These are all of the changes made to these pages. A much shorter list is available in RecentChanges.

16.11.2017
HTTP 101 14:30:16 jim
HTTP Status Code 14:26:06 jim
Informational 14:22:20 jim
URL redirection 14:08:30 jim
Openid-configuration 14:02:53 jim
API Economy 13:19:27 jim
TLS 1.3 12:34:59 jim
OAuth 2.0 Authorization Server Metadata 12:13:16 jim
Resource Owner Password Credentials Grant 00:26:14 jim
Resource Owner Password Credentials Grant/OAuth2 — Resource Owner Password Credential Grant.jpg 00:24:45 jim Resource Owner Password Credential Grant
Grant Types 00:17:19 jim
15.11.2017
Web Host Metadata 14:40:29 jim
Host-meta 14:32:24 jim
OpenID Provider Issuer Discovery 14:27:06 jim
Well-Known URIs 14:06:47 jim
Well-known 14:04:20 jim
JSON Resource Descriptor 13:40:34 jim
WebFinger 13:29:01 jim
Web Linking 13:13:36 jim
Link Relation Types 13:05:15 jim
QUIC 02:30:31 jim
Quick UDP Internet Connections 02:29:16 jim
User Datagram Protocol 02:22:24 jim
14.11.2017
Eran Hammer 14:25:49 jim
OAuth 2.0 Vulnerabilities 14:23:40 jim
RFC 5849 14:06:35 jim
RFC 6749 14:05:59 jim
OAuth 14:03:37 jim
Access Proxy 13:43:14 jim
WEB Access Management 13:41:03 jim
Access Control 13:39:31 jim
Access Control Service 13:37:36 jim
Access Control Engine 13:35:03 jim
RFC 4949 13:32:22 jim
Verification 13:26:14 jim
Authentication 13:20:04 jim
Diffie-Hellman key-exchange 12:47:25 jim
OAuth Security Topics 12:44:32 jim
OAuth 2.0 for Native Apps 12:42:04 jim
12.11.2017
Client_id 20:41:38 jim
Creating an OAuth 2.0 Client Application 20:35:17 jim
OAuth Client 20:25:48 jim
Identity Assurance Level 20:09:11 jim
Open Trust Taxonomy for OAuth2 20:00:48 jim
Trust Elevation 19:58:23 jim
User-Managed Access 19:49:28 jim
RqP 19:29:39 jim
Requesting Party 19:28:25 jim
JSON Web Algorithms 14:49:28 jim
JSON Object Signing and Encryption Registry 14:44:23 jim
JSON Web Key Types 14:43:45 jim
JWK Set 14:42:30 jim
Jwks_uri 14:25:12 jim
JWK 14:08:57 jim
OAuth Dynamic Client Registration Metadata 14:06:48 jim
Jwks 14:05:12 jim
Identity Token 14:01:07 jim
11.11.2017
Episodic Learning 14:47:03 jim
Learning 14:40:09 jim
Artificial Neuron 14:25:11 jim
Year 1959 14:22:58 jim
Machine Learning 14:22:15 jim
Neuron 14:21:44 jim
Stimulus-Response 14:19:08 jim
Learn 14:11:54 jim
Artificial Intelligence 14:03:32 jim
Problem Solving 13:56:32 jim
Linguistic 13:55:32 jim
Perception 13:54:05 jim
Reasoning 13:47:21 jim
09.11.2017
Data Controller 14:40:20 jim
Data Processor 14:37:50 jim
General Data Protection Regulation 14:13:02 jim
Personal data 12:39:55 jim
08.11.2017
Mutual TLS Sender Constrained Resources Access 14:10:09 jim
Mutual TLS for OAuth Client Authentication 14:00:17 jim
Digital certificate request 13:58:14 jim
How SSL-TLS Works 13:55:57 jim
Mutual TLS Profiles for OAuth Clients 13:34:10 jim
OAuth Token Endpoint Authentication Methods 13:28:01 jim
OAuth Parameters Registry 13:16:54 jim
Certificate-based Authentication 12:59:30 jim
Non-Repudiation 12:57:25 jim
Certificate Chain 12:53:45 jim
07.11.2017
Virtual Integrated Network Service 18:06:00 jim
StreetTalk 18:04:45 jim
IEEE 802.11 17:51:22 jim
Ethernet 17:46:07 jim
XNS 17:34:47 jim
Xerox Network Systems 17:33:06 jim
VINES 17:22:24 jim
Banyan VINES 17:19:21 jim
VINES Internetwork Protocol 17:14:32 jim
Directory Service 17:11:27 jim
Linked Data 13:18:22 jim
JSON for Linking Data 13:18:05 jim
Hypermedia As The Engine Of Application State 13:06:46 jim
06.11.2017
OpenID Connect Discovery 14:15:19 jim
04.11.2017
Schema Extensions 13:37:50 jim
03.11.2017
Determining the FDN 16:40:49 jim
02.11.2017
Ian Glazer 21:24:23 jim
Google Remote Procedure Call 18:54:03 jim
Edge Proxy 14:18:22 jim
Web Blog_blogentry_021117_1 14:16:12 jim
API-Gateway 14:11:11 jim
30.10.2017
Certificate Revocation 09:46:26 jim
DNS Certification Authority Authorization 09:42:40 jim
RR 09:34:59 jim
DNS Resource Records 09:34:36 jim
RFC 6844 09:30:17 jim
CAA 09:28:18 jim
User-agent 09:21:23 jim
HPKP 09:19:44 jim
Public Key Pinning Extension for HTTP 09:19:20 jim
Certificate Transparency 09:17:48 jim
29.10.2017
JSON-LD Examples 15:33:38 jim
SAML V2.0 08:22:04 jim
28.10.2017
JAN 19:35:37 jim
Japanese Article Number 19:35:18 jim
Global Trade Item Number 19:34:08 jim
International Article Number 19:32:46 jim
ISO 10957 19:31:51 jim
ISMN 19:30:44 jim
International Standard Music Number 19:30:24 jim
ISSN 19:27:25 jim
International Standard Serial Number 19:27:02 jim
European Article Number 19:23:42 jim
International Standard Book Number 19:14:26 jim
GS1 Company Prefix 19:10:19 jim ISBNs ==> ISBN
ISBN 19:10:19 jim ISBNs ==> ISBN
Manufacturer Code 19:08:26 jim
Product Code 19:08:10 jim GS1 Prefix ==> GS1 Company Prefix
Check Digit 19:01:49 jim
EAN 18:44:08 jim
GS1 18:43:22 jim
Universal Product Code 18:40:57 jim
Authenticator 18:05:48 jim
Google Group 14:38:32 jim
27.10.2017
Universal Links 11:59:06 jim
AppAuth 11:48:05 jim
IOS.URIScheme 11:45:33 jim
Private-Use URI Scheme Redirection 11:40:03 jim
Claimed Https Scheme URI Redirection 11:39:52 jim
Loopback Interface Redirection 11:39:34 jim
OAuth 2.0 Client Registration 11:39:20 jim
Private URI Scheme 11:21:38 jim
Custom URI scheme 10:58:39 jim
RFC 7595 10:56:46 jim
Web Blog_blogentry_261215_1 10:23:02 jim
SFSafariViewController 10:22:30 jim
OpenID Connect Use Cases 10:21:21 jim
OAuth Public Client 10:20:47 jim
Custom URI scheme pattern 10:13:08 jim
URI Fragment Identifiers 09:30:18 jim
Same-Document Reference 09:26:27 jim
Absolute URI 09:09:24 jim
PwdProperties 09:09:11 jim
Group Policy 09:06:48 jim
GPO 09:06:20 jim
Cleartext 08:56:56 jim
Plaintext 08:56:33 jim
URI Schemes 08:48:14 jim
Password Storage Scheme 08:41:49 jim
RC4 08:39:27 jim
Authentication Password Syntax 08:31:58 jim
SupportedAuthPasswordSchemes 08:28:29 jim
AuthPasswordSyntax 08:22:13 jim
AuthPasswordObject 08:17:36 jim
AuthPassword 08:14:12 jim authPassword ==> AuthPassword
RFC 3112 08:13:50 jim
GroupOfEntries 08:03:39 jim
LDAP Group 08:00:46 jim
GroupOfNames 07:57:28 jim
26.10.2017
Media Access Control 13:40:20 jim
Data-link Layer 13:33:04 jim
LLC 13:24:44 jim
Logical Link Control 13:24:32 jim
Bluetooth 13:22:11 jim
Media Access Control Address 13:21:06 jim
IEEE 802.3 13:19:38 jim
IEEE 802 13:18:50 jim
IEEE 802.15.1 13:17:54 jim
Certificate Pinning 12:52:51 jim
IMT-Advanced 12:50:16 jim
3rd Generation Partnership Project 12:48:25 jim WiFi ==> Wi-Fi
Wi-Fi 12:48:25 jim WiFi ==> Wi-Fi
General Packet Radio Service 12:42:29 jim
3GPP 12:41:10 jim
ETSI 12:40:48 jim
European Telecommunications Standards Institute 12:40:27 jim
5G-ENSURE 12:33:52 jim
5G 12:33:12 jim
LTE 12:28:12 jim
Long Term Evolution 12:27:57 jim
International Telecommunication Union 12:25:46 jim
ITU Radiocommunication Sector 12:18:37 jim
ITU-R 12:17:39 jim
4G 12:14:08 jim
Web Blog_blogentry_261017_1 12:04:06 jim
Responsive Organizations 11:46:27 jim
15.10.2017
Hyperledger Indy 10:37:41 jim
Sovrin 10:22:20 jim
Provenance 10:14:52 jim
JSON-LD 09:49:56 jim
Inspector-verifier 09:46:48 jim
Holder 09:44:37 jim
Verifiable Claims 09:38:25 jim
Credential 09:05:47 jim
Identifier 09:00:05 jim
14.10.2017
LargeInteger 09:23:41 jim
DirXML Code Snippets 09:23:08 jim
Microsoft TIME 09:22:28 jim
FILETIME 09:21:30 jim
Year 09:13:07 jim
Leap year 09:12:05 jim
Day 09:06:15 jim
Minute 08:59:11 jim
Seconds 08:53:36 jim
Coordinated Universal Time 08:49:45 jim
UTC 08:48:53 jim
DateTime 08:46:31 jim
Week 08:34:19 jim
ISO 8601 08:32:16 jim
Month 08:26:42 jim
Calendar 08:25:10 jim Months ==> Month
Year 1952 08:14:33 jim
13.10.2017
PADME 11:34:27 jim
Policy Access Decision Management Engine 11:33:56 jim
Policy Based Management System 11:32:03 jim
Istio 11:29:02 jim
SPIFFE 11:17:52 jim
Secure Production Identity Framework For Everyone 11:17:20 jim
Open Policy Agent 11:10:52 jim
OPA 11:08:31 jim
Threat Model 09:21:02 jim
Risk Assessment 09:18:22 jim
Certificate Validation Tools 08:54:01 jim
12.10.2017
SPARQL 13:23:11 jim
GCP Cloud VPN 08:41:08 jim
Web Blog_blogentry_121017_1 08:39:39 jim
Google Cloud Security 08:38:25 jim
GRPC 08:33:14 jim
11.10.2017
VR 16:02:54 jim
AR 16:02:38 jim
Virtual Reality 16:02:15 jim
Augmented Reality 16:00:40 jim
Web Blog_blogentry_111017_1 15:55:51 jim
Web Hypertext Application Technology Working Group 09:30:58 jim
Document Object Model 09:27:41 jim
XMLHttpRequest 09:27:09 jim
Single-Page Application 09:26:45 jim
SPA 09:26:21 jim
AJAX 09:25:50 jim
WC3 09:25:22 jim
WHATWG 09:24:04 jim
DOM 09:19:55 jim
OAuth 2.0 Protocol Flows 08:53:37 jim
10.10.2017
Web Blog_blogentry_101017_1 18:43:20 jim
09.10.2017
PCT 18:17:26 jim
Digital Subject 17:55:50 jim
Subject Relationship 17:52:53 jim
OAuth 2.0 Actors 17:50:13 jim
07.10.2017
BCP 212 22:41:27 jim
RFC 8252 22:38:51 jim
Web Blog_blogentry_071017_1 22:28:49 jim
Trust 09:01:12 jim
Security 08:46:04 jim
Relationship 08:33:40 jim
Faythe 08:14:52 jim
Key Deletion 08:12:45 jim
Crypto-shredding 08:12:16 jim
06.10.2017
HAL 10:34:51 jim
JSON Hypertext Application Language 10:34:29 jim Hypertext Application Language ==> JSON Hypertext Application Language
05.10.2017
BeyondCorp 13:30:08 jim
Trust Tier 13:13:57 jim
Resource Inventory Service 13:07:35 jim
Device Inventory Service 12:55:07 jim
HostServer 12:52:43 jim hostServer ==> HostServer
Year 1987 10:47:28 jim
Perl 10:40:19 jim
NMAS Get Password Request 10:38:28 jim
Universal Password Policy Definitions 10:31:00 jim
What To Do About Passwords 10:30:04 jim
FreeRADIUS Password Request 10:27:44 jim
Remote Authentication Dial-In User Service 10:26:03 jim
RFC 2058 10:17:36 jim
RADIUS 10:10:24 jim
Identity Aware Proxy 10:09:00 jim
Operation Aurora 09:59:40 jim
Web Blog_blogentry_051017_1 09:46:31 jim
04.10.2017
Best Practices For Unique Identifiers 13:37:28 jim
Jspwiki.policy 12:38:28 jim
JSPWiki Permission 12:36:48 jim
Using User Attribute Values for Tomcat Roles 12:21:33 jim
WIKI-Security Policy 12:09:58 jim
WIKI-ACLs 11:58:25 jim
