20 jim
Product Owner 11:02:47 jim
Release Planning 10:58:27 jim
Stakeholders 10:57:16 jim
22.12.2016
DevOps 14:56:14 jim
Web Blog_blogentry_221216_1 14:20:49 jim
Service 13:59:36 jim
Service-oriented Architecture 13:55:28 jim
ESB 13:52:16 jim
Enterprise Service Bus 13:51:47 jim
Enterprise Integration Patterns 13:49:02 jim
Enterprise Application Integration 13:48:15 jim
MOM 13:43:29 jim
Message-oriented Middleware 13:43:12 jim
EIP 13:37:38 jim
EAI 13:33:06 jim
Software Architecture Model 13:25:57 jim
Factory 13:20:58 jim
Bounded Context 13:19:13 jim
Repository 13:18:14 jim
Value Object 13:15:26 jim
Domain-Driven Design 12:27:14 jim
Domain Event 12:25:22 jim
Domain 12:25:04 jim
Aggregate 12:01:29 jim
21.12.2016
LOA 4 15:27:24 jim
LOA 3 15:21:34 jim
LOA 2 15:16:38 jim
LOA 1 15:08:24 jim
Anonymous Identity 14:56:32 jim
Social Identity 14:52:51 jim
Government Identity 14:47:46 jim
Organizational Identity 14:38:34 jim
Persona 14:30:55 jim
Schema 14:27:37 jim
Taxonomy 14:24:52 jim
Ontology 14:23:35 jim
Digital Context 14:20:39 jim
User Provisioning 13:41:47 jim
System for Cross-domain Identity Management 13:41:22 jim
Resource Provisioning 13:40:27 jim
Enrollment 13:31:44 jim
Identity Lifecycle Management/identityLifecycle.png 13:22:09 jim identityLifecycle
Trust Model 13:10:22 jim
Password Anti-Pattern 13:08:12 jim
NIST.SP.800-63 13:05:31 jim
LOA 12:57:32 jim
IAL 12:55:49 jim
Legitimacy of Social Login 11:57:50 jim
IDM Related Compliance Items 11:56:03 jim
Square 11:54:37 jim
ACH 11:53:14 jim
Routing Transit Number 11:51:37 jim
Istar Upgrade 11:49:43 jim
Gramm-Leach-Bliley Act 11:49:33 jim
Card Security Code 11:48:53 jim
Regulatory Risk 11:47:47 jim
Retail 11:47:44 jim
ProjectsWeHaveBeenInvolved 11:45:51 jim
Decentralized Autonomous Organization 11:43:23 jim
Authorization Request Cryptogram 11:42:59 jim
Petroleum 11:40:53 jim
Housing 11:40:10 jim
Agriculture 11:39:52 jim
Energy 11:39:40 jim
Transportation 11:39:29 jim
Industry Specific 11:39:14 jim
Airlines 11:38:11 jim
Major Industry Identifier 11:37:59 jim
Stellar Consensus Protocol 11:35:50 jim
Sarbanes-Oxley Act 11:35:06 jim
SWIFT code 11:30:14 jim
Society for Worldwide Interbank Financial Telecommunication 11:29:34 jim
Financial Institution 11:28:48 jim
MIC 11:26:48 jim
Identification Code 11:26:20 jim
ISO 10383 11:26:08 jim
Market Identifier Code 11:24:47 jim
Bank Identifier Code 11:21:22 jim
RSA SecurID 11:15:45 jim
Two-factor authentication 11:12:28 jim
ABA RTN 11:08:48 jim
UPIC 11:05:41 jim
Universal Payment Identification Code 11:05:11 jim
Issuer Identification Number 11:02:43 jim
Bank International Code 11:00:38 jim
Business Identifier Code 11:00:29 jim
BIC 10:59:59 jim
Payment Card Industry 10:55:33 jim
RFC 3615 10:53:44 jim
Web of Trust 10:52:26 jim
ISO 13616 10:49:14 jim
ISO 9362 10:45:47 jim
IBAN 10:44:58 jim
International Bank Account Number 10:44:31 jim
SWIFT 10:26:10 jim
Verifier 09:24:43 jim
Claim 09:23:16 jim
Legal Fictions 08:58:56 jim
20.12.2016
Terse RDF Triple Language 16:14:49 jim
Turtle 16:13:49 jim
Friend Of A Friend 14:58:21 jim
FOAF 14:57:12 jim
LDAP Data Interchange Format 11:24:03 jim
SAFE-INIT-UTF8-CHAR 11:22:35 jim
SAFE-UTF8-CHAR 11:22:17 jim
SAFE-INIT-CHAR 11:22:02 jim
SAFE-CHAR 11:21:36 jim
Best Practices For LDAP Naming Attributes 11:17:36 jim
RFC 2849 11:16:26 jim
JavaCodeSetSimplePassword 11:03:56 jim
Verify Time is Synchronized 11:02:47 jim
NTP 11:01:12 jim Sntp ==> SNTP
Time sync 11:01:12 jim Sntp ==> SNTP
SNTP 11:01:11 jim Sntp ==> SNTP
Base64 10:58:56 jim
Packed Encoding Rules 10:57:02 jim
Canonical Encoding Rules 10:55:25 jim
Distinguished Encoding Rules 10:53:56 jim
ASN.1 10:52:19 jim
Abstract Syntax Notation One 10:51:53 jim
Encoding 10:48:50 jim
Decoding 10:46:23 jim
Basic Encoding Rules 10:43:30 jim
MyMysqlCheatSheet 10:35:48 jim
NUL 10:34:33 jim
NULL 10:34:13 jim
Null 10:33:36 jim
SCIM Attributes 10:31:52 jim
NamingContext 10:31:30 jim
DSA-Specific Entry 10:30:58 jim
19.12.2016
PWFILTER Windows Events 13:41:54 jim
API Management 11:08:22 jim
API Registry 10:55:09 jim
16.12.2016
LDAP Extensions and Controls Listing 09:25:47 jim
LDAPControlsList 09:24:10 jim Definition -- LDAP No-Op Control ==> LDAP No-Op Control
SupportedControl 09:24:10 jim Definition -- LDAP No-Op Control ==> LDAP No-Op Control
LDAP No-Op Control 09:24:09 jim Definition -- LDAP No-Op Control ==> LDAP No-Op Control
RFC 3909 09:23:17 jim
Who Am I Extended Operation 09:11:27 jim
RFC 4647 09:07:12 jim
RFC 3866 09:05:56 jim
10.12.2016
MAD Naming Attributes 10:39:24 jim
Ambiguous Name Resolution 10:38:52 jim
SIDHistory 10:38:18 jim
SPN 10:31:57 jim
NBNS 10:20:44 jim
History of LDAP 10:17:47 jim
Year 1983 10:11:24 jim
NetBIOS 10:05:09 jim
NetBIOS Name Service 10:02:08 jim
Windows Internet Name Service 10:00:43 jim
WINS 09:59:22 jim
NetBIOS domain name 09:57:43 jim
MS-WPO 09:57:31 jim
MS-DRSR 09:46:43 jim
MS-DTYP 09:45:34 jim
2.16.840.1.113730.3.1.241 09:42:29 jim
1.2.840.113556.1.2.13 09:41:16 jim
DisplayName 09:40:29 jim
09.12.2016
Max-Pwd-Age Attribute 09:59:47 jim
Pwd-Last-Set attribute 09:55:02 jim
EDirectory Password Expiration 09:00:03 jim
Password Recovery 08:49:35 jim
Password MUST Change 08:45:21 jim
Password Reset 08:39:47 jim
PwdMustChange 08:35:04 jim
Sprint 08:28:16 jim
On-Demand Password Synchronization 08:27:21 jim
Set Active Directory Password From Java 08:20:49 jim
Example - Active Directory Change Password JNDI 08:18:36 jim
Passwords Using LDIF 08:16:57 jim
Setting and Changing Microsoft Active Directory Passwords 08:12:25 jim
Active Directory and Passwords 08:10:47 jim
08.12.2016
ERROR_PASSWORD_EXPIRED 18:18:42 jim
Iteration Demo and Review 17:33:47 jim
Iteration 17:27:37 jim
Iteration Planning 17:17:50 jim
Capacity 17:17:05 jim
Daily Stand-up 16:38:37 jim Delivery team ==> Delivery Team
Delivery Team 16:38:37 jim Delivery team ==> Delivery Team
Definition of Done 16:38:23 jim Product owner ==> Product Owner
Release 16:28:40 jim
Use cases 15:16:54 jim
Business value 15:00:26 jim
ICE 09:30:47 jim
Import Conversion Export 09:30:29 jim
Redhat Configuration 09:25:07 jim
How To Get Lab Builds 09:22:42 jim
LUMiscTricks 09:18:15 jim UsingRPM ==> Using RPM
Using RPM 09:18:14 jim UsingRPM ==> Using RPM
MigratingFromNISToLDAP 09:16:43 jim UsingIDMToReplaceNIS ==> Using DirXML To Replace NIS
IDMAndUnixLinux 09:16:42 jim UsingIDMToReplaceNIS ==> Using DirXML To Replace NIS
Using DirXML To Replace NIS 09:16:42 jim UsingIDMToReplaceNIS ==> Using DirXML To Replace NIS
Jim Willeke Resume 09:12:31 jim IstarUpgrade ==> Istar Upgrade
Our Clients 09:12:31 jim IstarUpgrade ==> Istar Upgrade
Test-Tabs 09:12:31 jim IstarUpgrade ==> Istar Upgrade
06.12.2016
Security Account Manager 17:31:58 jim
Active Directory Groups 16:14:09 jim
GroupType 16:06:12 jim
05.12.2016
KPI 07:00:00 jim
Key Performance Indicator 06:59:39 jim
Web Blog_blogentry_051216_1 06:49:49 jim
01.12.2016
ID 13:30:23 jim
Decentralized Identifier 13:25:16 jim
DID descriptor objects 13:24:35 jim
DDO 13:24:05 jim
DID 13:19:25 jim
Uniform Resource Name 13:07:59 jim
URIs, URLs, and URNs 13:03:05 jim
URL 12:58:23 jim
Administrative Identity 12:56:02 jim
Identity Management Architecture 12:46:27 jim
Web Blog_blogentry_250816_1 12:45:38 jim IdentityAndAccessManagement ==> Identity and Access Management
Identity Relationship Management 12:45:37 jim IdentityAndAccessManagement ==> Identity and Access Management
Password Management Methodologies 12:45:37 jim IdentityAndAccessManagement ==> Identity and Access Management
Web Blog_blogentry_011216_1 12:32:11 jim
28.11.2016
SCIM Password Management Extension 20:04:50 jim
NspmPasswordPolicyDN 19:17:40 jim
Password History 18:08:34 jim
SCIM Password Management 17:23:36 jim
24.11.2016
Magnetic Secure Transmission 17:31:37 jim
EMVCo Tokenization 17:25:08 jim
MST 17:19:51 jim
Samsung Pay 17:15:50 jim
23.11.2016
SCIM Create Request 20:44:18 jim
ISO 8601 20:33:04 jim
SCIM meta.version 19:57:14 jim
SCIM meta.lastModified 19:56:27 jim
SCIM meta.created 19:56:05 jim