WIKI-Roles 11:54:40 jim
JSPWiki Roles and Groups 11:41:56 jim
Policy Administration Point 09:09:01 jim
Access Control Models 09:01:24 jim
Adaptive Policy-based Access Management 08:55:01 jim
Dynamic Authorization Management 08:53:49 jim
XACML 08:52:54 jim
Policy Information Block 08:38:49 jim Policy Information Blocks ==> Policy Information Block
PIB 08:38:37 jim
Policy Decision Point 08:15:30 jim
PRP 08:03:32 jim
Policy Retrieval Point 08:03:17 jim
Environment 07:49:07 jim
Resource Action 07:42:56 jim
RFC 2904 07:36:57 jim
03.10.2017
Policy Based Management System/XACML_Architecture_&_Flow.png 21:56:06 jim Policy Based Access Management
Common Active Directory Bind Errors 14:25:41 jim
Countering the Financing of Terrorism 11:00:55 jim
CFT 11:00:41 jim CFT) ==> CFT
Electronic Identity Verification 10:56:46 jim
EIDV 10:51:48 jim
Web Blog_blogentry_031017_1 10:48:41 jim
Iss 09:02:08 jim
Access Token 08:59:32 jim
02.10.2017
Active Directory and Passwords 19:49:49 jim
Spyware 11:47:39 jim
EvilRegime 11:47:19 jim
Web Blog_blogentry_021017_1 11:46:08 jim
22.09.2017
Sovrin Steward 13:48:58 jim
Sovrin Foundation 13:34:52 jim
20.09.2017
Web Blog_blogentry_200917_1 09:09:08 jim
BCP 9 09:06:58 jim
RFC 6410 09:04:49 jim
RFC 2026 09:03:50 jim
FYI 09:02:22 jim
RFC 8174 09:00:21 jim
BCP 14 08:57:32 jim
RFC 2119 08:55:42 jim
Same-site Cookies 08:46:49 jim
CXRF 08:39:58 jim
Cross-site request forgery 08:39:28 jim
19.09.2017
OAuth 2.0 09:47:44 jim
Wendy 09:41:51 jim
Walter 09:40:44 jim
Trent 09:40:23 jim
Sybil 09:39:36 jim
Victor 09:38:56 jim
Peggy 09:38:07 jim
Oscar 09:37:11 jim
Craig 09:35:24 jim
Mallory 09:35:06 jim
Eve 09:34:08 jim
Bob 09:33:10 jim
Alice 09:32:51 jim
Alice And Bob 09:32:20 jim
Resource Server 09:31:21 jim
Authorization Server 09:29:42 jim
Resource Owner 09:23:51 jim
Actor 09:22:48 jim
14.09.2017
Security Support Provider Interface 10:15:01 jim
Decentralized Identifier 09:33:22 jim
LDAP_SERVER_NOTIFICATION_OID 08:33:30 jim
LDAP Extensions and Controls Listing 08:25:21 jim
13.09.2017
Reputation System 15:01:37 jim
12.09.2017
Data Ownership 10:34:36 jim
11.09.2017
Card Issuer 20:12:38 jim
Payment Initiation Service Provider 20:10:51 jim
Account Servicing Payment Service Provider 20:07:44 jim
07.09.2017
Front-channel communication 08:53:52 jim
OpenID Connect Session Management 08:48:45 jim
OpenID.FrontChannel 08:45:58 jim
OpenID.BackChannel 08:45:30 jim
OpenID.Session 08:44:58 jim
06.09.2017
Account-Based Marketing 11:23:40 jim
Web Blog_blogentry_060917_1 11:22:31 jim
31.08.2017
Four-Party Credit Card System 09:01:28 jim
Card Not Present 08:50:19 jim
CNP 08:43:51 jim
28.08.2017
LeftMenu 10:27:32 jim
About 10:26:55 jim
Main 10:25:39 jim
REST Profile of XACML 10:14:15 jim
Web Blog_blogentry_231215_1 10:01:27 jim
Authorization 09:59:39 jim
AllAuthenticatedUsers 09:23:59 jim
AllUsers 09:23:22 jim
GCP IAM Policy 09:22:16 jim
GCP Identity 09:16:19 jim
Group 09:07:18 jim
Google Account 09:00:58 jim
27.08.2017
GCP Domain 20:08:19 jim GCP Cloud Identity Domain ==> GCP Domain
GCP Resource 20:07:09 jim
Google Cloud IAM 20:01:38 jim
GCP Bucket 19:45:43 jim
GCP Role 19:30:37 jim
Service Account 19:25:09 jim
25.08.2017
Rinse and Repeat 13:02:43 jim
Identity Management Architecture 12:49:01 jim
IMA Interoperability Framework 12:48:27 jim
IMA Policies 12:46:35 jim IMAPolicies ==> IMA Policies
IMA Data Architecture 12:45:30 jim IMADataArchitecture ==> IMA Data Architecture
IMA Technical Reference Architecture 12:42:35 jim IMATechnicalReferenceArchitecture ==> IMA Technical Reference Architecture
Technical Positions Statements 12:38:40 jim TechnicalPositionsStatements ==> Technical Positions Statements
24.08.2017
Second Preimage Resistance 08:35:41 jim
Preimage Resistance 08:35:08 jim
Collision Resistance 08:34:23 jim
Privacy Considerations Distributed Ledger Technology 07:33:26 jim
Web Blog_blogentry_240817_1 07:26:41 jim
23.08.2017
Google App Engine 16:02:07 jim
21.08.2017
Session Affinity 12:14:14 jim
Connection Draining 12:10:39 jim
Web Blog_blogentry_210817_1 12:05:34 jim
GCP Networking Products 10:04:02 jim
GCP Virtual Private Cloud 10:02:54 jim
VPC 09:59:48 jim
Invalid_scope 08:08:55 jim
OAuth Error 08:03:50 jim
Invalid_grant 08:02:58 jim
20.08.2017
NIST.SP.800-53 10:13:25 jim
NIST Special Publication 10:08:31 jim
OAuth 2.0 NOT an Authentication protocol 09:39:20 jim
OpenID Connect Back-Channel Logout 09:10:19 jim
OpenID Connect Client 08:46:26 jim
OpenID Connect 08:45:01 jim
19.08.2017
G-Suite User 16:42:40 jim
G-Suite Group 16:42:19 jim
G-Suite Domain 16:41:50 jim
G-Suite 16:40:59 jim
17.08.2017
Access Complexity 09:48:52 jim
Attack Effort 09:48:26 jim
Advanced Local Procedure Call 09:40:14 jim
ALPC 09:38:50 jim
Local Procedure Call 09:35:12 jim
LPC 09:31:33 jim
Local Security Authority 09:28:46 jim
Security Identifier 09:19:09 jim
Relative ID 09:12:52 jim
RID 09:08:17 jim
Golden Ticket 09:03:19 jim
16.08.2017
Analytics 19:32:14 jim
Metric Analysis 19:31:29 jim
Gigabyte 19:27:46 jim
Terabyte 19:25:45 jim
PB 19:24:54 jim
Petabyte 19:24:33 jim Terabytes ==> Terabyte
TB 19:24:33 jim Terabytes ==> Terabyte
BigQuery 19:21:05 jim
Google Cloud Platform 19:10:01 jim
GCP Multi-Regional 19:07:05 jim
GCP Location 19:03:24 jim
GCP Zonal 19:00:54 jim
GCP Storage Classes 18:54:54 jim
GCP Cloud Load Balancing 18:52:10 jim
GCP Regional 18:51:50 jim Google Regional ==> GCP Regional
Google Cloud Interconnect 18:35:59 jim
Google Edge Points of Presence 18:23:28 jim
Google Global Cache 18:15:24 jim
Google Data Centers 18:14:58 jim
Google Network Infrastructure 18:07:52 jim
Edge-Node 17:57:04 jim
HBase 11:14:20 jim
GCP Storage Products 11:07:49 jim
Relational Database Management System 11:05:11 jim
RDBMS 10:57:55 jim
15.08.2017
EDirectory 9.0.2.1 (40004.44) 20:23:41 jim
GCP Cloud CDN 10:37:40 jim
Google Cloud DNS 10:32:39 jim
ScaleFT 09:58:45 jim
Google Persistent Disk 09:20:17 jim
Google Cloud DataStore 09:16:40 jim
NoSQL 09:14:16 jim
BigTable 09:12:37 jim
Google Cloud SQL 09:09:50 jim
Google Drive 09:03:50 jim
GCP Compute Products 08:41:21 jim
Google Cloud Storage 08:39:10 jim
Web Blog_blogentry_150817_1 08:33:19 jim
Object storage 08:25:00 jim
E-residency 08:11:42 jim
PayPal 08:11:28 jim
14.08.2017
Digital Identity 11:14:02 jim
BFT 10:25:29 jim
Byzantine Fault Tolerance 10:25:10 jim
Two Generals Problem 10:21:26 jim
Blockchain 10:05:54 jim
Distributed Consensus 10:04:53 jim
Fair Information Practices 10:03:01 jim
Create The Vision 10:02:16 jim
Open Standard 09:46:00 jim
JLINC 09:44:36 jim
American National Standards Institute 09:42:27 jim
Stellar Network 09:41:49 jim
Stellar Ledger 09:40:55 jim
Stellar Consensus Protocol 09:39:42 jim
Consensus 09:37:00 jim
Our Approach 09:34:11 jim
Consent 09:29:40 jim
We 09:28:55 jim
ContactUs 09:25:34 jim
Informed Consent 09:14:19 jim
Consistency 08:42:38 jim
13.08.2017
GCP ACL 11:08:22 jim
Durability 10:33:24 jim
12.08.2017
Open Banking Security Profile 22:01:28 jim
Open Banking 21:57:48 jim
GCP Project Owner 11:17:07 jim
Google Cloud Project 11:16:31 jim
GCP Project Creator 11:16:16 jim
GCP Permission 10:58:37 jim
GCP Organizational Viewer 10:35:54 jim
G-Suite Super Admin 10:23:05 jim
GCP Organizational Admin 10:11:06 jim
What is missing in OAuth 2.0 09:16:59 jim
InCommon 09:11:23 jim
Circle of Trust 09:09:57 jim
IT Infrastructure Library 09:08:57 jim
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework 09:07:34 jim
IMA Governance Framework And Organizational Context 09:06:22 jim
The OAuth 2.0 Authorization Framework 09:05:51 jim
Resource Description Framework 09:05:07 jim
Universal Authentication Framework 09:04:10 jim
Mobile Security Framework 09:02:37 jim
Open Identity Trust Framework 08:56:06 jim
HTTP Authentication Framework 08:54:34 jim
Identity Ecosystem Framework 08:52:24 jim
Respect Trust Framework 08:50:46 jim
.NET 08:48:49 jim
Geneva Framework 08:47:52 jim
IDSA Integration Framework 08:46:20 jim
Implementation 08:45:05 jim
Architecture 08:44:50 jim
Design 08:44:35 jim
Model 08:20:32 jim
Trust Framework 08:18:54 jim
Framework 08:16:45 jim
Software Architecture Model 07:57:01 jim
Application Shell Architecture 07:55:45 jim
Best Practices 07:53:23 jim
11.08.2017
Kubernetes 11:53:24 jim
Google Container Engine 11:49:11 jim
Container 11:30:24 jim
Google Coldline 10:36:43 jim
Google Nearline 10:35:39 jim
Data Store Service 10:32:04 jim
Elasticity 09:21:13 jim
SaaS 09:00:25 jim
Infrastructure as a Service 09:00:12 jim
Identity as a Service 08:59:52 jim
Identity Relationship Management 08:59:36 jim
Cloud Services Model 08:59:05 jim
Azure 08:58:49 jim
Authentication Challenges 08:58:32 jim
Software as a Service 08:58:08 jim Software as a service ==> Software as a Service
PaaS 08:57:18 jim
Platform as a Service 08:55:26 jim Platform as a service ==> Platform as a Service
Google Compute Engine 08:27:41 jim
10.08.2017
IAP 12:32:39 jim
Gsutil 09:11:06 jim
Gcloud 09:09:57 jim
Google Cloud SDK 09:02:49 jim
Microservice 08:47:59 jim
Polyglot 08:44:26 jim
Atomicity 07:46:21 jim
09.08.2017
Interface Description Language 19:50:16 jim
Distributed Computing Environment 19:48:31 jim
Isolation 19:39:32 jim
Law of Consistent Experience Across Contexts 19:33:44 jim
Single Responsibility Principle 19:25:23 jim
Google Cloud Client Libraries 14:42:14 jim
Google API Explorer 14:36:24 jim
Google Cloud Shell 14:29:09 jim
Role 13:51:56 jim
GCP 13:36:07 jim
Google Cloud Resource Manager API 13:33:02 jim
Google Cloud Platform Console 13:30:56 jim
Cloud computing 13:30:24 jim
Computing Service 09:21:54 jim
Computing 09:21:18 jim
Data Store 09:10:02 jim
IBM 701 08:24:06 jim
Web Blog_blogentry_090817_1 08:19:50 jim
08.08.2017
Tensors 14:23:32 jim
TensorFlow 13:57:38 jim
Attribute Value Assertion 10:49:44 jim
LDAP URL Extension 10:40:47 jim
AdministrativeRole 10:39:17 jim
2.5.18.5 10:38:48 jim
LDAP Administrative Role 10:38:20 jim