SCIM meta.location 19:42:16 jim
SCIM Common Attribute 19:38:19 jim
SCIM meta.ResourceType 19:32:59 jim
SCIM meta 19:25:31 jim
HTTP Status Code 19:14:58 jim
HTTP 201 19:14:36 jim
SCIM Resource Operations 19:11:33 jim
CheckVersionTag 19:05:28 jim
SCIM id 18:09:14 jim
WS-Trust 14:11:45 jim
WS-Security 14:09:58 jim
Single Sign-On Scenarios 14:00:55 jim
Cloud Services Model 12:42:27 jim
Credential Mapping 12:38:53 jim
SAML Protocols 12:18:35 jim
Cloud Access Security Broker 12:16:05 jim
Web Blog_blogentry_231116_1 11:59:26 jim Cloud Access Security Brokers ==> Cloud Access Security Broker
22.11.2016
SCIM externalId 15:42:55 jim
RFC 20 15:01:21 jim
Display Parameter 14:58:02 jim
Consent Dialog 14:43:49 jim
Implicit Scopes 14:42:35 jim
Privileged Scope 14:37:13 jim
OAuth Scopes 14:35:40 jim
Web Blog_blogentry_210916_1 13:49:20 jim
Authorization Policy 13:01:03 jim
Negative Permission 12:59:51 jim
Positive Permission 12:59:28 jim
Authorization_endpoint 12:44:39 jim
21.11.2016
API Development 19:29:48 jim
Building an API 14:41:56 jim
API Auditing Monitoring Metrics Logging 14:31:44 jim
API Service Delivery 14:23:02 jim API Metrics ==> API Auditing Monitoring Metrics Logging
Application Metrics 14:23:02 jim API Metrics ==> API Auditing Monitoring Metrics Logging
Complex Event Processing 14:23:02 jim API Metrics ==> API Auditing Monitoring Metrics Logging
Continuity Management 13:39:29 jim
Service Delivery 13:37:09 jim
IT Service Management 13:36:01 jim
IT 13:35:18 jim
Information Technology 13:35:02 jim
ITSM 13:33:00 jim
IT Infrastructure Library 13:31:07 jim
ITTL 13:26:46 jim
Contingency Planning 13:21:56 jim
Capacity Management 13:10:26 jim
SLA 13:07:17 jim SLAs ==> SLA
Service-Level Agreement 13:06:50 jim
Service Level Management 13:05:54 jim Service Level Agreement ==> Service-Level Agreement
BPM 12:35:01 jim
Business Process Management 12:34:44 jim
18.11.2016
File Transfer Protocol 14:57:25 jim
FTP 14:57:06 jim
Structured Query Language 14:56:34 jim
SQL 14:56:12 jim
API Brokering 14:55:44 jim
Service Modeling Language 14:55:10 jim
SML 14:50:29 jim
SmartMessage Language 14:47:50 jim
Metrics 14:26:22 jim
17.11.2016
Web Blog_blogentry_171116_1 11:55:07 jim
14.11.2016
2.16.840.1.113719.1.1.4.1.197 16:42:23 jim
OAuth 2.0 NOT an Authentication protocol 01:55:03 jim
08.11.2016
Diffie-Hellman Key-Exchange 14:46:47 jim
Key-Exchange 14:42:54 jim
Session Key 14:29:37 jim
TLS PRF 14:23:52 jim
Subject Certificate 14:06:15 jim
Identity Certificate 13:53:13 jim
Certificate_list 13:48:50 jim
Web Blog_blogentry_081116_1 13:30:44 jim
Java KeyStore 12:45:40 jim
Example Certificate 12:39:44 jim
Trusted Certificate 12:36:04 jim
RA 12:27:42 jim
28.10.2016
Salt 12:03:27 jim
Rainbow Tables 11:59:49 jim
Nounce or Salt 11:58:29 jim
Nonce 11:54:53 jim
Web Blog_blogentry_281016_1 11:54:12 jim
Rich Credential 11:53:15 jim
18.10.2016
Tomcat And LDAP 01:55:40 jim
16.10.2016
Amr_values 12:24:08 jim
Authentication Method Reference 12:23:03 jim
Complex Attribute 12:10:44 jim
SCIM Data Types 11:40:39 jim
SCIM Resource Example 11:32:00 jim
SCIM Replace Request 11:28:25 jim
13.10.2016
OpenWhisk 19:35:30 jim
Functions as a Service 16:54:23 jim
Webtask 14:19:34 jim
AWS Lambda 13:45:01 jim
Event-triggered 13:44:36 jim
FaaS 13:39:02 jim
Serverless Architectures 12:51:53 jim
Web Blog_blogentry_131016_1 12:40:19 jim
04.10.2016
Active Directory Tools/aduc.jpg 17:12:13 Bimpster
Active Directory Tools 17:11:18 Bimpster
03.10.2016
Common Edirectory Bind Errors 12:14:22 jim
LoginMaximumSimultaneous 12:12:38 jim
MAXIMUM_LOGINS_EXCEEDED 12:03:22 jim
LoginActivationTime 11:37:19 jim
29.09.2016
Authentication Failures 13:34:55 jim
Account Restrictions 13:33:40 jim
MyStartPage 13:30:17 jim
LDAP_INVALID_CREDENTIALS 13:29:46 jim
NetworkAddressRestriction 13:04:27 jim
LDAP_NO_SUCH_OBJECT 13:02:17 jim
28.09.2016
Internet Message Access Protocol 13:55:11 jim
IMAP 13:52:38 jim
Application Layer Security 13:49:48 jim
World Wide Web 13:48:39 jim
WEB 13:47:18 jim
Web 13:46:54 jim
Schannel SSP 13:44:19 jim
Security 13:37:05 jim
Blowfish 12:08:01 jim
Password Storage Scheme 12:06:23 jim
Encryption 12:05:09 jim
InfoSec 12:02:13 jim
Information Rights Management 12:00:29 jim Data Security ==> Information security
OAuth 2.0 JWT Authorization Request 11:33:13 jim
Authorization Request 11:15:46 jim
Request Object 11:15:02 jim
26.09.2016
Sub 00:01:33 jim
25.09.2016
Identity Token 23:40:17 jim
The Next Big Thing 13:13:06 jim
Life Management Platform 13:12:35 jim
Directory Partition Hierarchy 13:06:47 jim
Directory Partition Hierarchy/mad-directory-tree-hierarchy.png 13:04:14 jim mad-directory-tree-hierarchy
Root Domain Directory Partition 12:58:38 jim
Forest Root Domain 12:55:27 jim
Directory Partition Subtrees 12:36:02 jim
Domain Directory Partition 12:32:45 jim
Schema Directory Partition 12:32:33 jim
Configuration Directory Partition 12:32:22 jim
Internal Cross-References 12:14:51 jim
Simple Mail Transfer Protocol 12:08:47 jim
RFC 5321 12:08:00 jim
MailboxRelatedObject 12:07:24 jim
LDAPWiki Images 11:55:46 jim
LDAPWiki Images/ldapwiki-logo.png 11:54:22 jim ldapwiki-logo
LDAPWiki Images/ldapwiki.com-code.png 11:52:24 jim ldapwiki.com-bar-code
LDAP Connection Maintenance 11:49:54 jim
DXServer Password Commands and Operational Attributes 11:42:54 jim
23.09.2016
Identity Sovereignty 18:13:09 jim
Sovereignty 18:08:17 jim
Namespace 17:30:55 jim
Constitutional Order 17:30:36 jim
Legitimacy 17:29:19 jim
Philip Bobbit 17:24:24 jim
Health Care Organization 14:05:20 jim
Health Care Provider 14:04:27 jim
Financial Organization 14:00:29 jim
Social Networks 13:54:56 jim
Federated Identity 13:53:04 jim
Digital Subject 13:51:33 jim
Identity Correlation 13:41:50 jim
LDAP URL 11:57:41 jim
Test Page 11:52:53 jim
Regexp 11:47:55 jim
Regular expression 11:47:36 jim
Regular Expression Syntax 11:44:14 jim
Opportunities 11:41:32 jim
22.09.2016
XDAS Event Identifier 19:47:01 jim XADS Event Identifier ==> XDAS Event Identifier
XDASv2 Events 19:46:49 jim
XDAS Account Management 19:45:55 jim
XDAS Authentications 19:14:08 jim
NovellS PeopleSoft Driver 17:30:06 jim
21.09.2016
Auth_time 18:06:17 jim
DirXML-PasswordSyncStatus 12:50:11 jim
20.09.2016
Internet Assigned Numbers Authority (IANA) Considerations for the Lightweight Directory Access Protocol (LDAP) 12:55:17 jim
LDAP ping 12:54:51 jim
BaseObject 12:52:19 jim
Apache Web Server and LDAP 12:51:47 jim
LDAP Searches 12:51:15 jim LDAPSearchScopes ==> LDAP Search Scopes
SingleLevel 12:51:15 jim LDAPSearchScopes ==> LDAP Search Scopes
SubordinateSubtree 12:51:15 jim LDAPSearchScopes ==> LDAP Search Scopes
WholeSubtree 12:51:15 jim LDAPSearchScopes ==> LDAP Search Scopes
LDAP 12:51:14 jim LDAPSearchScopes ==> LDAP Search Scopes
LDAP Search Scopes 12:51:14 jim LDAPSearchScopes ==> LDAP Search Scopes
SubordinateSubtree/subordinateSubtree-scope.png 12:47:37 jim subordinateSubtree-scope
Draft-sermersheim-ldap-subordinate-scope 12:41:15 jim
WholeSubtree/wholeSubtree-scope.png 12:17:26 jim wholeSubtree-scope
SingleLevel/singleLevel-scope.png 12:11:51 jim singleLevel-scope
BaseObject/baseObject-scope.png 12:05:12 jim baseObject-scope
Subentries 11:56:10 jim
RFC 3672 11:51:07 jim
PwdPolicySubEntry 11:42:49 jim
RFC 3062 11:31:00 jim
DONT_EXPIRE_PASSWORD 11:12:48 jim
User-Account-Control Attribute Values 11:03:30 jim
User-Account-Control Attribute 10:49:37 jim
16.09.2016
How SSL-TLS Works/tls-handshake.png 13:02:49 jim tls-full-handshake
ObjectClass 12:22:01 jim
DIT Structure Rule 12:19:22 jim
DIT Content Rule 12:18:53 jim
Thinking of LDAP 12:13:55 jim
Structural ObjectClass 12:13:32 jim
Schema Checking 12:12:31 jim
ABSTRACT 12:09:56 jim
AttributeType Description 12:05:18 jim
AttributeTypes 11:59:46 jim
Attribute Type Description 11:56:53 jim
LDAP Entry 11:31:15 jim
Distinguished Value 11:28:16 jim
RFC 4510 11:16:04 jim
Attribute Options 11:13:26 jim
LDAP Model of User Information 11:01:24 jim
LDAP Directory Information Models 10:55:15 jim
RFC 4512 10:46:29 jim
RFC 4518 10:42:11 jim
15.09.2016
Designer 15:27:36 jim
14.09.2016
RESTful API Modeling Language 13:27:57 jim
13.09.2016
String Representation of Distinguished Names 11:34:40 jim
RFC 4517 11:33:22 jim
DistinguishedNameMatch 11:32:30 jim
Distinguished Name Case Sensitivity 11:16:21 jim
LDAP Protocol Exchanges 11:13:19 jim
Distinguished Names 11:10:00 jim
1.3.6.1.4.1.1466.115.121.1.12 11:08:12 jim
DN Syntax 11:07:22 jim
DistinguishedName 11:02:35 jim
AVA 10:12:17 jim
11.09.2016
Soft tokens 13:23:33 jim
Hard tokens 13:22:49 jim
Token 13:21:21 jim
Web Blog_blogentry_100916_1 13:06:50 jim
RFC 4211 13:05:12 jim
Software-secured key 12:32:36 jim
Private Key 12:31:05 jim
Plaintext 12:30:19 jim
Secret-key 12:26:57 jim
Hardware-secured key 12:24:24 jim
Vbm 12:14:49 jim
Swk 12:14:01 jim
Kba 12:13:22 jim
Hwk 12:12:26 jim
Geo 12:11:37 jim
Pairwise Pseudonymous Identifier 11:09:16 jim
Web Blog_blogentry_160615_1 11:04:20 jim
Web Blog_blogentry_140615_1 11:04:04 jim
Response_type 11:03:14 jim
OAuth Error 11:02:02 jim
OAuth 2.0 Endpoints 11:01:12 jim
OAuth 2.0 Client Registration 11:00:46 jim
Implicit Flow 10:59:25 jim
Authorization Response 10:58:51 jim
OAuth Parameters Registry 10:57:50 jim
RFC 5226 10:56:45 jim
Access Token Request 10:51:58 jim
Juridical Person 10:50:06 jim Juridical Persons ==> Juridical Person
10.09.2016
OpenID Connect 13:57:07 jim Redirect URI ==> Redirect_uri
Authorization Code Flow 13:57:06 jim Redirect URI ==> Redirect_uri
Redirect_uri 13:57:06 jim Redirect URI ==> Redirect_uri
Response_mode 13:56:06 jim
OAuth 2.0 Multiple Response Type Encoding Practices 13:51:06 jim
Collision-Resistant Name 13:43:46 jim
Nested JWT 13:39:12 jim
JWT Claims Set 13:35:37 jim
JWT Claim Value 13:33:36 jim Claim Value ==> JWT Claim Value
JSON Web Token Claims 13:28:16 jim
OAuth Client 13:12:57 jim
OpenID Connect Provider 13:09:13 jim
Authentication Request 13:07:21 jim
Natural Person 12:48:26 jim
PPID 12:37:48 jim
09.09.2016
Respect Trust Framework 13:24:44 jim
ILM 12:35:09 jim
Information Lifecycle Management 12:34:34 jim
Data 11:56:58 jim
Data In Process 11:53:12 jim
TLS 11:42:43 jim
07.09.2016
Password Strength 18:25:08 jim
06.09.2016
Technology-Enabled Relationship Management 10:05:18 jim
05.09.2016
Java Authentication and Authorization Service 18:50:26 jim
Security Strength Factor 09:26:49 jim
SSF 09:13:31 jim
Bruce Schneier 09:12:23 jim
Citation needed 09:10:23 jim
Web Blog_blogentry_050916_1 09:00:25 jim
03.09.2016
Lean Product Development 12:45:41 jim
Customer 12:41:53 jim
User 12:38:55 jim
Product Management 11:52:26 jim
User Experience 11:38:19 jim
29.08.2016
Data-lake 12:55:24 jim
Web Blog_blogentry_290816_1 12:53:04 jim
Stellar Network 12:03:53 jim
Stellar Ledger 11:58:02 jim
ID Key 11:53:31 jim
JLINC 11:43:40 jim
Web Blog_blogentry_280816_1 11:21:32 jim
Two Generals Problem 10:56:14 jim
Byzantine Generals Problem 10:55:48 jim
28.08.2016
Identity Chains 14:13:26 jim
RSA 13:35:53 jim
Group Signatures 13:34:59 jim
Ring Signature 13:30:36 jim
Blockchain ID 13:17:04 jim
Blockchain Identity 13:16:47 jim
Qiy Foundation 12:06:38 jim
Qiy Trust Framework 12:00:00 jim
27.08.2016
One-Time password 23:26:19 jim
CAPTCHA 23:04:03 jim
NIST.SP.500 Computer Systems Technology 14:09:04 jim
Web Blog_blogentry_270816_1 14:04:48 jim
United States Department of Commerce 14:01:25 jim
Web Blog_blogentry_030915_1 13:55:30 jim SP 500 Computer Systems Technology ==> NIST.SP.500 Computer Systems Technology
SP 1800 Cybersecurity Practice Guides 13:54:56 jim
NIST.SP.800 Computer Security 13:54:26 jim SP 800 Computer Security ==> NIST.SP.800 Computer Security
United States Executive Branch 13:53:06 jim
POTUS 13:52:41 jim
President of the United States of America 13:52:23 jim
United States Federal Executive Department 13:42:27 jim
United States Cabinet Department 13:41:53 jim
IRS 13:06:54 jim
Internal Revenue Service 13:06:26 jim
FAA 13:05:50 jim
Federal Aviation Administration 13:05:28 jim
Not-for-profit Entity 13:04:48 jim
Federally Funded Research and Development Centers 13:01:27 jim
FFRDC 12:59:59 jim
MITRE 12:54:15 jim
CVE 12:47:10 jim
26.08.2016
Interval Syntax 19:11:17 jim
Lockouttime 19:07:51 jim
Active Directory Account Lockout 19:05:16 jim
2.5.5.16 19:03:02 jim
Integer8 19:02:00 jim
Health Insurance Portability and Accountability Act 13:01:42 jim
Standard compliance 12:54:35 jim
Standard 12:52:25 jim
United States Federal Standard 12:51:37 jim
Trust Framework Provider 12:48:47 jim
Contract 12:39:21 jim
Health Information Technology for Economic and Clinical Health 12:37:06 jim
Federal Information Processing Standard 12:35:11 jim
NIST 12:32:42 jim
National Institute of Standards and Technology 12:32:00 jim
Federal Information Security and Management Act 12:30:11 jim
Childrens Health Insurance Program 12:26:04 jim
IEEE 12:24:11 jim
Year 1963 12:22:55 jim
Institute of Electrical and Electronics Engineers 12:22:35 jim
ANSI 12:20:13 jim
American National Standards Institute 12:19:52 jim
United States Federal Law 12:12:48 jim
Year 2002 12:08:23 jim
ICAM 11:59:38 jim
Identity, Credential, and Access Management 11:59:23 jim IDENTITY, CREDENTIAL, & ACCESS MANAGEMENT ==> Identity, Credential, and Access Management
Web Blog_blogentry_260815_1 11:59:23 jim IDENTITY, CREDENTIAL, & ACCESS MANAGEMENT ==> Identity, Credential, and Access Management
Web Blog_blogentry_260816_1 11:50:30 jim
Federal Privacy Act 11:49:28 jim
Contract of Adhesion 11:37:51 jim
25.08.2016
API Economy 16:52:50 jim
Loosely coupled 16:12:53 jim
OperationalAttribute 03:40:13 jim
CreateTimestamp 03:38:38 jim createTimestamp ==> CreateTimestamp
DSAOperation 03:28:55 jim
RFC 3673 03:27:14 jim
24.08.2016
Intruder Detection 12:31:24 jim
Account Inactivity 12:28:24 jim
Disable-accounts-after-inactivity 12:28:06 jim
ShadowInactive 12:17:38 jim
Account Expiration 12:11:40 jim
PwdMinLength 11:52:57 jim
23.08.2016
LDAP Query Basic Examples 22:50:51 jim
RFC 6101 22:47:31 jim
Connection ID 22:44:23 jim
Anonymous Cipher Suite 22:40:42 jim
Replay attack 22:39:16 jim
Distributed Denial-of-Service 22:38:13 jim
Denial-of-Service 22:37:49 jim
DDoS 22:34:15 jim
DoS 22:26:43 jim
Account Lockout 22:26:24 jim
1.3.6.1.4.1.42.2.27.8.1.2 14:32:34 jim
Password Minimum Age 14:21:05 jim
Challenge-response Authentication Mechanism 13:38:21 jim
SMTP 13:35:28 jim
CRAM 13:34:36 jim
CRAM-MD5 13:33:23 jim
RFC 3647 13:32:10 jim
RFC 2195 13:19:43 jim
DIGEST-MD5 13:05:39 jim
RFC 6331 13:03:32 jim
RFC 2831 13:01:45 jim
Password Administrator 13:00:28 jim
Password Policy Administrator 13:00:13 jim
Internet Draft 12:42:37 jim
Public Key Infrastructure 12:26:54 jim
Certificate Policy 12:25:11 jim
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework 12:23:41 jim
Host Card Emulation 11:49:24 jim
22.08.2016
CA Directory 16:54:52 jim
Online Certificate Status Protocol 14:06:44 jim
21.08.2016
Reputation 13:52:31 jim
Reputation System 13:48:56 jim
WOT 13:27:15 jim
WebID 13:23:44 jim
RDFA-CORE 13:22:37 jim
Web Blog_blogentry_210816_1 12:22:06 jim
20.08.2016
Parameter 13:22:38 jim Parameters ==> Parameter
Web Blog_blogentry_200816_1 13:22:38 jim Parameters ==> Parameter
RFC 7797 13:21:46 jim
RFC 7519 13:18:44 jim
SET 12:50:17 jim
Security Event Token 12:48:56 jim
Transport-layer Security Mechanism 12:36:52 jim
Kerberos 12:35:22 jim
By-reference 12:34:59 jim
Trust Anchor Management Requirements 11:57:29 jim
Trust Anchor Store 11:45:41 jim
Apple 11:45:14 jim
KeyChain 11:44:22 jim
Public Key Infrastructure Weaknesses 11:23:19 jim
Certificates and Authentication 11:21:39 jim
Client Send Certificate 11:13:00 jim
TLS-Finished 11:08:40 jim
ChangeCipherSpec 11:08:04 jim
CertificateVerify 11:07:44 jim
ClientKeyExchange 11:06:55 jim
ServerHelloDone 11:06:18 jim
CertificateRequest 11:05:57 jim
ServerHello 11:05:22 jim
ClientHello 11:05:05 jim
ServerCertificate 11:04:34 jim
RFC 5055 11:00:45 jim
JKS 10:58:25 jim
RFC 3447 10:35:53 jim
RFC 2347 10:35:20 jim
RFC 2313 10:34:02 jim
Verifying Certificate Signatures 10:32:13 jim
19.08.2016