LDAP Schema Element Type 10:27:49 jim
LDAP Object Identifier Descriptors 10:19:25 jim
OID 10:11:43 jim
Internet Assigned Numbers Authority (IANA) Considerations for the Lightweight Directory Access Protocol (LDAP) 10:03:49 jim
Lightweight Directory Access Protocol (LDAP) Parameters 10:01:02 jim
LDAP Descriptor 09:48:52 jim
Attribute-Names 09:42:46 jim
AttributeTypes 09:36:28 jim
TypesOnly Flag 09:34:08 jim
Glossary Of LDAP And Directory Terminology 09:31:54 jim
AttributeSelection 09:28:18 jim
DESC 09:13:24 jim
Security Information and Event Management 09:07:36 jim
Security Event Manager (SEM) 09:04:27 jim
Secure Hash Algorithm 08:50:10 jim
SHA-224 08:49:05 jim
U-Prove 08:38:27 jim
07.08.2017
Jim 15:39:55 jim
Terms 15:29:22 jim
Web Blog_blogentry_070817_1 11:24:54 jim
06.08.2017
DirXML Engine 12:07:45 jim
Publisher Flow 12:04:31 jim
Subscriber Flow 12:03:44 jim
Subscriber Channel 12:02:43 jim
Challenge-response 11:55:01 jim
Request-Response 11:49:57 jim
Publish-Subscribe 11:46:44 jim
Fan-out 11:37:14 jim
Messaging pattern 11:34:19 jim
Subscriber 11:33:52 jim
Publisher 11:33:30 jim
Message 11:20:30 jim
Consent Mechanism 11:00:29 jim
Privilege 10:58:59 jim
Intelligence Assessment 10:58:18 jim
Security Incident 10:56:04 jim
Status Events 10:55:33 jim
ETP 10:54:46 jim
Complex Event Processing 10:46:58 jim
SubmitEventRequest 10:45:35 jim
Event Correlation 10:44:43 jim
Unfortunate event 10:42:39 jim
Novell Audit 10:42:03 jim
Event Cache 10:41:17 jim
XDAS Event 10:40:48 jim
Domain Event 10:37:53 jim
Event System 10:37:26 jim
LDAP Monitoring Overview 10:36:17 jim
Event Monitoring 10:34:11 jim EventMonitoring ==> Event Monitoring
CAP theorem 09:47:22 jim
LATA 08:51:44 jim
Local Access and Transport Area 08:46:52 jim
Point-of-Presence 08:42:01 jim
PoP 08:31:32 jim
05.08.2017
Blockstack 08:42:33 jim
Public Key Infrastructure Weaknesses 08:26:14 jim
04.08.2017
Functions as a Service 15:48:52 jim
Event-triggered 15:27:44 jim
Event 15:24:03 jim
Logout Token 15:22:03 jim
Triggerless vs Triggered Publication 15:19:59 jim
GBR 12:32:07 jim
Country Code 12:31:40 jim
USA 12:30:51 jim
ISO 9834.1 12:02:15 jim
X.660 12:01:31 jim
Data Country Codes 11:57:21 jim
DCC 11:50:44 jim
How To Get Your Own OID 11:45:05 jim
2.16.840.1.113883 11:41:52 jim
Health Level Seven 11:41:16 jim
HL7 11:40:43 jim
ISO 11:29:38 jim
CCITT 11:28:40 jim
1.3.6.1.4.1.8876 11:27:11 jim
2.16.840.1.113730 11:17:38 jim
Netscape Communications Corp 11:04:53 jim
Virtual List View Control 11:01:17 jim
VLV 10:59:07 jim
Virtual Directory 10:57:10 jim
Oracle 10:54:01 jim
Oracle Passwords 10:51:27 jim
DirXML 10:37:20 jim
Event Sequencer 10:23:26 jim
AlertErrorEvent 10:16:54 jim
EDirectory 10:11:07 jim
Web Blog_blogentry_040817_1 10:05:46 jim
Persistent Compute Objects 09:18:17 jim
AWS Cognito 09:16:26 jim
Serverless 09:12:38 jim
AWS Lambda 08:58:50 jim
OpenWhisk 08:56:39 jim
Azure Functions 08:49:57 jim
Google Cloud Functions 08:45:31 jim
Webtask 08:42:57 jim
Web Blog_blogentry_131016_1 08:41:21 jim
03.08.2017
Centrify 21:04:01 jim
Web Blog_blogentry_030817_1 21:01:00 jim
02.08.2017
Service Worker 14:37:53 jim
Progressive Web Application 14:09:39 jim
Web Blog_blogentry_020817_1 13:51:17 jim
RFC 2891 11:39:31 jim
RFC 3447 10:54:24 jim
Digital Signature Algorithm 10:48:13 jim
RFC 8017 10:46:27 jim
RSA Digital Signature Algorithm 10:45:31 jim
RFC 3279 10:44:34 jim
Signature Primitive 10:29:58 jim
Verification Primitive 10:25:48 jim
Digital Signature 09:57:42 jim
FIPS 186 08:56:21 jim
Electronic Signatures 08:41:08 jim
Electronic IDentification Authentication and trust Services 08:36:34 jim
01.08.2017
Key Management 14:29:29 jim
BCP 107 14:26:48 jim
NIST.SP.800-133 14:21:27 jim
Key Generation 14:20:19 jim
Key Revocation 14:18:00 jim
DPKI 13:59:18 jim Decentralized PKI ==> Decentralized Public Key Infrastructure
Decentralized Public Key Infrastructure 13:59:18 jim Decentralized PKI ==> Decentralized Public Key Infrastructure
Keystore 13:55:31 jim
DID method 11:38:59 jim
DID record 11:35:42 jim
Fast Healthcare Interoperability Resources 10:46:20 jim
FHIR Element 10:45:10 jim
Health Relationship Trust 10:27:15 jim
Permissioned Systems 09:56:03 jim
Non Permissioned System 09:55:02 jim
Distributed Ledger Technology 09:32:43 jim
Attestation 08:59:30 jim
Web Blog_blogentry_010817_1 08:43:30 jim
Merkle Tree 08:34:36 jim
31.07.2017
Cryptographic Hash Function 09:39:34 jim
Keyed-Hash Message Authentication Code 09:38:44 jim
FIPS 198-1 09:37:10 jim FIPS198-1 ==> FIPS 198-1
Password Validator 09:37:10 jim FIPS198-1 ==> FIPS 198-1
Key Derivation Function 09:33:15 jim
MAC 09:31:56 jim
Message Authentication Code 09:31:12 jim
OWHF 08:32:40 jim
One-Way Hash Function 08:32:24 jim
Web Blog_blogentry_310717_1 07:49:32 jim
30.07.2017
Sub 14:13:29 jim
Web Blog_blogentry_300717_1 14:07:40 jim
Password Policy 13:47:05 jim
Password Management 13:40:48 jim
Web Blog_blogentry_030117_1 13:34:53 jim
Resource Provisioning 13:32:23 jim
Privileged Access Management 13:31:45 jim
Privilege Conflict 13:31:14 jim
Identity Credential and Access Management 13:30:43 jim
IDPro 13:29:48 jim
API Service Delivery 13:28:47 jim
Resource 13:24:56 jim
Data 13:23:56 jim
Data-lake 13:20:57 jim
Data Management 12:27:07 jim
Data Provenance 12:21:47 jim
Data Pedigree 12:21:11 jim
Information Lifecycle Management 12:19:41 jim
Vendor Relationship Management 12:18:31 jim
Privacy by Design 12:17:17 jim
Data Classification 12:14:30 jim
Data Access Governance 12:10:32 jim
Customer Relationship Management 12:03:06 jim
Access Control Policy 11:48:11 jim
Zero Trust 11:39:55 jim
Human Limitation 11:38:06 jim
Attacker 11:33:21 jim
Internal Attacker 11:31:43 jim
Verizon Data Breach Investigations Report 11:26:53 jim
Organizational-centric 11:20:08 jim
Local Area Network 11:18:09 jim
Untrusted network 11:16:27 jim
Trusted network 11:15:13 jim
Forrester 11:11:24 jim
Application-centric 10:56:37 jim
Bounded Context 10:49:04 jim
Releasability 10:31:57 jim
Information Rights Management 10:01:15 jim
Data Security Analytics 09:58:49 jim
Data Visibility 09:54:11 jim
Data Discovery 09:51:17 jim
Data Disposal 09:32:23 jim
Disclosure-Alteration-Destruction 09:13:24 jim
Data Protection 09:04:37 jim
Life cycle 08:50:39 jim
Reference Information Model 08:46:14 jim
State 08:43:35 jim
Stateless 08:42:55 jim
Password Modify Operation 08:31:03 jim
Data State 08:21:56 jim
29.07.2017
Sensitive Data 21:53:10 jim
Data-centric 21:47:18 jim
Authenticity 09:51:01 jim
Stagefright 09:47:20 jim
APT 09:38:50 jim
Advanced Persistent Threat 09:38:31 jim
Partners 09:37:20 jim
Voice over IP 09:29:30 jim
Internet Relay Chat 09:28:14 jim
IRC 09:26:16 jim
Instant Messaging 09:22:43 jim
Z-Wave 09:01:51 jim
Web Blog_blogentry_290717_1 08:46:12 jim
Shared Secret 08:42:43 jim
StartTLS 08:41:21 jim
SOAP back-channel 08:38:09 jim
Code Division Multiple Access 08:36:19 jim
Protocol Data Unit 08:35:41 jim
QoP 08:34:16 jim
Quality of Protection 08:34:01 jim
Implementing and Integration 08:31:03 jim
Back-channel Communication 08:30:14 jim
Near Field Communication 08:29:40 jim
Inter-Process Communication 08:27:52 jim
Communication Layers 08:25:32 jim
Digital communication 08:24:01 jim
Communication 08:22:47 jim
Voice 08:21:57 jim
Audio 08:20:24 jim audio ==> Audio
0.9.2342.19200300.100.1.55 08:20:14 jim
Open Access 08:09:48 jim
Proprietary Protocol 07:55:53 jim
Universal Inbox 07:52:51 jim
Facebook Messenger 07:50:26 jim
IM 07:50:21 jim
Rich Communication Services 07:37:24 jim
Off-the-Record Messaging 07:17:52 jim
Extensible Messaging and Presence Protocol 07:16:58 jim
Short Message Service 07:13:29 jim
Mobile Application Part 07:06:41 jim
MAP 07:06:18 jim
28.07.2017
Trust Inferer 21:41:44 jim
Proxy 21:10:43 jim
Proxy Server 21:09:38 jim
SOA 20:49:25 jim
Web Blog_blogentry_280717_1 20:20:56 jim
User-centric Identity 11:05:11 jim
Privacy 10:48:28 jim
LIGHTest 10:37:11 jim
Cross-domain authentication 10:09:28 jim
Cross Origin Resource Sharing 10:09:17 jim
Check_session_iframe 10:09:02 jim
Cross-domain 10:08:27 jim Cross-Domain ==> Cross-domain
SearchRequest 09:34:39 jim
Delete Request 09:31:31 jim
Modify Request 09:26:06 jim
Delete 09:22:32 jim
Update 09:21:07 jim
Read 09:20:08 jim
Create 09:17:56 jim
Eventual consistency 09:11:38 jim
Distributed Data Store 09:08:56 jim
Create Read Update Delete 09:04:15 jim
Add Request 08:53:36 jim
Recurrent Neural networks 08:09:15 jim
Artificial Neural network 08:07:59 jim
Long Short Term Memory networks 08:07:08 jim
Turing test 07:49:04 jim
27.07.2017
Year 1978 20:49:57 jim
NIST.SP.800-63 20:32:41 jim
Enrollment 20:32:15 jim
Web Blog_blogentry_270717_1 20:18:01 jim
Password Dictionary 11:56:35 jim
End_session_endpoint 11:38:12 jim
Who Owns the Data 11:29:19 jim
Ownership 11:28:38 jim
Electronic Fitness Device 11:20:49 jim
Vehicle 10:49:24 jim
Sensor 10:46:14 jim
Local device 10:44:38 jim
Mobile Device 10:43:03 jim
Device 10:37:48 jim
Internet of Things 10:31:08 jim
Personal Health Record 10:08:26 jim
Electronic Health Record 09:19:08 jim
Electronic Medical Record 09:16:04 jim
Health information 09:04:31 jim
HIPAA Privacy Rule 08:58:08 jim
HIPAA Covered Entity 08:42:55 jim
United States Department of Health and Human Services 08:31:41 jim
Protected Health Information 08:19:43 jim
26.07.2017
Best Practices Password 17:23:11 jim
Password Anti-Pattern 17:21:56 jim
Government Communications Headquarters 17:14:07 jim
GCHQ 17:10:01 jim
Password Expiration 17:07:47 jim The National Cyber Security Centre ==> National Cyber Security Centre
National Cyber Security Centre 17:07:46 jim The National Cyber Security Centre ==> National Cyber Security Centre
NCSC 17:07:37 jim
Password Hint 16:48:31 jim
Password Character Composition 16:38:53 jim
Password Maximum Length 16:30:08 jim
Refresh Token 12:09:56 jim
Offline_access 12:09:08 jim
HTTP 400 11:10:17 jim
Backchannel_logout_session_required 10:56:27 jim