Certificate Chain/certificate-chain-two.png 13:48:37 jim More details
NumericDate 13:34:41 jim
RFC 3339 13:33:55 jim Timestamps ==> Timestamp
Timestamp 13:33:55 jim Timestamps ==> Timestamp
Time 13:33:38 jim
Date 13:33:23 jim
Java Dates Timezones And Calendars 13:31:38 jim
Exp 13:23:03 jim
DxPwdMustChange 13:14:04 jim
Password Change 13:05:01 jim
Administrative Password Reset 13:04:42 jim Administrative Reset ==> Administrative Password Reset
SCIM Schemas Attribute 12:54:35 jim
ERROR_PASSWORD_MUST_CHANGE 12:53:19 jim
Security Identifier 12:43:30 jim
Security Token 12:41:01 jim
OAuth 2.0 Threat Model and Security Configurations 12:34:46 jim
Password Considerations and Requirements 12:33:44 jim
RFC 2119 12:15:45 jim
OPTIONAL 12:11:55 jim
18.08.2016
Eyeprint ID 11:16:52 jim
17.08.2016
Privilege 14:07:46 jim
Entitlement parameter value 14:06:20 jim
Entitlement 13:56:06 jim
NASD 12:19:50 jim
SRO 12:18:38 jim
Self-regulatory Organization 12:18:16 jim
FINRA 12:16:43 jim
RFC 5705 11:33:01 jim
TPM 11:30:14 jim
Trusted Platform Module 11:29:56 jim
16.08.2016
Operational Risk 16:36:50 jim
SCIM Group 15:01:24 jim
Web Blog_blogentry_251015_1 01:46:41 jim
15.08.2016
HMAC-based One-Time Password Algorithm 18:14:41 jim
Web Blog_blogentry_150816_1 17:54:03 jim
Short Message Service 17:34:51 jim
Fraud 16:32:52 jim
Multiple-channel Authentication 16:16:01 jim
MCA 16:14:29 jim Mca ==> MCA
Mobile Network Code 15:55:50 jim
HNI 15:43:02 jim
PLMN 15:31:31 jim
PSTN 15:30:44 jim
Home Network Identity 15:29:07 jim
Mobile Subscriber Identification Number 14:46:10 jim
MSIN 14:42:43 jim
ICCID 14:41:38 jim Integrated Circuit Card IDentifier ==> Integrated Circuit Card Identifier
Integrated Circuit Card Identifier 14:41:37 jim Integrated Circuit Card IDentifier ==> Integrated Circuit Card Identifier
Mobile Country Code 14:40:43 jim
Code Division Multiple Access 14:39:38 jim
CDMA 14:39:15 jim
MNC 14:37:50 jim
MCC 14:04:06 jim
Universal Mobile Telecommunications System 13:42:20 jim
Universal Subscriber Identification Module 13:41:22 jim
USIM 13:39:57 jim
UICC 13:37:50 jim
Universal Integrated Circuit Card 13:37:28 jim
RIL 13:21:07 jim
Radio Interface Layer 13:20:50 jim
UMTS 13:15:16 jim
Global System for Mobile Communications 13:13:58 jim
GSM 13:12:34 jim
Subscriber Identification Module 13:10:46 jim
IMSI 12:55:42 jim
MNO 12:55:02 jim
SIM 12:41:26 jim
14.08.2016
Confidentiality 13:02:40 jim
Confidential 13:01:28 jim
NT LAN Manager Vulnerabilities 12:28:23 jim
Data anonymization 12:15:50 jim
De-anonymization 12:07:22 jim
11.08.2016
Policy Based Management System 13:12:08 jim
Distributed Management Task Force 13:02:56 jim
DMTF 13:00:00 jim
Trustee 12:31:36 jim
ACL (eDirectory Attribute) 12:29:49 jim
Object ACL 12:29:06 jim
Access Control List 12:19:10 jim
Access Control Entry 12:18:33 jim
Trustor 12:15:42 jim
Evidence 11:59:47 jim
Trusted Execution Environment 11:51:53 jim
Humor 11:51:41 jim
By-value 11:36:01 jim
Passed by reference 11:31:32 jim
Request_object_encryption_alg_values_supported 11:23:34 jim Passed by value ==> By-value
Request_object_encryption_enc_values_supported 11:23:34 jim Passed by value ==> By-value
Request_uri 11:23:34 jim Passed by value ==> By-value
Secure Enclave 11:21:41 jim
Secure Element 11:19:54 jim
CAPK 11:13:24 jim
Certificate Authority 11:12:10 jim
RFC 5280 10:38:00 jim
10.08.2016
OAuth state parameter 18:11:16 jim
RAML 17:54:11 jim
API Portal 17:46:14 jim
Continuous Improvement 17:39:44 jim
HTTP 16:23:26 jim
Server-side 16:06:00 jim
Client-side 16:03:29 jim
SessionData 16:02:56 jim
Stateful 15:50:32 jim
HTTP Request 15:35:31 jim
Web Storage 15:30:00 jim
Cookie 15:25:23 jim
Browser 15:22:22 jim
Informed Consent 15:21:21 jim
Tracking Cookie 15:08:11 jim
Identification 14:59:13 jim
Remember Me 14:31:50 jim
Rapid-Fire Login Attempts 14:31:25 jim
ADSIedit 14:05:43 jim
Enable UserPassword in Microsoft Active Directory 14:04:40 jim
Anti-pattern 14:02:22 jim
Secret Questions 13:58:46 jim
Open Web Application Security Project 13:51:48 jim
OWASP 13:48:04 jim
Brute-Force 13:47:02 jim
ReCAPTCHA 13:17:28 jim
Active Directory Service Interfaces 12:21:41 jim
Electronic Mail 12:16:20 jim
Email 12:15:52 jim
Internet Message Format 12:14:51 jim
RFC 2822 12:12:11 jim
Security Event Log 12:04:51 jim
System Access Control List 12:04:34 jim
RFC 822 12:03:56 jim
UserPrincipalName 11:59:47 jim
DN Escape Values 11:58:29 jim
ADSI 11:55:53 jim
Access Control Entry Type 11:51:28 jim
SACL 11:49:43 jim
DACL 11:49:06 jim
Discretionary Access Control List 11:39:05 jim
09.08.2016
ACE 17:44:04 jim Access Control Entries ==> Access Control Entry
Discretionary Access Control 17:40:04 jim
Common Active Directory Bind Errors 17:18:02 jim
RDN 16:35:43 jim
Relative Distinguished Name 16:35:02 jim
DN 16:31:19 jim
FDN 16:23:52 jim
Member Attribute 16:21:18 jim
Distributed Ledger Technology 14:25:16 jim
Transparency 14:13:51 jim
Non-Repudiation 14:13:32 jim
Auditing 14:12:06 jim
Integrity 14:11:06 jim
Governance 14:07:56 jim
Accountable 13:58:17 jim
Blockchain 13:49:38 jim
Hyperledger Project 13:47:44 jim
CommonAccord 13:37:53 jim
Twitter Feed 13:36:52 jim
Client-server 12:41:42 jim
Session 12:34:08 jim
SessionStorage 12:16:14 jim
Token Storage 12:15:43 jim
Auth0 12:10:02 jim
Web Blog_blogentry_090816_1 11:50:01 jim
Tokenization 11:42:18 jim
08.08.2016
Web Blog_blogentry_080816_1 23:10:00 jim
SAS 70 23:03:54 jim
SOC 3 23:03:23 jim
SOC 2 23:01:47 jim
SSAE 22:45:02 jim
Service Organization Controls 22:42:37 jim
SOX 22:37:01 jim
Privilege Management Infrastructure 22:11:14 jim
Privilege Management 21:53:57 jim
SoAs 20:05:52 jim
Sources of Authority 20:05:37 jim
AA 20:03:40 jim
Attribute Authority 20:03:24 jim
AC 20:01:53 jim
RFC 5755 20:01:29 jim
Attribute Certificate 20:00:34 jim
PMI 19:20:12 jim
X.509 19:12:50 jim
Validity-Not Before 19:10:53 jim
Validity-Not After 19:10:36 jim
OAuth 2.0 Dynamic Client Registration Management Protocol 19:03:56 jim
Token_endpoint 18:56:17 jim
Token-exchange 18:55:51 jim
Resource Owner Password Credentials Grant 18:55:07 jim
OAuth 2.0 Dynamic Client Registration Protocol 18:52:11 jim
ACDC Grant type 15:27:22 jim
Client_id 15:25:45 jim Client ID ==> Client_id
CSRF Token 15:15:07 jim
Cross-site request forgery 15:14:11 jim
XSS 14:53:11 jim
Cross-site scripting 14:52:51 jim
XSRF 14:46:28 jim
CSRF 14:46:17 jim
Grant_type 14:40:09 jim
Authorization Code 14:31:41 jim
07.08.2016
EntryUUID 21:47:10 jim
Lightweight Directory Access Protocol (LDAP) entryUUID Operational Attribute 21:46:45 jim
RFC 4530 21:44:13 jim
RFC-4517 21:36:53 jim
RFC-4520 21:36:07 jim
LDAPSyntaxes 21:34:44 jim
Object Class Description 21:29:59 jim
Numeric String 21:29:24 jim
Name Form Description 21:28:42 jim
Matching Rule Use Description 21:28:08 jim
Matching Rule Description 21:27:44 jim
Enhanced Guide 21:27:23 jim
DIT Structure Rule Description 21:27:12 jim
DIT Content Rule Description 21:26:35 jim
CaseExactSubstringsMatch 21:22:25 jim
CaseExactOrderingMatch 21:22:03 jim
SYNTAX 21:21:00 jim Telephone Number ==> Telephone Number LDAP Syntax
Telephone Number LDAP Syntax 21:21:00 jim Telephone Number ==> Telephone Number LDAP Syntax
CaseExactMatch 21:20:49 jim
2.5.4.20 21:14:37 jim
TelephoneNumber 21:13:17 jim
06.08.2016
DUAConfigProfileProfileAttributes 13:23:33 jim
PreferredServerList 13:22:51 jim
A Configuration Profile Schema for Lightweight Directory Access Protocol (LDAP)-Based Agents 12:45:18 jim
DUAConfigProfile 12:44:47 jim
RFC 4876 12:41:06 jim
LabeledUri 12:39:06 jim
RFC 2079 12:33:12 jim
RFC 1779 12:30:50 jim
RFC 6151 12:30:07 jim
Cryptography 12:28:21 jim Message Digest ==> Message-Digest
MD4 12:28:21 jim Message Digest ==> Message-Digest
MD5 12:28:21 jim Message Digest ==> Message-Digest
Message-Digest 12:28:21 jim Message Digest ==> Message-Digest
RFC 1321 12:28:21 jim Message Digest ==> Message-Digest
SHA384 12:28:21 jim Message Digest ==> Message-Digest
SHA512 12:28:21 jim Message Digest ==> Message-Digest
Secure Hash Algorithm 12:28:21 jim Message Digest ==> Message-Digest