Backchannel_logout_uri 10:54:43 jim
OpenID Connect Front-Channel Logout 10:42:53 jim
PROHIBITED 10:34:51 jim
Backchannel_logout_session_supported 10:34:10 jim
Backchannel_logout_supported 10:30:50 jim
Frontchannel_logout_session_required 09:51:40 jim
Session ID 09:49:43 jim
Sid 09:49:04 jim
Frontchannel_logout_uri 09:47:27 jim
Uniform Resource Identifier 09:44:30 jim
NAM Customized JSP Pages 08:47:19 jim
Posting Credentials to NAM 08:46:29 jim
Standards Based SSO 08:45:56 jim
Iframe 08:45:07 jim
WebView 08:43:47 jim
Embedded user-agent 08:41:17 jim
Native application 08:38:00 jim
Application 08:33:23 jim
Hybrid apps 08:32:16 jim
Mobile App 08:30:58 jim
Firebug 08:18:51 jim
NAM Troubleshooting 08:18:15 jim
WebKit 08:13:18 jim
Safari 08:11:27 jim
System browser 08:08:51 jim
Chrome 08:08:01 jim
Chrome Custom Tabs 08:03:18 jim
25.07.2017
Pseudonym 17:37:12 jim
Pseudonymization 17:35:47 jim
Data anonymization 17:33:40 jim
MaaP 10:43:43 jim
Web Blog_blogentry_130717_1 10:42:55 jim
RCS 10:42:49 jim
RCS Universal Profile 10:39:50 jim
Messaging as a Platform 10:37:01 jim
Composite data type 10:22:11 jim
Complex Attribute 10:10:49 jim
Component Syntax 10:09:05 jim
DirXML-Entitlement 10:07:44 jim
Reference data type 09:59:37 jim
Hyperlinks 09:57:26 jim
Primitive data type 09:56:49 jim
Data type 09:54:34 jim
Integer 09:35:06 jim
Digital Imaging and Communications in Medicine 09:05:26 jim
DICOM 09:01:21 jim
CDA 09:00:41 jim
Clinical Document Architecture 08:58:45 jim
RIM 08:42:39 jim
Integrating the Healthcare Enterprise 08:39:28 jim
IHE 08:37:10 jim
OpenEHR 08:36:21 jim
24.07.2017
Strategies for Using Power for Communication 11:33:58 jim
Terminology for Constrained-Node Networks 11:28:18 jim
Scaling Properties 11:26:54 jim
Classes of Energy Limitation 11:22:38 jim
Constrained Networks 11:18:38 jim
Constrained-Node Networks 11:16:36 jim
LoWPAN 11:15:10 jim
Low-Power and Lossy Network 11:06:57 jim
ROM 10:57:29 jim
EDirectory Synchronization 10:56:19 jim
Edirectory ReadOnly Replica 10:55:39 jim EdirectoryReadOnlyReplica ==> Edirectory ReadOnly Replica
Edirectory Replicas 10:55:39 jim EdirectoryReadOnlyReplica ==> Edirectory ReadOnly Replica
Removing Failed Server 10:55:39 jim EdirectoryReadOnlyReplica ==> Edirectory ReadOnly Replica
NO-USER-MODIFICATION 10:54:00 jim
Mutability 10:53:06 jim
Remote Procedure Call 10:51:11 jim
MD5 10:25:29 jim
Triple DES 10:24:13 jim
Birthday Paradox 10:21:42 jim
3DES 10:17:41 jim
Revocation_endpoint 09:57:10 jim
Salesforce 09:54:43 jim
Web Blog_blogentry_240717_1 09:45:40 jim
Microsoft Active Directory Anomalies 09:13:28 jim
DNS NCACHE 09:09:20 jim
Negative Caching of DNS Queries 09:08:56 jim
RFC 2308 09:05:17 jim
PAPE 08:58:51 jim
OpenID.PAPE 08:58:01 jim
Social Login 08:56:51 jim Provider Authentication Policy Extension ==> OpenID Provider Authentication Policy Extension
OpenID Provider Authentication Policy Extension 08:56:50 jim Provider Authentication Policy Extension ==> OpenID Provider Authentication Policy Extension
Federal Identity Credential and Access Management 08:48:12 jim
FICAM 08:45:19 jim
ICAM 08:39:15 jim Identity, Credential, and Access Management ==> Identity Credential and Access Management
Web Blog_blogentry_260815_1 08:39:15 jim Identity, Credential, and Access Management ==> Identity Credential and Access Management
23.07.2017
Web Blog_blogentry_230717_1 12:13:59 jim
Not For Identification Purposes 12:12:37 jim
Select_account 11:13:19 jim
Prompt Parameter 11:09:27 jim
SIM Swap 10:55:35 jim
Subscriber Identification Module 10:51:24 jim
Personally Identifiable Information 10:46:35 jim
Know Your Customer 10:45:19 jim
Nbf 10:39:09 jim
Mobile TAN 10:38:00 jim
Signalling System No. 7 10:31:38 jim
Paym 10:28:27 jim
SSN 10:22:19 jim
Anonymous 10:17:06 jim
Anonymous Identity 10:16:27 jim
Identity Broker 10:12:24 jim
Identity Correlation 10:11:47 jim
OAuth 2.0 Security Considerations 09:09:46 jim
22.07.2017
LDAP_INVALID_CREDENTIALS 21:05:30 jim
Web Blog_blogentry_220717_1 19:56:56 jim
19.07.2017
Oidc-client-js 16:36:49 jim
Explicit Endpoint 14:16:17 jim
OAuth 2.0 JWT Secured Authorization Request 10:34:18 jim
FETT 10:30:08 jim
OAuth 2.0 Threat Model and Security Configurations 10:21:27 jim
JSON Web Token Best Current Practices 09:36:46 jim
Malicious Endpoint 09:05:46 jim
OAuth 2.0 Mix-Up Mitigation 09:02:20 jim
OAuth 2.0 Tokens 08:52:31 jim
Encoding claims in the OAuth 2 state parameter using a JWT 08:44:13 jim
OAuth state parameter 08:38:16 jim
Fragment Response Mode 08:35:16 jim
17.07.2017
Web Blog_blogentry_170717_1 10:52:45 jim
OAuth 2.0 Token Revocation 10:43:56 jim
YubiKey 10:33:16 jim
U2F 10:32:41 jim
NIST.SP.800-63B 10:31:45 jim
Authenticator Assurance Levels 10:29:13 jim
Authenticator App 10:26:34 jim
CloudFlare 10:19:22 jim
Content Delivery Network 10:19:03 jim
CDN 10:18:41 jim
Apache 10:13:26 jim
SHA-1 Deprecation 10:12:47 jim
OAuth Scope Example 10:11:28 jim
Cipher Suite 10:09:57 jim
NGINX 10:09:30 jim
Lua-resty-openidc 10:04:01 jim
Mod_auth_openidc 09:59:13 jim
RFC 7800 09:48:21 jim
JWT Confirmation Methods 09:47:42 jim
Authorization Request 09:40:05 jim
NaCl 09:35:20 jim NaCL ==> NaCl
Networking and Cryptography library 09:35:07 jim
Special-Use Domain Names 09:18:55 jim
RFC 6761 09:17:32 jim
127.0.0.1 09:16:40 jim
Localhost 09:16:02 jim
Private-Use Networks 09:12:31 jim
RFC 5735 09:09:32 jim
Carrier-grade NAT 09:08:51 jim
Unique Local IPv6 Unicast Addresses 09:08:19 jim
RFC 1918 09:06:38 jim
Network Security 09:04:21 jim
Network Address Translation 09:03:46 jim Private Network ==> Private-Use Networks
Loopback 08:54:30 jim
16.07.2017
OAuth 2.0 Token Exchange 22:28:42 jim
XRDS 10:03:54 jim
EXtensible Resource Descriptor Sequence 10:03:35 jim (eXtensible Resource Descriptor Sequence ==> EXtensible Resource Descriptor Sequence
I-name 10:02:43 jim
I-number 09:59:42 jim
OpenID 09:54:23 jim
Yadis 09:42:33 jim
Web Blog_blogentry_160717_1 09:29:39 jim
Web Blog_blogentry_140717_1 08:48:44 jim
15.07.2017
Implicit Grant 11:56:54 jim
Implicit Flow 11:56:35 jim
Meaningless But Unique Number 10:55:42 jim
By-reference 10:54:53 jim
By-value 10:50:53 jim
Request_uri 10:50:21 jim
Request_object_encryption_enc_values_supported 10:49:37 jim
Request_object_encryption_alg_values_supported 10:48:49 jim
14.07.2017
OpenID Connect Certified 20:34:00 jim
OAuth 2.0 Incremental Authorization 20:29:57 jim
Google OpenID Connect 20:22:27 jim HttpsTools.ietf.orgHtmlDraft-wdenniss-oauth-incremental-auth-00 ==> OAuth 2.0 Incremental Authorization
Challenged Networks 11:21:07 jim
Constrained Nodes 11:12:26 jim
Subtree Delete Control 10:54:02 jim
RFC 4525 10:15:59 jim
LDAP Modify-Increment Extension 10:15:15 jim
13.07.2017
IAL3 11:00:14 jim
IAL2 11:00:04 jim
IAL1 10:59:53 jim
Identity Verification Service 10:58:33 jim
Identity Proofing 10:57:00 jim
Password Recovery 10:55:31 jim
Verifier 10:44:50 jim
Knowledge-Based Authentication 10:42:52 jim
Identity questions 10:35:15 jim
Authentication Method Reference Values 10:21:13 jim
KBA 10:20:02 jim
12.07.2017
Base64 19:55:48 jim
Response_type 19:31:35 jim
Authorization Code 19:25:25 jim
OpenID Connect Flows 19:07:59 jim
Hybrid Flow 19:05:11 jim
OpenAM Endpoints 18:42:56 jim
Mobile Connect 17:46:22 jim
EIDAS 17:41:37 jim
Digital Identity Acceptance Policy 17:39:53 jim
STD 3 15:26:54 jim
RFC 1267 15:11:26 jim
RFC 2821 15:09:49 jim
RFC 821 15:09:05 jim
RFC Status 15:06:47 jim
BCP 15:06:11 jim
Best Current Practice 15:05:27 jim
Historic 15:04:59 jim
Experimental 15:04:36 jim
Internet Draft 15:01:55 jim
ID 15:00:08 jim
Internet Standard 14:52:15 jim
STD 1 14:36:22 jim
Not All RFCs are Standards 14:35:18 jim
Internet Official Protocol Standards 14:34:10 jim
Standards Track 14:24:28 jim
Proposed Standard 14:20:41 jim
STD 14:16:23 jim
IESG 14:13:31 jim
Internet Engineering Steering Group 14:13:13 jim The Internet Engineering Steering Group ==> Internet Engineering Steering Group
RFC Sub-series 14:11:31 jim
RFC 13:15:52 jim
RFC 5000 13:15:17 jim
RFC 1796 13:07:47 jim
HOTP 12:46:24 jim
RFC 5842 12:43:46 jim
Server Error 12:31:50 jim
Client Error 12:25:01 jim
Redirection 12:22:38 jim
HTTP 407 12:09:45 jim
Basic Authentication Scheme 12:06:03 jim
SASL 12:02:57 jim
LDAP Proxy User 11:54:59 jim
Proxy-Authorization 11:51:30 jim Proxy Authorization ==> Proxy-Authorization
Proxy-Authenticate 11:50:05 jim Proxy-Authentication ==> Proxy-Authenticate
Authentication Method 11:35:53 jim
Authentication Schemes 11:34:48 jim
PIN 11:28:15 jim
RFC 2753 11:24:52 jim
Policy Ignorant Node 11:23:49 jim
Client Authentication Methods 11:18:57 jim
Simple Authentication 11:16:38 jim
LDAP Authentication Methods 11:11:12 jim
Authorization Header 11:04:44 jim
RFC 3492 10:52:03 jim
Punycode 10:51:12 jim
Internationalized Domain Name 10:49:36 jim
Internet Corporation for Assigned Names and Numbers 10:48:09 jim
ICANN 10:47:11 jim
Email Address 10:35:57 jim
Internationalized Resource Identifiers 10:34:34 jim
Hypertext Transfer Protocol 10:29:47 jim
Content-Type 10:20:16 jim
MIME Type 10:09:45 jim
Media-type 10:09:17 jim
Content-Encoding 10:05:25 jim
Content-Length 09:59:03 jim
HTTP Header Field 09:54:58 jim
HTTP Body 09:52:23 jim
HTTP Entity Header 09:44:21 jim
HTTP Response Header 09:39:33 jim
HTTP Request Header 09:38:45 jim
RFC 7235 09:31:29 jim
Private_key_jwt 09:14:22 jim
Client_secret_post 09:13:57 jim
Client_secret_basic 09:13:29 jim
11.07.2017
WikiWiki 22:21:21 jim
WikiName 22:20:31 jim
WikiEtiquette 22:17:59 jim
UnusedPages 22:16:27 jim
Automated Password Self Service 22:14:18 jim
APASS 22:13:07 jim
UndefinedPages 22:10:58 jim
RecentChanges 21:54:28 jim
OneMinuteWiki 21:52:31 jim
CopyrightNotice 21:49:12 jim
EditPageHelp 21:47:05 jim
Community 21:44:26 jim
ApprovalRequiredForUserProfiles 21:42:07 jim
ApprovalRequiredForPageChanges 21:41:25 jim
A Configuration Profile Schema for Lightweight Directory Access Protocol (LDAP)-Based Agents 21:23:33 jim
Production Implementation 17:04:19 jim
PageVersionTag 16:59:56 jim
Prototyping 16:54:47 jim
Sketching 16:52:45 jim
API Planing 16:51:02 jim
NspmDistributionPassword 16:08:27 jim
Operating-system-level virtualization 15:52:41 jim
Virtualization method 15:49:58 jim
Hardware Virtualization 15:49:08 jim
Paravirtualization 15:48:26 jim
Hypervisor 15:48:03 jim
Full Virtualization 15:46:37 jim
Virtual Machine 15:43:26 jim Virtual Machines ==> Virtual Machine
NMAS 15:22:00 jim
LCM 15:13:52 jim
Universal Password 15:07:40 jim
SPM_ALLOW_SPWD_SET 14:08:42 jim
NspmConfigurationOptions 14:07:44 jim
UniversalPasswordSecretBits 14:03:09 jim
DevOps 13:49:25 jim
Continuous Development 13:44:31 jim
Continuous Delivery 13:42:33 jim
Dr. Axel SchnellbÃGel 11:42:00 jim
Authentication Context Class Reference 10:33:22 jim
Acr_values_supported 10:17:54 jim
Request_object_signing_alg_values_supported 10:00:22 jim
Concise Binary Object Representation 09:58:28 jim
JSON Web Tokens 09:54:24 jim
Javascript Object Signing and Encryption 09:52:25 jim
JSON Object 09:50:34 jim
OpenID Connect Claims 09:45:03 jim
JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants 09:11:57 jim
Authentication Context Class Values 09:09:02 jim
Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants 09:03:29 jim
Acr 08:53:18 jim
Financial API 02:08:58 jim
UMA 2.0 01:55:07 jim
UMAFedAuthz 01:51:58 jim
Federated Authorization for UMA 2.0 01:51:37 jim
UMA 2.0 Grant for OAuth 2.0 Authorization 01:51:20 jim
UMAGrant 01:34:19 jim
Web Blog_blogentry_110717_1 01:28:32 jim
Runtime Application Self-Protection 00:59:07 jim
RASP 00:58:24 jim
10.07.2017
Device Flow 16:38:35 jim
Input-constrained device 16:36:35 jim
Constrained Application Protocol 16:28:10 jim
Authorization Grant 16:22:58 jim
06.07.2017
Increment 18:47:02 jim
Iteration Backlog 18:43:21 jim
Delivery Team 18:23:36 jim
05.07.2017
LDAPSyntaxes 12:14:24 jim
Collective Attribute 12:08:24 jim
CollectiveAttributeSubentry 12:05:46 jim
LDAP Entry Collection 12:00:39 jim
CollectiveExclusions 11:52:38 jim
CollectiveAttributeSubentries 11:51:01 jim
COLLECTIVE Flag 11:31:34 jim
RFC 3671 11:30:58 jim
LDAP Subentry 11:29:49 jim
GidNumber 11:17:58 jim
USAGE 11:16:51 jim
EDirectory Extended LDAP Flags 11:14:03 jim
X-NDS_ACL_TEMPLATES 11:00:47 jim
ACL (eDirectory Attribute) 10:43:27 jim
SINGLE-VALUE 10:26:56 jim
X-NDS_BOTH_MANAGED 10:22:52 jim
X-NDS_FILTERED_OPERATIONAL 10:18:15 jim
X-NDS_ENCRYPTED_SYNC 10:15:27 jim
X-NDS_NON_REMOVABLE 10:13:06 jim
X-NDS_NONREMOVABLE 08:42:46 jim
Obituary 08:40:23 jim
NDS Obituaries 08:35:54 jim
2.16.840.1.113719.1.1.4.1.114 08:33:56 jim
Distributed File System 08:23:02 jim
Extract Transform Load 08:18:56 jim
Data warehouse 08:16:26 jim
ETL 08:15:24 jim Extract, Transform, Load ==> Extract Transform Load
Disk partition 08:09:57 jim
File System 08:09:13 jim
Structured data 08:05:33 jim
Unstructured data 08:03:14 jim
04.07.2017
Social Web 10:46:42 jim
Social Websites 10:46:02 jim
Instagram 10:45:24 jim
LinkedIn 10:44:05 jim
Google 10:42:59 jim
Facebook 10:39:04 jim
Social Identity 10:38:07 jim
Single Sign-On Scenarios 10:37:09 jim
Legitimacy of Social Login 10:36:13 jim
Life Management Platform 10:35:29 jim Social Networks ==> Social Websites
Administrative Identity 10:35:28 jim Social Networks ==> Social Websites
External Metrics 10:35:28 jim Social Networks ==> Social Websites
JF2 09:58:41 jim
JF2 Post Serialization Format 09:58:15 jim
Web Blog_blogentry_040717_1 09:53:54 jim
HTML5 09:46:54 jim
Microdata 09:42:32 jim
Microformats 09:41:27 jim
Micropub 09:39:40 jim
Service Provider 08:58:33 jim
Consumer of services 08:54:58 jim
03.07.2017
SynchronizedUpTo 12:40:41 jim
Naming Attributes 12:28:31 jim
FLAG_ATTR_IS_RDN 12:27:53 jim
FLAG_SCHEMA_BASE_OBJECT 12:26:13 jim
Bad-Pwd-Count 12:24:05 jim
BadPwdCount 12:16:59 jim
FLAG_ATTR_NOT_REPLICATED 12:13:48 jim
SystemFlags 12:11:49 jim
X-NDS_NEVER_SYNC 12:08:24 jim
Non-replicated 12:07:17 jim
Active Directory Locked Accounts 12:04:24 jim
GSS-SPNEGO 11:46:50 jim
NDS Authentication 11:44:17 jim
Novell Directory Services 11:40:18 jim
Multiple-channel Authentication 11:03:04 jim
Channel 10:40:25 jim
Protocol Stack 10:38:45 jim
Protocol Suite 10:34:43 jim
Protocol 10:32:36 jim
JSON Web Signature and Encryption Header Parameters Registry 09:56:01 jim
JOSE Header Parameter 09:54:06 jim
JOSE Header 09:51:33 jim
Client Secret 09:37:18 jim
Error 09:26:59 jim
Success 09:25:53 jim
LDAP Client Error And Result Codes 09:21:19 jim
EDirectory and NDS Client Error Codes 09:18:07 jim
DIR-XML-Error-Variables 09:16:39 jim
LDAP Error Codes 09:13:49 jim
LDAP_LOCAL_ERROR 09:13:24 jim
Kerberos Error Codes 09:11:38 jim
DirXML Error 09:10:26 jim
Server_error 09:07:34 jim
Authy 08:52:30 jim
OATH 08:49:57 jim
Initiative for Open Authentication 08:49:35 jim
Time-based One-time Password Algorithm 08:47:24 jim OATH ==> Initiative for Open Authentication
HMAC-based One-Time Password Algorithm 08:47:23 jim OATH ==> Initiative for Open Authentication
Google Authenticator 08:35:21 jim
App 08:29:02 jim
Browser-view 08:07:44 jim
30.06.2017
Nested Groups 10:34:48 jim
Negative Permission 10:32:28 jim
Permission 10:31:51 jim
Positive Permission 10:30:31 jim
Access Request 09:49:53 jim
Access 09:48:06 jim
Privilege Management Infrastructure 08:19:11 jim
Access Authority 08:10:39 jim
Physical Access Control 07:57:50 jim
Logical Access Control 07:56:49 jim
29.06.2017
NIST.SP.800-192 15:43:03 jim
Cyclic Inheritance 15:10:38 jim
Groups Are Bad 15:07:03 jim
NIST.SP.800 Computer Security 14:49:00 jim
28.06.2017
API-Gateway/OAuth_diagrams-04-768x1065.png 16:46:57 jim OAuth_diagrams-04-768x1065
EXtensible Access Control Markup Language 16:40:44 jim
Password Minimum Length 15:45:45 jim
NspmComplexityRules 15:43:37 jim
Password Quality 15:41:48 jim
Password Modification Policy 15:35:40 jim
Password Validity Policy 15:35:20 jim
Heuristic Attacks 15:19:53 jim
Credential Leaked Databases 14:52:58 jim
Credential Leakage 14:50:36 jim
Derived Credential 14:36:40 jim
Compromised Credential 14:33:17 jim
Privacy Paradox 13:19:34 jim
World Privacy Forum 12:25:15 jim
X.690 11:58:37 jim
UnicodePwd 11:55:55 jim
One-Time Pad 10:48:38 jim
Web Blog_blogentry_280617_1 10:42:19 jim
FLUSH+RELOAD 10:41:31 jim
OTP 10:16:13 jim
Information-theoretic Secure 10:03:29 jim
Side-channel attacks 09:48:09 jim
Computational Hardness Assumption 09:40:32 jim
Information Leakage 09:27:58 jim
27.06.2017
LDIF Sort Tools 10:31:37 jim
2.16.840.1.113719.1.1.4.1.545 10:15:05 jim
2.16.840.1.113719.1.1.4.1.271 10:14:28 jim
2.16.840.1.113719.1.1.5.1.6 10:13:41 jim
SYN_CI_LIST 10:12:24 jim
Case Ignore List 10:11:48 jim
RFC 5646 10:03:27 jim
RFC 4646 10:02:23 jim
RFC 4647 10:00:45 jim
RFC 3066 10:00:02 jim
Content-Language 09:58:08 jim
Accept-Language 09:55:38 jim
Ui_locales 09:46:43 jim
Authentication Context Class 09:07:59 jim
Acr_values 08:10:01 jim
Default_acr_values 08:03:39 jim
Best Practices OpenID Connect 08:01:31 jim
26.06.2017
Terms Of Engagement 16:09:40 jim
Privileged User Management 16:06:45 jim
Visitor Location Register 16:05:22 jim
Legal Person 16:04:34 jim
CommonAccord 16:04:22 jim
Federal Bureau of Investigation 16:03:55 jim
United States Supreme Court 15:54:12 jim
Jurisdiction 15:52:59 jim
Act (Actor) Claim 14:54:37 jim
SecOps 14:31:38 jim
NetSec 14:31:03 jim
SIEM 14:30:39 jim
Enterprise Mobility Management 14:28:59 jim
Cloud Access Security Broker 14:28:01 jim
CASB 14:24:04 jim
EMM 14:23:03 jim
ConfigurationManagement 13:39:04 jim
Service Support 13:36:08 jim
Incident Management 13:35:18 jim IncidentManagement ==> Incident Management
Release Management 13:33:07 jim
LDAP for Linux and Unix Clients 12:58:43 jim
LDAP Server Implementations 12:58:05 jim
Fraud and Risk 12:47:06 jim
Security Operations 12:39:55 jim
IT Service Management 12:30:53 jim
Profile Management 12:24:06 jim
Profile 12:22:47 jim
Self-Service 12:18:08 jim
User Self Service 12:14:50 jim
Identity Governance 12:11:58 jim
IDSA Integration Framework/IDSA-Integration-framework.png 12:08:05 jim IDSA-Integration-framework
Identity Defined Security Alliance 11:45:23 jim
Web Blog_blogentry_260617_1 11:38:26 jim
Authorization_endpoint 10:24:50 jim
OAuth 2.0 Audience Information 10:04:27 jim
Access Token Types Registry 09:44:59 jim
Access Token Type 09:43:18 jim
Form Post Response Mode 09:17:43 jim
Response_mode 09:15:52 jim
OAuth Authorization Endpoint Response Types Registry 09:07:13 jim
Query Response Mode 09:00:35 jim
Form_post 08:54:09 jim
Id_token 08:34:12 jim
Access_token 08:33:38 jim
25.06.2017
RFC 7673 11:07:39 jim
Man-In-The-Middle 11:04:31 jim
TLSA 11:02:08 jim
DNS-Based Authentication of Named Entities 10:55:25 jim
DANE 10:54:47 jim
RFC 7671 10:54:25 jim
RFC 7672 10:52:17 jim
RFC 6698 10:47:15 jim
Web Blog_blogentry_250617_1 10:45:29 jim
Secure connection 10:42:49 jim
End-to-End Communications 10:33:22 jim
TLS is Broken 09:55:00 jim
HTTPS Interception Weakens TLS Security 09:54:44 jim
Form Serialization 09:44:43 jim
URI Query String Serialization 09:43:23 jim
Authorization Code Flow 09:38:35 jim
OpenID Connect Authorization Flow 09:28:16 jim
OpenID Connect Authentication Response 09:24:50 jim
Authentication Request 09:19:46 jim
Authorization Server Request End-User Consent-Authorization 09:18:09 jim
Authorization Server Authentication of the End-User 09:11:55 jim
Userinfo_endpoint 08:42:31 jim
Openid scope 08:23:49 jim
Ui_hint 07:38:32 jim
24.06.2017
Payment Services Directive 12:16:04 jim
23.06.2017
Open Bank Project 22:18:59 jim
UK Open Banking 22:12:05 jim
Third Party Payment Service Provider 21:56:03 jim
UK 21:37:03 jim
GB 21:36:20 jim
United Kingdom 21:35:35 jim
CMA 21:33:37 jim
Competition and Markets Authority 21:31:26 jim
FAPI 21:24:54 jim
PIS 20:47:08 jim
Payment Initiation Service 20:42:30 jim
AIS 20:35:59 jim
PSU 20:35:30 jim
Account Information Service 20:35:14 jim