SHA-1 Deprecation 12:24:27 jim
Year 1956 12:23:01 jim
Year 1947 12:22:37 jim
Year 1865 12:22:16 jim
TSB 12:21:33 jim
Telecommunication Standardization Bureau 12:21:12 jim
International Telegraph and Telephone Consultative Committee 12:19:04 jim
CCITT 12:17:47 jim
X.400 12:15:06 jim
International Telegraph Union 12:13:06 jim
International Telecommunication Union 12:12:34 jim
ITU Telecommunication Standardization Sector 12:11:59 jim
ITU-T 12:08:55 jim
RFC 4524 12:07:59 jim
Year 1977 12:07:05 jim
OSI 12:06:37 jim
ISO 12:05:59 jim
International Organization for Standardization 12:05:21 jim
Open Systems Interconnection 12:02:53 jim
Cooperation for Open Systems Interconnection Networking in Europe 12:00:48 jim
COSINE 11:57:02 jim
The COSINE and Internet X.500 Schema 11:53:28 jim
Inter-Process Communication 11:49:56 jim
Using LDAP over IPC Mechanisms 11:46:42 jim
Draft-chu-ldap-ldapi-00 11:46:37 jim
IPC 11:43:21 jim
LDAPI 11:42:31 jim
RFC 1274 11:37:23 jim
LDAP Server Standards and Specifications 11:35:35 jim
05.08.2016
Server Authentication Module 12:52:44 jim
SAM 12:46:25 jim
Java 12:43:20 jim
J2EE 12:43:01 jim
Java Platform, Enterprise Edition 12:42:22 jim
Java EE 12:40:46 jim
JASPIC 12:39:50 jim
Java Authentication Service Provider Interface for Containers 12:39:27 jim
Web Blog_blogentry_050816_1 12:33:50 jim
LDAP Result Codes 12:31:26 jim
04.08.2016
Patch Cable 16:35:33 jim
Patch Cable/modular_plugs_wiring configuration.pdf 16:34:15 jim Wiring Configurations for Modular Plugs
PC Hardware Cables 16:22:32 jim
SID 15:04:36 jim
Microsoft Active Directory 14:56:06 jim
Microsoft Response Codes 14:11:19 jim
RFC 6649 13:51:02 jim
Best Current Practice 13:50:13 jim
RFC 3406 13:49:32 jim
Merkle Tree 13:41:23 jim
B-tree file system 13:40:09 jim
Btrfs 13:39:16 jim
Tahoe Least-Authority File Store 13:38:18 jim
Tahoe-LAFS 13:37:37 jim
IPFS 13:20:37 jim InterPlanetary File System ==> Inter-Planetary File System
Web Blog_blogentry_070316_1 13:20:37 jim InterPlanetary File System ==> Inter-Planetary File System
WILL_NOT_PERFORM 12:39:08 jim
HTML Colour Names 12:38:44 jim
LDIF eDirectory Indexes 12:37:38 jim
SystemFlags 12:36:25 jim
Ldapsearch Networkaddress 12:35:55 jim
ERROR_PASSWORD_RESTRICTION 12:32:17 jim
PASSWD_NOTREQD 12:31:50 jim
2.16.840.1.113719.1.203.4.33 12:29:54 jim
Hexadecimal 12:29:12 jim
Base 16 12:27:06 jim
Hex 12:26:48 jim
HEX 12:22:05 jim
ATTRIBUTE ALREADY EXISTS (-615) 12:21:38 jim
03.08.2016
Microsoft Active Directory Anomalies 12:40:56 jim
JSON Web Tokens 12:39:26 jim
Custom URI scheme 12:38:02 jim
SQL Calls From Driver (Publisher Channel) 12:37:10 jim
Unique Value Finder with Driver 12:36:53 jim
OID 12:36:24 jim
SCIM Attribute Extensions to Resources 12:35:56 jim
SAML Assertions 12:35:00 jim
MAD LDAP Client 12:33:11 jim
Schema Mapping Policy 12:31:41 jim
DirXML Calling Custom Java Functions 12:30:48 jim
Identity Vault namespace 12:29:41 jim
SAML Attribute Statement 12:28:32 jim
Public Claim Names 12:27:59 jim
An IETF URN Sub-Namespace for OAuth 12:27:28 jim
DirXML Script namespace definitions 12:26:14 jim
Namespace Identifier 12:24:31 jim
Application namespace 12:23:17 jim
XML namespace 12:21:22 jim
NID 12:09:29 jim
URC 12:01:34 jim
Uniform Resource Characteristics 12:01:19 jim
Backus Normal Form 12:00:43 jim
BNF 11:58:16 jim
World Wide Web Consortium 11:56:50 jim
W3C 11:56:28 jim
RDF 11:54:37 jim
Resource Description Framework 11:54:17 jim
RFC 6648 11:49:10 jim
RFC 1737 11:48:16 jim
RFC 2141 11:47:20 jim
RFC 3986 11:39:16 jim
URN 11:35:13 jim
RFC 1738 11:29:33 jim
Uniform Resource Locator 11:25:42 jim Uniform Resource Locator (URL) ==> Uniform Resource Locator
02.08.2016
Private data 11:34:57 jim
National Security 11:20:18 jim
Consent_required 11:10:17 jim
Consent Receipts 11:09:23 jim
Data Privacy 10:49:41 jim
Sourced 10:42:20 jim
Derived 10:40:20 jim
Self-Asserted 10:38:36 jim
Authoritative 10:37:13 jim
authoritative 10:35:07 jim
Authoritative Entity 10:32:28 jim
Data Currency 10:18:12 jim
Data Accuracy 08:45:28 jim
Metadata 08:34:02 jim
APS 08:00:30 jim
Attribute Provider Statement 08:00:03 jim
Relying Party 07:58:22 jim
CSP 07:54:27 jim
Web Blog_blogentry_020816_1 07:50:58 jim
31.07.2016
Web Blog_blogentry_310716_1 13:53:10 jim
Self-Sovereign Identity 13:46:58 jim
Domain of OneS Own 13:08:31 jim
Domain of OneS Own/Sovereign-source Identity.png 13:07:29 jim Sovereign-source Identity
Domain of OneS Own/Traditional Identity Store.png 13:07:06 jim Traditional Data Store
Bob/bob.png 13:03:24 jim Bob
Alice/alice.png 13:02:25 jim Alice
DoOO 12:25:14 jim
Database Management System 12:05:56 jim
DBMS 12:04:25 jim
Database 12:03:09 jim
Data Store 11:57:57 jim
Year 2012 11:47:33 jim
Cryptographic Hash Function 11:36:57 jim
Ralph Merkle 11:31:11 jim
Diffie-Hellman 11:27:54 jim
Year 1979 11:25:21 jim
Leaf 11:24:43 jim
Non-leaf 11:23:23 jim
DAO 10:38:36 jim
Permissioned Systems 10:29:46 jim
Unpermissioned System 10:22:56 jim
DLT 10:06:30 jim
Smart contracts 09:31:42 jim
Blockchain 2.0 09:26:45 jim
Digital Signature 09:18:27 jim
30.07.2016
X.501 22:41:56 jim
NAME 22:25:22 jim
Numericoid 22:24:25 jim
Name Form 22:23:23 jim
Cardholder Name 22:02:32 jim
Extended Flags 21:56:59 jim
DESC 21:54:11 jim
ActiveDirectorySchemaChanges 21:37:04 jim
MatchingRule 21:27:11 jim
LDAP_UNDEFINED_TYPE 21:24:01 jim LDAPSchema ==> LDAP Schema
Netlogon attribute 21:24:01 jim LDAPSchema ==> LDAP Schema
Schema Extensions 21:24:01 jim LDAPSchema ==> LDAP Schema
Apple Directory 21:24:00 jim LDAPSchema ==> LDAP Schema
UnderstandingSchemaInOpenDS 21:14:51 jim
UnderstandingDITStructureRules 21:09:46 jim
UnderstandingMatchingRuleUses 21:00:38 jim
Certificate Management Protocol 20:56:43 jim
Guide LDAPSyntax 20:55:25 jim Guide ==> Guide LDAPSyntax
VendorName 20:51:41 jim
SslEnableMutualAuthentication 20:51:31 jim
SerialNumber 20:51:18 jim
SeeAlso 20:50:53 jim
SambaLMPassword 20:50:42 jim
SamAccountName 20:50:14 jim
Reference 20:50:01 jim
Owner 20:49:33 jim
ModifyTimestamp 20:47:46 jim
MacAddress 20:47:33 jim
LoginDisabled 20:47:10 jim
GidNumber 20:46:47 jim
Gender 20:46:29 jim
DirXML-NTAccountName 20:45:43 jim
AltServer 20:45:03 jim
GivenName 20:44:35 jim
OBSOLETE flag 20:43:58 jim
Obsolete 20:39:20 jim
OBSOLETE 20:39:04 jim
Deprecated 20:36:11 jim
LDAPS 20:31:27 jim
RFC 6962 10:42:33 jim
27.07.2016
Biometric data 18:35:31 jim
Behavioral Characteristics 18:06:52 jim
Physiological Characteristics 17:56:28 jim
Microsoft Developer Network 17:33:45 jim
MSDN 17:32:53 jim
PIN 17:30:24 jim
Personal Identification Number 17:28:57 jim
TimBL 15:36:20 jim
Tim Berners-Lee 15:36:02 jim
WWW 15:34:02 jim
University of Michigan 15:32:40 jim
Year 1988 15:27:07 jim
Directory Access Protocol 15:26:24 jim
DAP 15:24:56 jim
Directory Service 15:23:57 jim
Request For Comment 15:22:47 jim
JAVA LDAP SDKs 15:21:13 jim
Which Jane Doe 14:40:14 jim
SDK 13:57:34 jim
GLBA 13:49:51 jim Gramm-Leach-Bliley ==> Gramm-Leach-Bliley Act
Personal Information Protection and Electronic Documents Act 13:45:50 jim
PIPEDA 13:43:38 jim
Homeland Security Presidential Directive 12 13:39:27 jim
HSPD-12 13:37:56 jim
FIPS 201 13:36:44 jim
FIPS 13:34:43 jim
Public data 13:27:11 jim
Family Educational Rights and Privacy Act 12:51:11 jim
FERPA 12:49:11 jim
RFC 4370 12:26:15 jim
Best Practices for LDAP Security 12:25:07 jim
ISO 27000 12:23:34 jim
26.07.2016
SizeLimit 18:26:15 jim
OpenID Connect Profile for SCIM Services 14:50:21 jim
Web Blog_blogentry_260716_1 14:43:22 jim
Enterprise Cloud Subscriber 14:41:08 jim
Community of Interest 14:38:30 jim
Joiner 14:36:05 jim
Human Resource Management 14:35:45 jim
Human Resource Asset 14:35:29 jim
Cloud Service User 14:33:21 jim
JML 14:26:16 jim
Human Resources 14:25:50 jim
HR 14:24:47 jim
HRM 14:22:03 jim
Leavers 13:48:42 jim
Movers 13:48:28 jim
SCIM Use Cases 12:44:18 jim
Custom Authentication Class 12:36:30 jim
Identity Injection Process 12:34:37 jim
User Store 12:32:25 jim
NAM Different Login Methods or Pages 12:32:05 jim
Identity Data Store 12:30:19 jim