Payment Service User 20:32:39 jim
Biometric Comparison 11:16:13 jim
Biometric Authentication 11:14:54 jim
Biometric Presentation 11:11:09 jim
Biometric Enrollment 11:09:32 jim
Biometric Sample Processing 11:07:31 jim
Biometric Data Challenges 10:59:01 jim
Biometric Token 10:57:25 jim
Biometric Template 10:32:55 jim
Web Blog_blogentry_090217_1 10:31:14 jim
Vbm 10:28:36 jim
Touch ID 10:28:06 jim
Something You Are 10:27:42 jim
Rich Credential 10:27:12 jim
Inherence Factor 10:26:43 jim
Hard tokens 10:26:04 jim
Fpt 10:25:06 jim
Eyeprint ID 10:24:33 jim
Biometric data 10:23:40 jim
Biometric Sample 10:22:46 jim
Biometric Sensor 09:56:48 jim
Biometric Identification 09:47:22 jim
Web Blog_blogentry_230617_1 09:37:38 jim
Identification 09:24:34 jim
Recognition 09:21:45 jim
Pattern-recognition 09:19:31 jim
22.06.2017
Presentation Attack Detection 17:33:08 jim
Presentation Attack 17:28:26 jim
PADER 17:11:14 jim
Presentation Attack Detection Error Rate 17:10:21 jim
Strength of Function for Authenticators - Biometrics 17:07:11 jim
SOFA-B 16:54:08 jim
Strength of Function for Authenticators 16:53:36 jim
SOFA 16:41:27 jim
Web Blog_blogentry_220617_1 16:34:43 jim
Sub_jwk 14:06:00 jim
Updated_at 14:04:37 jim
Phone_number 14:03:27 jim
TelephoneNumber 14:02:14 jim
Phone_number_verified 14:01:09 jim
Timezone 14:00:02 jim
2.16.840.1.113719.1.1.4.1.178 13:59:41 jim
Zoneinfo 13:50:40 jim
JSON Web Token Claims 13:48:15 jim
Not After 13:44:45 jim
Not Before 13:43:57 jim
Certificate Validity Period 13:40:02 jim
Example Certificate 13:39:33 jim Validity-Not Before ==> Not Before
Timestamp 13:36:46 jim
Date Form 13:36:01 jim
Birthdate 13:31:30 jim
NAME 13:26:22 jim
Email_verified 13:25:32 jim
BirthDate 13:21:59 jim birthDate ==> BirthDate
Address 13:20:32 jim
PostalAddress 13:19:43 jim postalAddress ==> PostalAddress
Picture 13:15:51 jim
Name 13:14:41 jim
Gender 13:11:20 jim
Azp 13:06:31 jim
C_hash 13:02:16 jim
End-to-End Security 12:57:51 jim
User 11:41:23 jim
1.2.840.113556.1.5.9 11:40:55 jim
End-User 11:21:07 jim
End-to-end Encryption 10:54:51 jim
Grant_types_supported 09:22:51 jim
21.06.2017
Application_type 18:34:58 jim
JSONArray 18:30:57 jim
Authorization_code 18:23:47 jim
Refresh_token 18:20:45 jim
Subject_type 18:20:20 jim
Pairwise Pseudonymous Identifier 18:19:07 jim
Pseudonymous 18:15:36 jim
Initiate_login_uri 18:09:17 jim
Kerberos 14:25:20 jim
Client-Server Exchange 14:21:21 jim
TGS Exchange 14:21:04 jim
AS Exchange 14:20:28 jim
Kerberos Principal 14:18:58 jim
UPN 14:13:57 jim
AS_REP 13:56:52 jim
AS_REQ 13:55:50 jim
Network Time Protocol 13:50:13 jim
NTP 13:49:08 jim
RFC 4430 13:43:43 jim
RFC 3244 13:42:51 jim
Client-To-Server Ticket 13:23:18 jim
Kerberos Service Account 13:21:42 jim
Ticket Granting Service 13:08:36 jim
Service Ticket 13:05:02 jim
TGS-REQ-REP 13:04:13 jim
AS 12:16:41 jim
Kerberos Authentication Service 12:07:40 jim
Pass-the-ticket 11:55:11 jim
Kerberos Forged Ticket 11:49:48 jim
How passwords are used in Windows 11:36:37 jim
Password-hash 11:29:25 jim
LAN Manager authentication level 11:27:39 jim
KRBTGT 10:51:18 jim
NTLMv2 10:33:44 jim
Phishing 09:14:47 jim
IRI 08:55:14 jim
RFC 3987 08:54:23 jim
Working Group 08:51:00 jim
W3C Technical Architecture Group 08:50:27 jim
Extensible Resource Identifier 08:50:17 jim
XRI 08:40:45 jim
Unique Identifier 08:24:02 jim
20.06.2017
OAuth Scopes 20:57:32 jim
Dropbox 15:00:47 jim
Yubico 14:58:48 jim
IP Address 14:56:33 jim
IPAddress 14:55:41 jim
OpenID Connect Mobile Discovery Profile 14:54:31 jim
Internet Protocol Address 14:53:57 jim
DNS cache poisoning 14:53:47 jim
TCP-IP 14:53:23 jim
CLI 14:21:10 jim
GitHub 14:18:28 jim
Web Blog_blogentry_200617_1 13:48:01 jim
IDPro/Copy of IDProFounder.png 13:46:11 jim Founding Member IDPro
Jim Willeke Resume 13:40:23 jim
LocalEntryID 10:34:35 jim
Year 1950 09:40:42 jim
Human 09:40:15 jim
Artificial Conversational Entity 09:38:13 jim
Cortana 09:36:14 jim
Alexa 09:35:57 jim
Google Assistant 09:35:43 jim
Siri 09:35:27 jim
Chatbots 09:34:54 jim
Chatterbox 09:34:43 jim
Talkbot 09:34:31 jim
ChatterBot 09:33:45 jim
Privileged Account 09:15:34 jim
Domain Administrative Accounts 09:08:47 jim
Emergency Accounts 09:01:54 jim
Local Administrative Accounts 09:01:11 jim
The Laws of Relationships 08:54:35 jim
Identity Relation 08:27:22 jim
19.06.2017
Application Accounts 16:14:50 jim
Whistleblower 15:42:52 jim
Bad Actor 15:30:10 jim
Web Blog_blogentry_190617_1 15:27:21 jim
PAS 14:06:52 jim
1.2.840.113556.1.3.14 14:05:53 jim
1.2.840.113556.1.3.11 14:05:14 jim
AttributeSchema 14:03:43 jim
Partial Attribute Set 13:57:52 jim
CrossRef 13:55:13 jim
LDAP Query Examples for AD 13:20:00 jim
LDAP SearchFilters 13:07:43 jim
LDAP Query Basic Examples 13:04:47 jim
JMX 12:53:13 jim
Unindexed Search 12:52:28 jim
Java Management Extensions 12:49:50 jim
Access Log 12:46:55 jim
Audit Log 12:45:47 jim
LDAPs and AD 12:13:04 jim
Secure MIME 12:08:31 jim
Cryptographic Message Syntax 12:08:07 jim SMIME ==> Secure MIME
Digital Certificate Formats 12:08:07 jim SMIME ==> Secure MIME
RFC 5911 12:08:07 jim SMIME ==> Secure MIME
Public-Key Cryptography Standards 12:07:44 jim
RFC 5652 11:49:18 jim
PKCS 6 11:47:45 jim
PKCS 9 11:46:22 jim
PKCS 8 11:43:03 jim
RFC 2985 11:39:43 jim
RFC 5958 11:37:21 jim
Asymmetric Key Packages 11:36:51 jim
Digitally Signed 11:21:20 jim
Online Certificate Status Protocol 11:15:44 jim
SlpuasaConfiguration 09:54:04 jim
Electronic Data Interchange 09:52:34 jim
EDI 09:52:14 jim
EDIPartyName 09:50:17 jim
OtherName 09:46:13 jim
X400Address 09:45:32 jim
UniformResourceIdentifier 09:44:56 jim
RegisteredID 09:44:20 jim
EMailAddress 09:41:48 jim eMailAddress ==> EMailAddress
Rfc822Name 09:40:48 jim
Draft-ietf-pkix-generalname-00 09:38:55 jim
DirectoryName 09:38:18 jim
GeneralName 09:22:04 jim
RFC 6818 09:10:47 jim
RFC 5280 09:09:39 jim
RFC 3280 09:08:16 jim
RFC 2459 09:06:42 jim
Certificate Validation 08:50:11 jim
DNSName 08:48:15 jim
Extended Validation Certificate 08:42:44 jim
EV-CERTS 08:42:04 jim
Certificate Subject 08:03:22 jim
18.06.2017
Automatic Certificate Management Environment 10:56:10 jim
Lets encrypt 10:49:35 jim
CAPK 10:45:10 jim
Certificate Authority 10:44:41 jim
Registration Authority 10:39:17 jim
Certificate Request Message Format 10:38:05 jim
Domain Authorization Document 10:34:17 jim
Certificate Request Process 10:33:18 jim
RFC 2511 10:26:26 jim
RFC 2510 10:25:34 jim
Certificate Management Protocol 10:24:37 jim
Web Blog_blogentry_180617_1 10:23:43 jim
Certificate Issuer 10:02:47 jim
Expiration Date 09:49:47 jim
Certification Authority Browser Forum 09:30:41 jim
CARAT 09:24:19 jim
Fully Qualified Domain Name 09:17:33 jim
FQDN 09:15:13 jim
17.06.2017
RFC 2617 12:05:00 jim
Token_endpoint_auth_method 11:40:51 jim
Id_token_signed_response_alg 11:33:14 jim
Id_token_encrypted_response_alg 11:32:17 jim
Request_object_signing_alg 11:29:42 jim
Request_object_encryption_alg 11:26:42 jim
Web Blog_blogentry_170617_1 11:07:23 jim
Gluu Server 10:34:21 jim
Gluu-Asimba 10:32:38 jim
OxShibboleth 10:29:16 jim
OxAuth 10:26:24 jim
Gluu LDAP 10:19:34 jim
OxTrust 10:18:03 jim
OXD 10:17:10 jim
JWK-Thumbprint 09:21:25 jim
JSON Object Signing and Encryption 09:15:43 jim
RFC 7520 09:14:37 jim
JOSE-Cookbook 09:12:44 jim
RFC 7638 09:09:40 jim
Crypto Forum Research Group 08:59:10 jim
Internet Research Task Force 08:58:20 jim
IRTF 08:57:16 jim
CFRG 08:55:34 jim
Base 64 Encoding with URL and Filename Safe Alphabet 08:52:34 jim
Base64url 08:48:28 jim
RFC 8037 08:46:50 jim
JSON Web Signature 08:44:44 jim
Curve25519 08:27:43 jim
Ed448 08:26:28 jim
Ed25519 08:25:41 jim
Elliptic Curve Diffie-Hellman Ephemeral 08:20:36 jim
Curve448 08:10:43 jim
X448 08:06:35 jim
RFC 7748 08:04:30 jim
X25519 08:03:17 jim
ECDH 07:59:02 jim
Elliptic Curve Diffie-Hellman 07:58:16 jim Elliptic Curve DiffieHellman ==> Elliptic Curve Diffie-Hellman
Authentication Method Reference 07:39:46 jim
RFC 8176 07:23:13 jim
16.06.2017
RFC 8032 11:43:07 jim
Edwards-curve Digital Signature Algorithm 11:42:15 jim
ARIA 11:38:37 jim
Camellia 11:36:18 jim
Diffie-Hellman or RSA 11:21:41 jim
Random 11:00:27 jim
RSA Cryptography 10:35:57 jim
Key-Exchange 10:28:02 jim
15.06.2017
CONTROL-SA 20:27:30 jim
IdentityIQ 20:26:07 jim
BMC Software 20:19:34 jim Control-SA ==> CONTROL-SA
At_hash 14:59:54 jim
OpenID Connect Federation 14:51:41 jim
Web Blog_blogentry_150617_1 14:44:18 jim
OpenID Connect ImplementerS Guides 13:26:26 jim
14.06.2017
HTTP HEAD 11:37:45 jim
13.06.2017
UnderstandingSchemaInOpenDS 16:41:40 jim
DIT Structure Rule 16:39:50 jim UnderstandingDITStructureRules ==> Understanding DIT Structure Rules
Understanding DIT Content Rules 16:39:50 jim UnderstandingDITStructureRules ==> Understanding DIT Structure Rules
Understanding DIT Structure Rules 16:39:49 jim UnderstandingDITStructureRules ==> Understanding DIT Structure Rules
DIT Content Rule 16:37:31 jim
Understanding Name Forms 16:37:07 jim UnderstandingDITContentRules ==> Understanding DIT Content Rules
RFC 3377 16:34:49 jim
RFC 4523 16:32:44 jim
RFC 2252 16:31:47 jim
DN-Binary 16:06:48 jim
2.5.5.7 16:05:31 jim
LDAP_MATCHING_RULE_DN_WITH_DATA 16:00:57 jim
MsDS-HasInstantiatedNCs 15:54:07 jim
1.2.840.113556.1.4.2253 15:49:35 jim
Active Directory Group Related Searches 15:20:43 jim
Active Directory Computer Related LDAP Query 12:40:24 jim
Active Directory User Related Searches 12:37:17 jim
2.5.4.6 12:13:30 jim
CountryName 12:12:46 jim
Country 12:09:50 jim
C 12:08:50 jim
Mobile Country Code 11:52:13 jim
TLD 11:50:55 jim
Top-Level Domain 11:50:29 jim
ISO 3166 11:48:42 jim
DNS Domain 11:47:50 jim
Domain 11:47:35 jim
ISO 639 11:41:29 jim
Locale 11:34:01 jim
Language-Tag 11:23:05 jim
Language Code 11:21:52 jim
2.16.840.1.113719.1.1.4.1.300 11:17:38 jim
2.16.840.1.113719.1.1.4.1.34 11:17:00 jim
LanguageId 11:14:18 jim
Language 11:02:40 jim
ISO 3166-1 alpha-3 10:36:37 jim