JIT 12:02:48 jim
ECS 11:58:48 jim
CSU 11:56:09 jim
Cloud Service Provider 11:53:21 jim
COI 11:49:59 jim
SCIM 2.0 11:44:18 jim
24.07.2016
ControlValue 13:13:16 jim
Criticality 13:12:36 jim
ControlType 13:11:30 jim
1.3.6.1.1.21.4 13:07:35 jim
Aborted Transaction Notice 13:07:05 jim
End Transaction Response 13:05:59 jim
End Transaction Request 13:01:29 jim
1.3.6.1.1.21.2 12:58:07 jim
Transaction Specification Control 12:57:02 jim
RequestName 12:53:28 jim
RequestValue 12:52:48 jim
Extended Request 12:51:06 jim
Start Transaction Request 12:50:16 jim
Start Transaction Response 12:49:35 jim
ResponseValue 12:49:08 jim
ResponseName 12:48:41 jim
Extended Response 12:47:52 jim
1.3.6.1.1.21.1 12:43:31 jim
Lightweight Directory Access Protocol (LDAP) Transactions 12:41:42 jim
RFC 5805 12:37:11 jim
Atomicity 12:31:26 jim
ACID 12:30:05 jim
Durability 12:26:35 jim
Isolation 12:24:28 jim
Consistency 12:22:51 jim
Modify Request 12:19:34 jim
Atomic 12:18:27 jim
Modify Response 12:10:36 jim
Directory Information Tree 12:01:50 jim
Directory Information Base 12:01:02 jim
23.07.2016
Kurt Zeilenga 12:40:38 jim
Isode Limited 12:37:45 jim
Instant messaging 12:36:00 jim
Availability 12:33:52 jim
Presence 12:31:09 jim
Extensible Messaging and Presence Protocol 12:30:18 jim
XMPP 12:28:24 jim
Constrained Application Protocol 12:24:17 jim
O 12:13:47 jim
2.5.6.14 12:12:41 jim
OrganizationalUnit 12:12:00 jim
Ou 12:10:26 jim
Personal Entity 11:47:44 jim
TBD 11:35:16 jim
Main 11:28:47 jim
About 11:25:17 jim
22.07.2016
TelephoneNumberMatch 14:41:12 jim
2.5.4.17 14:39:59 jim
PostalCode 14:39:10 jim
Dmd 14:34:06 jim
DmdName 14:26:57 jim dmdName ==> DmdName
EQUALITY 13:51:55 jim
IntegerMatch 13:47:12 jim
APPROXIMATE 13:36:18 jim
SCIM Schema 13:29:49 jim
Publisher Event Log 13:26:16 jim
Resource Access Control Facility 13:21:53 jim
OpenID Connect Claims 13:20:31 jim
SCIM Sorting 13:19:06 jim
CaseIgnoreSubstringsMatch 13:09:17 jim
CaseIgnoreMatch 13:08:50 jim
BooleanMatch 13:03:18 jim
Case-insensitive 12:57:16 jim
Case-sensitive 12:56:59 jim
Case Sensitivity 12:50:28 jim
SOAPDSMLDriver 12:49:00 jim
Multipurpose Internet Mail Extensions 12:46:32 jim
RFC 6532 12:46:27 jim
RFC 5335 12:45:49 jim
RFC 2231 12:45:02 jim
RFC 2184 12:44:16 jim
RFC 2045 12:42:15 jim
MIME 12:39:36 jim
RFC 5322 12:37:13 jim
RFC 7230 12:30:28 jim
Well-known 12:27:22 jim
RFC 5785 12:25:52 jim
RFC 2817 12:24:33 jim
HTTP Over TLS 12:21:12 jim
RFC 2818 12:18:26 jim
RFC 6125 12:15:57 jim
RFC 4945 12:14:30 jim
JWK Set 12:13:22 jim
LDAPPasswordsFor8.7.3.x 12:06:07 jim
LDAP Query Advanced Examples 12:03:53 jim
LDAP filters Syntax and Choices 12:03:46 jim
JDBC-Driver-Status-Column 12:00:28 jim
Ndsenvlocal 11:56:59 jim
JWT ID 11:56:30 jim
Jti 11:56:14 jim
Iss 11:54:50 jim
Amr 11:54:19 jim
Aud 11:53:48 jim
NDSD_TRY_NMASLOGIN_FIRST 11:53:13 jim
SFSafariViewController 05:14:08 jim
OAuth 2.0 for Native Apps 05:13:11 jim
Chrome Custom Tabs 05:01:27 jim
21.07.2016
CIA 17:00:37 jim
Cryptography Objectives 16:59:22 jim
JWT Data Exchange 16:46:26 jim
JWT Authentication 16:30:24 jim
Authentication cookie 16:14:02 jim
LocalStorage 16:10:53 jim
20.07.2016
Clinical Data 15:30:32 jim
Claims Data 15:26:06 jim
Health Data Set 15:16:55 jim
Patient Data 15:15:28 jim
Electronic Health Record 15:00:05 jim
Personal Health Record 14:57:11 jim
18.07.2016
EDirectory Privileges 14:39:07 jim
17.07.2016
1.3.6.1.1.1.1.22 13:28:40 jim
A-GPS 13:20:23 jim
Assisted GPS 13:20:06 jim
Global Positioning System 13:18:06 jim
MAC Address 13:13:03 jim
Media Access Control Address 13:12:48 jim
Wi-Fi Positioning System 13:09:02 jim
WPS 13:07:01 jim
Wireless Network 13:06:19 jim
Geolocation 12:52:06 jim
GLONASS 12:46:55 jim
GPS 12:45:43 jim
IPA 12:28:08 jim
16.07.2016
Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos 12:19:55 jim
15.07.2016
ISO 7812 13:13:46 jim
IIN 13:11:13 jim
Bank Card Number 13:10:50 jim
MII 13:10:24 jim
PCI DSS 12:53:16 jim
PCI 12:43:17 jim
Payment Card 12:38:54 jim
Payment Card/payment-card-front.jpg 12:36:42 jim Payment Card
PCI DATA 12:25:14 jim
Payment Card Industry Security Standards Council 12:22:31 jim
PCI SSC 12:19:42 jim
Real Risk 12:19:06 jim
RFC 3494 12:00:30 jim
RFC 1778 11:59:21 jim
RFC 1484 11:55:37 jim
14.07.2016
Year 2003 13:33:15 jim
LDAPv2 13:32:57 jim
Lightweight Directory Access Protocol version 2 (LDAPv2) to Historic Status 13:32:23 jim
Bind Authentication Method 13:25:58 jim
RFC 4513 13:15:09 jim
Bind Request 13:04:02 jim
LDAP ModifyRequest Operations 12:59:30 jim
Replace Modification-type 12:55:15 jim
LDAP Modify-Increment Extension 12:53:45 jim
Delete Modification-type 12:52:15 jim
ChangeType 12:51:54 jim
Add Modification-type 12:51:10 jim
1.3.6.1.4.1.1466.115.121.1.41 12:42:41 jim
LDAP Message 12:39:17 jim
LDAP Protocol Mechanisms 12:35:44 jim
ModifyDNRequest 12:24:02 jim
LDIF Example 12:07:05 jim LDIF Examples ==> LDIF Example
NewSuperior 11:55:10 jim
NewRDN 11:54:17 jim
DeleteOldRDN 11:51:24 jim
2.16.840.1.113730.3.1.35 11:48:53 jim
ChangeLogEntry 11:44:32 jim
2.16.840.1.113730.3.2.1 11:43:29 jim
Changes 11:42:50 jim
ChangeNumber 11:32:25 jim
TargetDN 11:27:46 jim
Modrdn 11:05:32 jim Deleteoldrdn ==> DeleteOldRDN
Definition of an Object Class to Hold LDAP Change Records 11:01:00 jim
Draft-good-ldap-changelog 10:57:50 jim
A Schema for Logging the LDAP Protocol 10:45:17 jim
Draft-chu-ldap-logschema-00.txt 10:43:00 jim
Web Blog_blogentry_140716_1 10:34:23 jim
Lightweight Directory Access Protocol (LDAP) Content Synchronization Operation 10:32:53 jim
RFC 4533 10:30:43 jim
13.07.2016
JNDI Utilities Class 18:06:10 jim
Basic JNDI Search with Administration Account 18:05:44 jim
Common JNDI LDAP Methods 18:05:18 jim
Using LDAPS With JNDI 18:04:43 jim
JNDIApis 18:04:05 jim
JNDI Examples 18:02:12 jim
Java Naming and Directory Interface 18:00:15 jim
12.07.2016
Internet 15:54:36 jim
Arpanet 15:54:23 jim
Windows 2000 15:52:44 jim
Year 2011 15:51:23 jim
Year 2010 15:51:19 jim
Year 2007 15:51:15 jim
Year 2006 15:50:51 jim
Year 2004 15:50:47 jim
Year 2000 15:50:42 jim
Year 1999 15:50:37 jim
Year 1997 15:50:33 jim
Year 1996 15:50:29 jim
Year 1993 15:49:59 jim
Year 1992 15:49:54 jim
Year 1991 15:49:50 jim
Year 1990 15:49:21 jim
Year 1989 15:49:17 jim
Year 1986 15:49:13 jim
Year 1984 15:48:44 jim
Year 1982 15:48:39 jim
Year 1973 15:48:35 jim
Year 1969 15:48:29 jim
Year 2014 15:37:40 jim
Year 2013 15:37:35 jim
Year 2009 15:37:30 jim
Year 2008 15:37:22 jim
Year 2005 15:37:08 jim
Year 2001 15:36:56 jim
Year 1998 15:36:43 jim
Year 1883 15:36:35 jim
Year 1981 15:36:26 jim
Year 1976 15:36:14 jim
Year 2016 15:31:00 jim
Year 2017 15:30:25 jim
Year 1995 15:29:30 jim
Year 2015 15:29:10 jim
EU 15:14:08 jim
Regulation 15:13:29 jim
European Union 15:05:39 jim
System Metrics 14:51:30 jim
Business Metrics 14:42:08 jim
External Metrics 14:40:48 jim
Internal Metrics 14:37:37 jim
Notification 14:32:02 jim
Alerting 14:31:21 jim
Anomaly Detection 14:29:57 jim
Dashboard 14:28:22 jim
CEP 14:19:41 jim
Metric Analysis 14:14:22 jim
EventMonitoring 13:56:21 jim
MonitoringDesign 13:53:35 jim
LDAP Monitor 13:52:32 jim
LDAP Metrics 13:48:49 jim
LDAP Monitoring Overview 13:48:24 jim StatisticsGathering ==> LDAP Metrics
LDAPMonitorLogging 13:48:24 jim StatisticsGathering ==> LDAP Metrics
Monitoring 13:35:19 jim
10.07.2016
Student data 13:28:13 jim
Date Form 13:24:36 jim
Expiration Date 13:23:29 jim
Last Name 13:22:05 jim
First Name 13:21:29 jim
PAN 13:14:32 jim
Primary Account Number 13:14:14 jim
Customer data 13:04:43 jim
Employee data 12:56:20 jim
Protected Health Information 12:40:07 jim
Personal data 12:37:53 jim
Compliance 12:29:10 jim Standard Compliance ==> Standard compliance
Regulatory compliance 12:20:27 jim
Web Blog_blogentry_100716_1 12:02:11 jim
Risk-Based Authentication 11:56:53 jim
UEBA 11:51:33 jim
User and Entity Behavior Analytics 11:51:10 jim
Adaptive Risk 11:47:00 jim
Context Based Access Control 11:45:54 jim
Adaptive Policy-based Access Management 11:30:27 jim
09.07.2016
Grant Types 23:21:40 jim !!
PASSWD_CANT_CHANGE 14:37:21 jim
06.07.2016
Web Blog_blogentry_060716_1 13:39:06 jim
Chase Pay 13:34:36 jim
Mobile-Digital Wallets 13:33:39 jim
LoopPay 13:31:03 jim
Google Wallet 13:27:38 jim
Apple Pay 13:26:58 jim
Privacy Enhancing Technologies 11:34:30 jim
RFC 4519 11:27:51 jim
RFC 2798 11:26:54 jim
InetOrgPerson 11:26:18 jim
2.16.840.1.113730.3.2.2 11:17:53 jim
2.16.840.1.113719.1.1.4.1.111 11:15:15 jim
Data Policy 10:43:04 jim
Consent 10:39:07 jim
05.07.2016
Common Object Request Broker Architecture 17:30:11 jim
CORBA 17:29:46 jim
SUSE 17:28:43 jim
COBOL 17:27:37 jim
Borland 17:26:38 jim
Novell INC 13:24:41 jim
Embedded user-agent 12:56:34 jim
Loopback URI Redirection 12:41:12 jim
04.07.2016
My Contacts 22:30:30 jim
Windows 10 22:29:32 jim
Web Blog_blogentry_040716_1 22:04:06 jim
2.16.840.1.113719.1.14.100.31 13:25:01 jim
SubmitEventRequest 13:24:27 jim
Sync and Ignore Subscriber Filter 13:17:35 jim
Notify and Reset Publisher Filter 13:16:36 jim
Novell IDM Driver Filters 13:15:04 jim
DirXML-DriverFilter 13:12:41 jim
2.16.840.1.113719.1.14.4.1.11 13:11:39 jim
Connected Application 12:49:45 jim
Title Case 12:37:15 jim
ConvCase.Java Source Code 12:32:26 jim
2.16.840.1.113719.1.1.4.1.40 12:27:39 jim
2.5.4.23 12:22:21 jim
FacsimileTelephoneNumber 12:21:09 jim
BPPCE 11:53:59 jim IDMCodeSnippets ==> DirXML Code Snippets
IDMDeveloperInfo 11:53:59 jim IDMCodeSnippets ==> DirXML Code Snippets
NationwideInsurance2007 11:53:59 jim IDMCodeSnippets ==> DirXML Code Snippets
DirXML Calling Java Example 11:31:14 jim
Counter 11:19:04 jim
SLAPD 11:17:43 jim
IDM Best Practices 11:17:01 jim
Example code 11:15:05 jim
Source code 11:14:04 jim Source Code ==> Source code
Open Source 11:05:00 jim
Free Software 11:03:01 jim
03.07.2016
OSX.URIScheme 19:01:03 jim
Windows.URIScheme 18:58:39 jim
WindowsPhone.URIScheme 18:57:59 jim
IOS.URIScheme 18:56:52 jim
Android.URIScheme 18:56:15 jim
Moddn 16:17:39 jim
LDIF Files 16:06:11 jim LDIF Change Records And Changetype Specifiers ==> Changetype
LDIF 16:04:50 jim
LDIF Import 16:01:01 jim
LDIF Export 15:59:34 jim
DefinitionBase64Encoding 15:57:57 jim
DefinitionAuditLog 15:57:15 jim
Back-end 15:55:52 jim
02.07.2016
Vendor Relationship Management 13:38:18 jim
Non-person entity 13:28:47 jim
Non-Governmental Entity 13:18:02 jim
Business Entity 13:17:48 jim
Government Entity 13:17:32 jim
Organizational Entity 13:16:33 jim
NGO 13:01:48 jim
Customer Relationship Management 13:00:26 jim
Non-governmental Organization 12:59:12 jim Organizational Entities ==> Organizational Entity
Group 12:57:39 jim
Privacy by Design 12:40:14 jim
Feedback 12:33:46 jim
The Laws of Relationships 12:31:50 jim
Subject Relationship 12:23:35 jim
Protocol 11:41:01 jim
Protocol Extensibility 11:15:08 jim
Use Case Template 02:07:38 jim
RFC 4525 01:52:54 jim
01.07.2016
Data At Rest 14:21:25 jim
OAuth 2.0 Bearer Token Usage 14:20:02 jim
WWW-Authenticate 14:18:28 jim
Authorization Header 14:14:54 jim
PeopleSoft Integrations 14:13:43 jim
HTTP 302 14:12:54 jim
Etag 14:12:09 jim
HTTP Header Field 14:08:25 jim HTTP Header Fields ==> HTTP Header Field
Strict-Transport-Security 14:08:15 jim
HTTP Strict Transport Security 14:07:45 jim
Content-Type 14:06:25 jim
Web Linking 14:05:33 jim
HTTP 401 14:03:59 jim
Accept header 14:00:23 jim
Registration Access Token 13:33:34 jim
OpenID Connect Dynamic Client Registration 13:23:14 jim
Require_request_uri_registration 12:49:59 jim
App-claimed HTTPS URI Redirection 12:43:50 jim
Registration_endpoint 12:40:59 jim
OAuth 2.0 Vulnerabilities 12:30:11 jim
Web Blog_blogentry_180216_1 12:26:12 jim
RFC 1945 12:24:31 jim
HTTP 307 12:21:58 jim
HTTP 303 12:21:40 jim
URL redirection 12:12:19 jim
Hybrid Flow 12:06:28 jim
27.06.2016
API 17:54:09 jim
25.06.2016
Content negotiation 13:31:55 jim
API versioning 13:28:42 jim
EMV Terms 12:12:05 jim
Near Field Communication 12:11:51 jim
Cryptogram 12:01:14 jim
Contactless Chip Card 11:58:32 jim
Contact Chip Card 11:56:49 jim
Chip Card Security Code 11:54:28 jim
Chip Card 11:51:59 jim
Application Authorization Cryptogram 11:42:34 jim
ARQC 11:39:04 jim
AAC 11:36:14 jim
NDSObituaries 11:32:26 jim
Unbind Request 11:27:31 jim
Anonymous bind 11:25:57 jim
23.06.2016
Accountable vs responsible 13:09:24 jim
22.06.2016
JNDI 13:41:21 jim
Verify DNS Records 13:33:10 jim
16.06.2016
2.16.840.1.113719.1.14.4.1.2000 23:15:17 jim
Entitlement Example 19:20:40 jim
RFC 6113 16:41:17 jim
Kerberos Error Codes 15:13:03 jim
Kerberos Pre-Authentication 15:10:15 jim
DONT_REQUIRE_PREAUTH 15:08:53 jim
Role 13:07:52 jim
Entitlement Granting Agent Correlation ID 11:26:48 jim
14.06.2016
Inbound Association Reference Processor 15:32:44 jim
Path_T 13:49:48 jim
LoginIntruderAddress 13:29:50 jim
RegEx 12:10:02 jim
13.06.2016
IDM Vendor Products 16:05:00 jim
Nevis Security Suite 16:03:46 jim
AdNovum 16:01:06 jim
Computer Associates 15:57:03 jim
DirX Access 15:51:52 jim
12.06.2016
RO 16:54:31 jim
OpenID Connect/OpenID Connect Flow.png 16:47:01 jim OpenID Connect General Flow
Resource Owner 16:43:58 jim
RS 16:42:23 jim
Resource Server 16:41:10 jim
OIDC 16:38:56 jim
OP 16:38:32 jim
Identity Provider (IDP) 16:36:23 jim
Why OAuth 2.0 16:07:52 jim
OAuth 2.0/oauth-not-auththenticaiton.jpg 15:53:43 jim Oauth Is Not Authentication
AKA 14:47:29 jim
POS 14:47:07 jim
Point of Sale 14:46:45 jim
Windows Vista 14:36:56 jim
LM hash 14:36:29 jim
Local Security Authority Subsystem Service 14:35:31 jim
Windows NT 3.1 14:33:44 jim
Windows 7 14:24:33 jim
LSASS 14:23:36 jim
Cached and Stored Credentials 14:18:46 jim
Security Support Provider Interface 13:49:33 jim
NTLMv2 13:45:51 jim
Windows Server 13:45:19 jim Windows NT ==> Windows Server NT
Windows Server NT 13:45:19 jim Windows NT ==> Windows Server NT
Windows Server 2000 13:44:56 jim Windows 2000 ==> Windows Server 2000
NTLMv1 13:27:42 jim
NTLM SSP 13:21:14 jim
NTLM 13:20:26 jim
NT LAN Manager 13:19:55 jim
Windows Server 2012 R2 12:56:43 jim
Windows Server 2012 12:55:32 jim
Windows Server 2008 R2 12:55:20 jim
Windows Server 2008 12:50:42 jim
Windows Server 2003 12:50:30 jim
LSA 12:48:22 jim
Local Security Authority 12:48:04 jim
ERROR_TOO_MANY_CONTEXT_IDS 12:44:41 jim Local Security Authority (LSA) ==> Local Security Authority
Microsoft Windows 12:38:29 jim
Windows Client 12:38:21 jim
OS 12:30:30 jim
Operating System 12:30:15 jim
11.06.2016
Generic Security Service Application Program Interface 12:37:59 jim
Simple and Protected GSSAPI Negotiation Mechanism 12:32:56 jim
RPC 12:21:15 jim
Remote Procedure Call 12:20:57 jim
SDP 12:18:48 jim
RFC 4145 12:17:50 jim
Session Description Protocol 12:16:09 jim
RFC 4572 12:13:12 jim
Connection-Oriented Media Transport over the Transport Layer Security (TLS) Protocol in the Session Description Protocol (SDP) 12:12:43 jim
The Simple Public-Key GSS-API Mechanism 12:08:09 jim
A Low Infrastructure Public Key Mechanism Using SPKM 12:06:40 jim
LIPKEY 11:56:34 jim
RFC 2078 11:55:09 jim
SPKM 11:47:17 jim
RFC 5021 11:33:00 jim
RFC 4537 11:32:19 jim
RFC 4120 11:31:12 jim
RFC 1510 11:30:17 jim
The Kerberos Version 5 GSS-API Mechanism 02:40:56 jim
RFC 2847 02:36:24 jim
RFC 2025 02:33:41 jim
RFC 4121 02:32:40 jim
RFC 1964 02:31:38 jim
RFC 4752 02:25:37 jim
RFC 2744 02:23:29 jim
RFC 2743 02:22:29 jim
1.3.6.1.5.5.2 02:14:25 jim
RFC 2478 02:12:20 jim
RFC 4178 02:10:51 jim
SPNEGO 02:08:08 jim
Digest SSP 01:59:19 jim
Negotiate SSP 01:56:23 jim
SSP 01:51:28 jim
Security Support Provider 01:51:06 jim
SSL 01:47:10 jim
Secure Socket Layer 01:46:46 jim
10.06.2016
SSPI 23:51:06 jim Security Support Provider Interface (SPPI) ==> Security Support Provider Interface
Security Support Provider Interface/SSPI-Architecture.png 23:37:41 jim SSPI-Archectecture
Security Group 13:27:32 jim
Distribution Group 13:19:22 jim
Active Directory Group Related Searches 13:13:45 jim
09.06.2016
DSI_ENTRY_FLAGS 15:08:09 jim
DS_CONTAINER_ENTRY 15:05:48 jim
PurgeVector 12:59:34 jim
LocalReceivedUpTo 12:47:52 jim
SynchronizedUpTo 12:45:20 jim
Partition Root Entry 12:29:16 jim
DS_PARTITION_ROOT 12:27:08 jim