ISO 3166-1 numeric 10:35:28 jim
E.212 10:15:59 jim
Country String 10:10:20 jim
ISO 3166-1 alpha-2 10:09:54 jim
Distinguished Names 09:51:50 jim ISO 3166 ==> ISO 3166-1 alpha-2
Casual Name 09:35:57 jim
Real Name 09:30:40 jim
Personal Name 09:30:27 jim
Official Name 09:29:02 jim
Last Name 09:28:13 jim
First Name 09:26:13 jim
FullName 09:24:07 jim
Internet Email Address 09:12:38 jim
Email 09:11:13 jim
Electronic Mail 09:08:18 jim
Mail 09:01:39 jim
Issuer 08:37:49 jim
Aud 08:31:06 jim
Enc 08:29:25 jim
StringOrURI 08:26:36 jim
12.06.2017
Center for Internet Security 09:16:40 jim
Web Blog_blogentry_120617_1 08:53:27 jim
NIST CSF 08:52:06 jim
NIST Cybersecurity Framework 08:51:50 jim
11.06.2017
September 11 attacks 09:23:35 jim
United States Intelligence Community 09:20:55 jim
Confidentiality 09:20:14 jim
Secret 09:19:30 jim
Top-secret 09:14:44 jim
Surveillance of Communications 09:04:36 jim
Intelligence Agencies 09:01:15 jim
DNI 08:58:11 jim
United States Director of National Intelligence 08:57:47 jim
Foreign Intelligence Surveillance Court 08:37:16 jim
Foreign Intelligence Surveillance Act 08:29:30 jim
FISA 08:22:51 jim
Upstream Surveillance 08:22:21 jim
Surveillance 08:16:16 jim
09.06.2017
IDM The Solution 10:39:31 jim OurDeliverables ==> Our Deliverables
Our Deliverables 10:39:30 jim OurDeliverables ==> Our Deliverables
Requirements Assessment 10:38:47 jim RequirementsAssessment ==> Requirements Assessment
Why IDM Makes Sense For Eveyone 10:38:25 jim
IDM The User Dilemma 10:36:06 jim
IDM The Application Developers Dilemma 10:32:51 jim
IDM for Small and Medium Business 10:25:16 jim IDMForSmallMediumBusiness ==> IDM for Small and Medium Business
Master Secret 09:16:47 jim
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 09:15:43 jim
Galois-Counter Mode 09:12:15 jim
BEAST 09:08:57 jim
Lucky 13 09:07:03 jim
Cipher Block Chaining 08:54:00 jim
Initialization Vector 08:51:11 jim
Ephemeral Key 08:50:42 jim
IV 08:48:48 jim
08.06.2017
EncryptedExtensions 17:01:50 jim
TLS Full Handshake 16:56:20 jim
ClientKeyExchange 16:52:37 jim
ServerKeyExchange 16:52:14 jim
Change_cipher_spec 16:46:09 jim
CertificateVerify 16:39:03 jim
TLS Handshake Message 16:36:35 jim
TLS Alert Messages 16:35:50 jim
Record Protocol 16:35:30 jim
Application_data 16:35:05 jim
TLS ContentType 16:34:36 jim
GroupType 13:32:14 jim
07.06.2017
Relying Party 15:05:53 jim
RFC 3749 14:07:05 jim
Unexpected_message 13:58:30 jim
Illegal_parameter 13:57:11 jim
Decode_error 13:56:04 jim
HelloRetryRequest 13:52:00 jim
Pre_shared_key 13:50:35 jim
Key_share 13:49:13 jim
Supported_versions 13:43:48 jim
ServerHello 13:35:42 jim
ClientHello 12:50:25 jim
Cipher_suites 12:39:39 jim
TLSv1.3 11:54:08 jim
OpenSSL 11:53:49 jim
1-RTT Handshakes 11:47:12 jim
HTTP Strict Transport Security 11:41:46 jim
RFC 6797 11:35:15 jim
Network Security Services 11:22:40 jim
Mozilla 11:21:27 jim
0-RTT Handshakes 11:13:52 jim
Logjam 11:10:11 jim
FREAK 11:07:04 jim
Export-grade 11:00:06 jim
RSA_EXPORT 10:58:45 jim Export Ciphers ==> Export-grade
United States Cryptography Export-Import Laws 10:58:45 jim Export Ciphers ==> Export-grade
Legal 10:39:37 jim
We are NOT Lawyers 10:38:47 jim
Standard Disclaimer 10:34:14 jim
BIS 10:29:56 jim
United States Bureau of Industry and Security 10:26:10 jim
T-Mobile 10:08:29 jim
A look at the Network Cable standards 10:03:28 jim
Softcard 10:01:06 jim
Open Identity Exchange 09:56:54 jim
AT&T 09:54:08 jim
Smart endpoints and dumb pipes 09:52:36 jim
The Open Group 09:52:06 jim
Santa Cruz Operation 09:51:45 jim
Pass-the-hash 09:51:25 jim
MacOS 09:51:00 jim
Linux 09:50:26 jim
FLAIM 09:49:43 jim
Unix 09:49:12 jim
History 09:47:52 jim
UNIX History and More 09:47:41 jim
SCO 09:43:59 jim
Darl McBride 09:42:19 jim
Caldera Systems 09:40:57 jim
06.06.2017
Which Jane Doe 17:25:22 jim
Delegation vs Impersonation 17:23:16 jim
DIAP 17:15:59 jim
Common Edirectory Bind Errors 12:05:28 jim
DEC 12:04:53 jim
31.05.2017
Subject Alternative Name 13:44:49 jim
SAN 13:19:54 jim
30.05.2017
Credential Stuffing 11:26:51 jim
Web Blog_blogentry_300517_1 11:23:05 jim
29.05.2017
JSON Web Encryption 10:03:50 jim
JSON Web Signature and Encryption Algorithms 09:57:35 jim
Alg 09:53:39 jim
Typ 09:49:03 jim
HS256 09:46:16 jim
HS512 09:45:29 jim
RFC 7518 09:40:28 jim
27.05.2017
Copyright 12:27:01 jim
Patent 12:26:37 jim
Public Domain 12:24:53 jim
IPR 12:21:22 jim
Intellectual Property Rights 12:20:57 jim
Intellectual Property 12:20:20 jim
Copyrighted 12:17:26 jim
Royalty Fee 12:14:43 jim
National Cybersecurity Center of Excellence 11:53:59 jim
NCCoE 11:52:00 jim
Standard 11:44:52 jim
Web Blog_blogentry_231015_1 11:35:15 jim
NISTIR 8062 11:32:46 jim
Web Blog_blogentry_270517_1 11:28:15 jim
25.05.2017
Using dsbk on Windows 16:17:54 jim
Windows XP 16:11:20 jim
Protected Extensible Authentication Protocol 16:10:44 jim
PEAP 16:09:22 jim
CHAP 16:08:19 jim
PAP 16:07:53 jim
Password Authentication Protocol 16:07:19 jim
Challenge-Handshake Authentication Protocol 16:04:03 jim
Windows 98 15:59:44 jim
MS-CHAP 15:59:36 jim
Windows 95 15:58:55 jim
RFC 2433 15:53:16 jim
Active Directory Account Lockout 11:40:32 jim
Server Message Block 11:39:59 jim
MaxValRange 11:38:52 jim
MaxDatagramRecv 11:38:28 jim
LDAP policy in Active Directory 11:38:06 jim
History of LDAP 11:37:30 jim
NT LAN Manager 11:36:00 jim
Lifetime 11:12:14 jim
Key Distribution Center 10:19:56 jim
Ticket Granting Ticket 10:19:06 jim
TGS Session Key 09:55:22 jim
KDC 09:47:41 jim
TGS 09:36:38 jim
Mimikatz 09:28:23 jim
Web Blog_blogentry_250517_1 08:46:09 jim
24.05.2017
XDAS Trust Management Events 15:55:17 jim
XDAS Security Events 15:44:47 jim
XDASv2 Events 15:40:32 jim
XDAS Data Item Management Events 15:39:36 jim XDAS Data-Resource Management ==> XDAS Data Item Management Events
EDirectory 9.0.3.0 (40005.12) 15:34:45 jim
XDAS Account Management 15:27:39 jim
XDAS Resource Access 15:16:47 jim
CREATE_SESSION 15:12:06 jim
DSE_NMAS_LOG_FINISH_LOGIN_STATUS 15:10:14 jim
XDAS Event Name 15:08:57 jim
CREATE_ACCOUNT 15:08:29 jim
ACCOUNT_UNLOCK 14:47:06 jim
XDAS Fields 14:46:37 jim
DSE_DELETE_VALUE 14:37:44 jim
XDAS Correlation IDs for IDM 14:33:55 jim
DSE_ADD_VALUE 14:20:58 jim
EDirectory Event Type 14:19:57 jim
NMAS_LOGIN 13:58:22 jim
NMAS -1642 13:56:38 jim
DSE_LOGIN_EX 13:12:56 jim
DSE_AUTHENTICATE 12:59:39 jim
EDirectory 9.0.2.0 (40004.44) 12:54:16 jim
AUTHENTICATE_SESSION 12:47:05 jim
Web Blog_blogentry_240517_1 11:08:20 jim
DSE_CREATE_ENTRY 10:27:28 jim
DELETE_ACCOUNT 10:24:59 jim
DSE_DELETE_ENTRY 10:24:32 jim
XDAS Initiator 09:35:02 jim
XDAS Observer 09:32:59 jim
23.05.2017
NDSTRACE Examples 17:01:01 jim
22.05.2017
HTTP 204 12:27:47 jim
HTTP 200 12:24:51 jim
HTTP 404 12:15:19 jim
HTTP 410 12:09:40 jim
INVALID_RESPONSE 11:38:45 jim
AMBIGUOUS_RESPONSE 11:26:48 jim
NDS Result Code 11:24:31 jim
LDAP Result Codes 11:05:27 jim
Functional Programming 11:00:19 jim
Result Code 10:55:21 jim
SCIM Delete Request 10:40:23 jim
Immutable 10:36:59 jim
Idempotent 10:30:18 jim
21.05.2017
Key Verification 21:18:42 jim
Homomorphic Encryption 21:16:03 jim
Repudiation 21:03:56 jim
OTR 20:51:41 jim
Key Transparency 20:48:35 jim
Encrypt 20:46:48 jim
Public Key Cryptography 20:45:43 jim
CONIKS 20:34:36 jim
Web Blog_blogentry_210517_1 20:23:46 jim
W3C Web Crypto API 20:19:48 jim
Same Origin Policy 20:10:02 jim
3D Secure 20:05:49 jim
Host Card Emulation 19:57:19 jim
TPP 11:11:25 jim
Third-party 11:08:50 jim
ASPSP 10:47:15 jim
Acquirer 10:46:42 jim
PSP 10:45:35 jim
Payment Service Provider 10:43:46 jim
Merchant 10:39:25 jim
Financial Data 10:04:48 jim
Certificate Fingerprint 09:50:39 jim
Thumbprint 09:24:28 jim
Obtain a Certificate from Server 09:17:41 jim
20.05.2017
RFC 6234 09:41:17 jim
RFC 4634 09:40:26 jim
SHA-2 09:37:24 jim
Certificate Fingerprint/certificate-fingerprint.png 09:29:01 jim certificate-fingerprint
Certificate 09:08:24 jim
License 09:07:24 jim
Identity Document 09:05:58 jim
Passport 09:03:09 jim
NIST Information Technology Laboratory 08:39:02 jim
ITL 08:38:35 jim
NIST.SP.500 Computer Systems Technology 08:37:23 jim
NIST.SP.1800 Cybersecurity Practice Guides 08:36:13 jim SP 1800 Cybersecurity Practice Guides ==> NIST.SP.1800 Cybersecurity Practice Guides
Web Blog_blogentry_030915_1 08:36:13 jim SP 1800 Cybersecurity Practice Guides ==> NIST.SP.1800 Cybersecurity Practice Guides
FIPS Based Cipher Suites 08:21:55 jim NIST.SP.57 ==> NIST.SP.800-57
NIST.SP.800-57 08:21:54 jim NIST.SP.57 ==> NIST.SP.800-57
NIST.SP.800-52 08:21:21 jim NIST.SP.52 ==> NIST.SP.800-52
Payment Card Industry Data Security Standard 08:21:21 jim NIST.SP.52 ==> NIST.SP.800-52
NIST.SP.800-132 08:18:01 jim
NIST.SP.800-157 08:12:31 jim
Cancelable Biometrics 07:48:13 jim
19.05.2017
JAVA LDAP SDKs 10:28:10 jim
PKCS12 10:24:02 jim
Common Development And Distribution License 10:20:48 jim
AbzillaPerson 10:20:13 jim
Persona 10:18:54 jim
NSS 10:18:27 jim
MozillaCertutil 10:17:23 jim
Firefox 10:10:24 jim
RSA key-exchange 10:06:54 jim
TLS Renegotiation 09:50:21 jim
TLS Compression 09:49:00 jim
TLS 1.2 09:44:18 jim
EncryptedPreMasterSecret 09:43:21 jim
Premaster Secret 09:41:41 jim
Encryption Scheme 09:26:58 jim
Cryptographic Primitive 09:24:33 jim
Encryption 08:55:07 jim
PKCS 1 08:31:25 jim
18.05.2017
NetworkAddress 07:47:30 jim
Novell NetworkAddress 07:43:28 jim
NxsettingsDriver 07:41:53 jim
NTLM SSP 07:40:12 jim
CIFS 07:39:03 jim
Common Internet File System 07:33:59 jim
17.05.2017
MaxReceiveBuffer 09:16:44 jim
MaxTempTableSize 09:15:47 jim
MaxPageSize 09:15:36 jim
MaxQueryDuration 09:15:24 jim
MaxPoolThreads 09:10:37 jim
MaxNotificationPerConnection 09:06:09 jim
MaxResultSetSize 09:04:46 jim
MaxConnIdleTime 08:53:25 jim
MaxActiveQueries 08:51:48 jim
InitRecvTimeout 08:47:52 jim
ERROR_ACCOUNT_LOCKED_OUT 08:39:55 jim
Ntdsutil.exe 08:29:29 jim
MaxConnections 08:27:41 jim
MAXIMUM_LOGINS_EXCEEDED 08:23:37 jim
Intruder Detection 08:12:58 jim