2.16.840.1.113719.1.1.4.1.180 12:13:22 jim
EDirectory Background Processes 11:40:14 jim
DRL 11:38:54 jim
Backlinker 11:38:10 jim
08.06.2016
EdirectoryPasswords 18:37:29 jim NovellLoginMethods ==> NDS Login Methods
NDS Login Methods 18:37:29 jim NovellLoginMethods ==> NDS Login Methods
NMAS 18:37:29 jim NovellLoginMethods ==> NDS Login Methods
NCP Primary Authentication Protocol 18:32:20 jim
NDSPassword 18:23:14 jim
Universal Password 18:13:07 jim
DS_ENTRY_NOT_PRESENT 15:33:01 jim
AliasObject 15:16:41 jim
EntryFlags 14:54:54 jim
2.16.840.1.113719.1.27.4.48 14:43:49 jim
06.06.2016
Bash 14:22:30 jim
Bash_login 13:43:00 jim
05.06.2016
RFC 2945 11:25:37 jim
RFC 5054 11:25:05 jim
NSPM Setting Challenge Answers 11:23:49 jim
NsimRequiredQuestions 11:22:12 jim
NsimRandomQuestions 11:19:51 jim
Methods to Set NSPM Challenge-Responses 11:14:34 jim
Salted Challenge Response Authentication Mechanism 11:04:57 jim
NovellS Challenge Response System 11:03:48 jim
Challenge-response 11:02:18 jim
The SRP Authentication and Key Exchange System 10:54:27 jim
TLS-SRP 10:48:35 jim Secure Remote Password (SRP) Protocol for TLS Authentication ==> Using the Secure Remote Password (SRP) Protocol for TLS Authentication
Using the Secure Remote Password (SRP) Protocol for TLS Authentication 10:48:35 jim Secure Remote Password (SRP) Protocol for TLS Authentication ==> Using the Secure Remote Password (SRP) Protocol for TLS Authentication
Secure Remote Password Protocol 10:47:43 jim
PAKE 10:28:51 jim
Password-authenticated Key Agreement 10:28:14 jim
Password-authenticated Key Exchange 10:27:39 jim
04.06.2016
GS2 12:27:37 jim
GS2 Mechanism Family 12:27:13 jim
RFC 5801 12:23:36 jim
SASL Mechanisms 12:20:02 jim
SASL SCRAM Family Mechanisms 11:58:02 jim
RFC 7677 11:53:40 jim
SCRAM 11:52:50 jim
RFC 6238 11:40:56 jim
RFC 4226 11:40:20 jim
RFC 1760 11:39:32 jim
RFC 2289 11:38:55 jim
One-Time Password System 11:32:37 jim
S-KEY One-Time Password System 11:27:54 jim
Transaction Authentication Number 11:25:31 jim
One-time password device tokens 11:24:59 jim
OTP 11:24:37 jim
Cardholder Verification Method 11:23:58 jim
JSON Identity Suite 01:21:29 jim
03.06.2016
TLS is Broken 11:40:02 jim
End-to-End Security 11:30:27 jim
Respect for User Privacy 11:28:40 jim
Visibility and Transparency 11:26:51 jim
Legal TLS Interception 11:17:05 jim
Certificate Pinning 10:57:56 jim
02.06.2016
SCIM Resource 15:43:55 jim
01.06.2016
WhenChanged 11:22:12 jim
NO-USER-MODIFICATION 11:17:17 jim
2.5.18.2 11:01:33 jim
30.05.2016
OITF 11:58:07 jim
TFP 11:47:44 jim
Open Identity Trust Framework 11:36:41 jim
OIX 11:27:24 jim
LDAP Server 11:24:25 jim
2.16.840.1.113719.1.27.4.46 11:17:27 jim
26.05.2016
Group-AD 13:53:49 jim
LDAP Group 13:51:52 jim
25.05.2016
DirXML-Association States 12:34:09 jim
24.05.2016
LDAP Search Filters Using with non-standard Characters 15:25:24 jim
RFC 4522 15:20:22 jim
RFC 4511 15:19:08 jim
Lightweight Directory Access Protocol (LDAP) The Protocol 15:17:57 jim
LDAP filters are defined in the following RFCs 14:48:32 jim
LDAP String Representation of Search Filters 14:42:23 jim
RFC 4515 14:38:20 jim
LDAP SearchFilters 14:36:36 jim
23.05.2016
SCIM Core Resources 14:08:24 jim
SCIM Core Schema 14:03:25 jim
SCIM EnterpriseUser 13:53:05 jim
WriteOnly 13:45:51 jim
Immutable 13:45:04 jim
Mutability 13:43:31 jim
ReadWrite 13:43:14 jim
ReadOnly 13:41:26 jim
DS_READ_ONLY_ATTR 13:40:25 jim
RFC 7232 13:33:20 jim
SCIM Core Attributes 13:01:13 jim
SCIM Extended Attributes 12:57:01 jim
Example JSON Representation for SCIM Resource Schema 12:45:51 jim
SCIM Schema endpoint 12:44:54 jim
SCIM ServiceProviderConfig endpoint 12:43:20 jim
SCIM Discovery Mechanisms 12:40:44 jim
22.05.2016
Edirectory Anomalies 13:30:18 jim
Boolean 13:29:13 jim
Integer 13:27:51 jim
Binary 13:26:11 jim
Decimal 13:25:04 jim
String 13:24:23 jim
SCIM Object 12:50:00 jim
SCIM Retrieving a Known Resource 12:24:03 jim
SCIM Service Provider Configuration Endpoints 12:20:09 jim
SCIM ResourceTypes endpoint 12:13:04 jim
SCIM User 11:56:49 jim
SCIM Filtering 11:45:29 jim
SCIM Query parameters 11:43:44 jim
SCIM Update Request 04:38:08 jim
SCIM Read Request 04:35:04 jim
SCIM Delete Request 04:34:07 jim
SCIM Bulk Request 04:30:28 jim
Heartbleed 04:28:29 jim
WebFinger 04:25:54 jim
Security Token Service 04:25:15 jim
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 04:24:48 jim
OAuth 04:23:38 jim
App-declared Custom URI Scheme Redirection 04:21:16 jim
21.05.2016
HTTP TRACE 22:56:44 jim
HTTP OPTIONS 22:55:47 jim
HTTP CONNECT 22:54:53 jim
HTTP HEAD 22:53:31 jim
Idempotent 22:51:36 jim
HTTP DELETE 22:33:23 jim
HTTP PUT 22:31:11 jim
HTTP GET 22:21:39 jim
SCIM Pagination 16:41:54 jim
SCIM Search Request 16:15:09 jim
20.05.2016
SCIM Resource/SCIM Resource Model.png 22:38:20 jim SCIM Resource Model
RFC 6711 19:07:52 jim
An IANA Registry for Level of Assurance (LoA) Profiles 19:05:44 jim
Record Protocol 11:55:11 jim
Connection-less Lightweight Directory Access Protocol 11:54:40 jim
Endian Ordering 11:53:36 jim
Little-Endian 11:53:11 jim
Big-Endian 11:52:55 jim
ObjectGUID 11:50:22 jim
Wireshark 11:38:49 jim
Server Message Block 11:33:26 jim
SMB 11:28:25 jim
TCP 11:26:28 jim
IP 11:25:06 jim
RFC 768 11:09:29 jim
UDP 11:06:58 jim
1.3.6.1.4.1.7165.2.1.24 10:46:21 jim
Samba 10:40:34 jim
Netlogon service 09:44:03 jim
How Domain Controllers Are Located in Windows 09:43:04 jim
RFC 2052 09:36:11 jim
DNS SRV Records 09:35:37 jim
19.05.2016
CRUD 20:09:39 jim
RFC 1798 17:26:49 jim
RFC 3352 17:11:11 jim
CLDAP 17:02:31 jim
LDAP Protocol dependencies 16:59:56 jim
Web Blog_blogentry_190516_1 16:55:32 jim
Implementing Universal Password 12:46:12 jim
NspmPasswordPolicy 12:43:35 jim
Universal Password Policy Assignment 12:41:10 jim
17.05.2016
OpenSSL Commands 11:08:57 jim
16.05.2016
EDirectory Configuration 15:11:55 jim
Directory System Agent 12:29:14 jim
DIT 12:22:24 jim
DS_SINGLE_VALUED_ATTR 11:59:47 jim
DS_OPERATIONAL 11:59:17 jim
LocalEntryID 11:57:43 jim
2.16.840.1.113719.1.27.4.50 11:53:12 jim
TAO Files 11:36:18 jim
15.05.2016
Web Blog_blogentry_150516_1 16:25:40 jim
Patient 16:11:09 jim
Consent Revocation 16:09:12 jim
Consent Standards 16:02:22 jim
Default Profile Claims 14:32:33 jim
1.3.6.1.4.1.8876.2.2.5 14:30:54 jim
DicPersonInfo 14:29:27 jim
1.3.6.1.4.1.8876.2.1.10 14:24:13 jim
UPPERBOUND 14:19:26 jim
X-NDS_UPPER_BOUND 14:18:09 jim
Casual Name 14:09:32 jim
Nickname 14:08:55 jim
1.3.6.1.4.1.694.2.1.112 14:05:05 jim
Middle_name 14:04:12 jim
Family_name 14:03:12 jim
Directory String 14:01:11 jim
Directory (Case Ignore) String 14:00:29 jim
NickName 13:57:38 jim
OpenID Connect Standard Claims 13:55:28 jim Nickname ==> NickName
PreferredName 13:49:19 jim
Uid 13:43:52 jim
Preferred_username 13:43:03 jim
Username 13:42:05 jim
Given_name 13:41:17 jim
Middle Name 13:41:09 jim
Shorthand Name 13:40:18 jim
Iat 13:15:42 jim
Prn 13:10:24 jim
Reserved Claim Name 13:05:50 jim
Confirmation Claim 13:02:00 jim
Nbf 13:00:06 jim
Refresh Token 12:18:38 jim
11.05.2016
Edirectory Administrative Password Changes 18:39:50 jim
2.16.840.1.113719.1.39.43.4.106 18:03:39 jim
NspmAdminsDoNotExpirePassword 18:02:34 jim
Certificate Revocation List 11:20:50 jim
CRLSets 11:19:39 jim
OCSP Stapling 11:08:59 jim
CRL 10:54:20 jim
08.05.2016
JSON Web Token Claims Registry 14:18:10 jim
Cnf 14:04:23 jim
JWT Confirmation Methods 14:01:18 jim
Private Claim Names 13:14:29 jim
07.05.2016
Temporarily_unavailable 13:38:28 jim
Server_error 13:37:14 jim
Invalid_scope 13:35:44 jim
Unsupported_response_type 13:33:53 jim
Access_denied 13:31:34 jim
Registration_not_supported 13:26:48 jim
Request_uri_not_supported 13:20:22 jim
Request_not_supported 13:12:41 jim
Invalid_request_object 13:00:14 jim
Invalid_request_uri 12:56:47 jim
Session_selection_required 12:56:36 jim
Unsupported_token_type 12:45:20 jim
Insufficient_scope 12:41:04 jim
Invalid_token 12:38:25 jim
Invalid_request 12:30:58 jim
Unauthorized_client 12:28:46 jim
Login_required 12:16:19 jim
Account_selection_required 12:11:02 jim