ACCOUNTDISABLE 08:10:22 jim
ERROR_PASSWORD_EXPIRED 08:04:33 jim
16.05.2017
NspmAdminsDoNotExpirePassword 16:12:39 jim
Edirectory Administrative Password Changes 16:08:57 jim
PasswordExpirationTime 16:08:09 jim
Grace Logins 15:05:44 jim
Password Reset 14:42:11 jim
Password Change 14:40:08 jim
Spmdclnt 11:52:22 jim
NDSD Loadable Module 11:50:49 jim
SPM 11:48:39 jim
Secure Password Manager 11:48:11 jim
LoginGraceRemaining 10:30:36 jim
15.05.2017
Password Life Time 17:27:25 jim
13.05.2017
Set Active Directory Password From Java 15:17:38 jim
12.05.2017
Key Usage 14:25:24 jim
Certificate Extensions 14:21:39 jim
Subject Unique Identifier 14:16:34 jim
Issuer Unique Identifier 14:16:07 jim
SubjectPublicKeyInfo 14:11:37 jim
Subject Public Key Info 14:11:16 jim
2.5.4.7 13:46:53 jim
LocalityName 13:46:25 jim
OrganizationalUnitName 13:44:52 jim organizationalUnitName ==> OrganizationalUnitName
AlgorithmIdentifier 13:27:07 jim
Certificate Algorithm ID 13:26:43 jim
Certificate Serial Number 12:10:19 jim
X.509 Style Guide 12:06:41 jim
Certificate Version 12:05:00 jim
SerialNumber 11:30:39 jim
IDMAndOIDWithSSL 11:11:02 jim
Keytool 11:10:14 jim
Certificate Alias 11:07:55 jim
Trust Anchor 10:55:30 jim
Java KeyStore 10:54:01 jim
Root Certificate 10:52:33 jim
Toolbox 09:58:16 jim
OpenSSL Commands 09:47:40 jim
How To Crack SSL-TLS 09:42:42 jim
SSLv2 08:59:41 jim
Deprecating Secure Sockets Layer Version 3.0 08:56:39 jim
SSLv3 08:55:15 jim
RFC 7568 08:54:05 jim
Transport Layer Security 08:43:38 jim
Prohibiting Secure Sockets Layer (SSL) Version 2.0 08:38:31 jim
RFC 6176 08:35:43 jim
11.05.2017
Command-line 13:37:30 jim
Create a MAD Service To Run 13:35:22 jim
Linux setgid and setuid 13:34:10 jim
LDIF to Bulk Load Test Users 13:33:07 jim
NAM Administration 13:32:35 jim
DXServer Commands 13:32:09 jim
DxPwdFailedAttempts 13:31:37 jim
Join AD Domain 13:30:28 jim
Kinit 13:29:59 jim
DumpEdirectoryPasswordInformationTool 13:28:48 jim
Kerberos Tools LDAP 13:28:18 jim
Using RPM 13:27:53 jim
DumpUP 13:26:28 jim
Dxcmd 13:25:49 jim
Passwd 13:25:17 jim
Unix Time 13:24:41 jim
Which LDAPSEARCH 13:23:31 jim
Force Immediate Synchronization 13:22:01 jim
Dsquery 13:21:23 jim
LDAPSEARCH 13:20:47 jim
Bash Shell Initialization Files 13:20:05 jim
Edirectory Usefull Linux Commands 13:18:36 jim
Unix Linux CommandLine Tricks 13:17:49 jim
Dump Password Information Tool-Command Line Options 13:17:05 jim
SSH CommandLine Tips 13:16:16 jim
Edirectory Instance Management 13:12:31 jim
N4u.server.configdir 13:05:26 jim
10.05.2017
Eavesdropper 18:51:03 jim
ASCII 15:26:49 jim
ISO 10646 15:23:27 jim
Code Point 15:22:10 jim
Unicode 15:20:00 jim
UCS 15:18:38 jim
Universal Coded Character Set 15:17:34 jim
Vulnerability 15:12:35 jim
Exploit 15:09:03 jim
Attack 15:06:15 jim
Passive attacker 15:03:20 jim
DBIR 14:39:25 jim
Verizon 14:37:18 jim
Mobile Network Operators 14:33:40 jim
Unicode Standard Annex 15 14:31:55 jim
UAX 15 14:29:05 jim
Federal Information Processing Standard 11:45:34 jim
PBKDF2 11:36:51 jim
Unauthenticated 11:00:47 jim
NDS Connection States 10:59:44 jim
08.05.2017
UniqueID 17:32:21 jim
PermanentConfigParms 17:31:27 jim
Edirectory Indexes 17:30:23 jim
Password History 17:18:10 jim
PwdMaxLength 15:29:20 jim Password-composition Policy ==> Password Modification Policy
PwdMinLength 15:29:20 jim Password-composition Policy ==> Password Modification Policy
Draft-behera-ldap-password-policy 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Authentication is Broken 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Reuse 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Modify-password 15:11:28 jim
Password Usage Policy 15:01:29 jim
NspmPasswordPolicy 14:53:15 jim
NspmMaximumLength 14:11:25 jim
PwdMaxAge 13:56:43 jim
2.16.840.1.113719.1.39.43.4.231 13:46:43 jim
2.16.840.1.113719.1.1.4.1.69 13:05:48 jim
PasswordMinimumLength 13:00:56 jim
Passwords Must Meet Complexity Requirements 12:51:08 jim
NdsLoginProperties 11:44:30 jim PasswordMinimumLength ==> Password Minimum Length
2.16.840.1.113719.1.1.6.1.33 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
2.16.840.1.113719.1.39.43.6.1 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
2.16.840.1.113719.1.64.6.1.1 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
InetOrgPerson 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
Implementing Universal Password 11:32:44 jim
Password Considerations and Requirements 11:28:11 jim
Password Complexity 11:24:17 jim
07.05.2017
SS7 hack 09:45:18 jim
Transaction Authentication Number 09:39:51 jim
CCSS7 09:36:51 jim
Common-channel signaling 09:35:58 jim
SS7 09:35:38 jim
Common Channel Signalling System 7 09:35:17 jim
Person-to-Person Payments 09:09:54 jim
P2P 09:00:03 jim
International Mobile Equipment Identity Database 08:53:48 jim
Integrated Automated Fingerprint Identification System 08:53:05 jim
United States Department of Justice 08:52:12 jim
CBP 08:49:35 jim
Law Enforcement Agency 08:49:04 jim Law Enforcement ==> Law Enforcement Agency
United States Customs and Border Protection 08:48:25 jim
Regulatory Agencies 08:45:26 jim
International Mobile Equipment Identity 08:37:22 jim
TAC 08:25:37 jim
IMEI Software Version 08:24:49 jim
IMEISV 08:24:08 jim
Type Allocation Code 08:21:13 jim
Home Location Register 08:00:36 jim
Central Equipment Identity Register 07:59:41 jim
IMEI DB 07:47:58 jim
CEIR 07:36:56 jim
06.05.2017
Mobile Equipment Identifier 11:13:05 jim
IMEI 11:04:02 jim
Mobile Switching Center 11:00:15 jim
Global System for Mobile Communications 10:59:25 jim
BSS 10:47:31 jim
BTS 10:47:11 jim
BSC 10:46:51 jim
Base Station Controller 10:46:34 jim
Base Transceiver Station 10:46:02 jim
Base Station Subsystem 10:39:38 jim
AuC 10:19:17 jim
Authentication Center 10:18:46 jim
Mobile Station 10:14:58 jim
MSC 09:43:22 jim
VLR 09:42:52 jim
GPRS 09:37:02 jim
HLR 09:36:14 jim
Call Forwarding 09:35:41 jim
Call Diversion 09:35:13 jim
Mobile Station International Subscriber Directory Number 09:02:44 jim
ISDN 08:45:12 jim
Integrated Services Digital Network 08:44:39 jim
CCS 08:42:03 jim
Telecommunications 08:35:12 jim
FIPs 08:17:37 jim
Privacy Considerations 08:16:52 jim
Year 1980 08:15:11 jim
Year 1945 08:14:28 jim
Year 1960 08:14:01 jim
OECD 08:13:39 jim
UN 08:12:54 jim
United Nations 08:12:37 jim
Organization for Economic Cooperation and Development 08:10:00 jim
HEW 08:06:13 jim
HHS 08:05:12 jim
SIP 07:39:29 jim
Session Initiation Protocol 07:39:13 jim
RFC 6716 07:33:38 jim
RFC 3325 07:32:35 jim
05.05.2017
ECHELON 12:03:51 jim
Surveillance in the Workplace 12:03:03 jim
Surveillance by Video 12:01:34 jim
National Security Agency 11:58:02 jim
Next Generation Identification 11:45:28 jim
Signals Intelligence 11:40:33 jim
SIGINT 11:38:21 jim
Web Blog_blogentry_050517_1 11:29:31 jim
Universal Declaration of Human Rights 11:11:10 jim
UDHR 11:10:06 jim
Anonymity Set 10:39:23 jim
Level Of Assurance 10:28:21 jim
Consent vs Authorization 10:06:00 jim
Proximity Card 09:59:44 jim
Key Card 09:58:35 jim
Malicious Software 09:39:45 jim
Malware 09:38:15 jim
RFC 7469 09:07:07 jim
04.05.2017
Oracle Internet Directory and DirXML Moves 12:41:22 jim
Oracle Internet Directory 12:38:01 jim
DirXML and Oracle (OID) 12:34:05 jim
Byte 12:22:50 jim
Encrypted 12:21:27 jim
DES 12:00:54 jim
Data Encryption Standard 12:00:46 jim
OID and Intruder Detection 11:47:55 jim
02.05.2017
EDirectory Version 13:50:02 jim
NetWare 13:30:12 jim
NDS External References 13:27:35 jim
EDirectory 8.8.5.0 (20219.15) 13:27:13 jim Edirectory 8.8.5.0 (20219.15) ==> EDirectory 8.8.5.0 (20219.15)
EDirectory 9.0.0.0 (40002.79) 13:24:01 jim EDirectory Version Information ==> EDirectory Version
Distributed Reference Links 13:23:39 jim
NDSD 13:20:34 jim
NICI 13:07:51 jim
Novell International Cryptographic Infrastructure 13:06:01 jim NICIWhichVersionIsInstalled ==> NICI Determine What Version
NICI Determine What Version 13:06:00 jim NICIWhichVersionIsInstalled ==> NICI Determine What Version
EDirectory 8.8 11:57:44 jim
Edirectory 8.8.x Anomalies 11:56:19 jim Edirectory8.8Anomalies ==> Edirectory 8.8.x Anomalies
EDirectory 8.8.3.0 (20804.05) 11:53:58 jim EDirectory 8.8 SP3 ==> EDirectory 8.8.3.0 (20804.05)
EDirectory 8.8.8.0 (20801.46) 11:47:35 jim
EdirectoryAnomalies 11:46:25 jim
EdirectoyFHSAndLSBCompliance 11:41:58 jim
IManager Server Configuration 11:40:50 jim
Data At Rest 11:40:06 jim
WIKI-Groups 11:38:18 jim
ServerHolds 10:08:40 jim
2.16.840.1.113719.1.1.4.1.96 10:02:50 jim
Tagged Name 09:56:12 jim
2.16.840.1.113719.1.1.5.1.23 09:48:48 jim
BackLink 09:47:25 jim
2.16.840.1.113719.1.1.4.1.110 09:41:37 jim
UnknownBaseClass 09:39:40 jim
NDS Unknow Entries 09:29:34 jim
01.05.2017
NDS Obituary State 12:37:50 jim
NDS Obituaries Type 12:35:32 jim
BACKLINK Obituary 12:33:19 jim
NDS Secondary Obituaries 12:30:45 jim
OLD RDN Obituary 12:29:25 jim
MOVED Obituary 12:27:36 jim
DEAD Obituary 12:25:08 jim
MOVED From Obituary 12:20:05 jim
MOVE Sub-Tree Obituary 12:16:49 jim
Tree_new_RDN Obituary 12:14:58 jim
PURGE ALL Obituary 12:11:35 jim
Used_By Obituary 12:08:12 jim
Tree_old_RDN Obituary 12:04:08 jim
NEW RDN Obituary 11:58:41 jim
RESTORED Obituary 11:52:57 jim
NDS Obituaries Classification 11:49:47 jim
NDS Special Case Obituaries 11:48:30 jim
NDS Informational Obituaries 11:46:48 jim
NDS Primary Obituaries 11:39:48 jim
INHIBIT_MOVE Obituary 10:55:09 jim
DS_ENTRY_NOT_PRESENT 10:48:54 jim
Simple Health Check 09:46:29 jim
Ndstrace 09:44:36 jim
Ndsrepair 09:42:37 jim
Flat Cleaner 09:40:57 jim
30.04.2017
2010s 12:13:08 jim
1980s 12:11:26 jim
2000s 12:10:39 jim
Common Vulnerabilities and Exposures 12:06:20 jim
Apache Hadoop 12:04:34 jim
Message Passing Interface 12:00:19 jim
MPI 12:00:03 jim
MapReduce 11:57:09 jim
Reduce() 11:44:22 jim
Map() 11:34:54 jim
Hadoop Distributed File System 11:11:25 jim
Digital Equipment Corporation 11:07:31 jim
Apollo Computer 11:07:14 jim
DCE-RPC 11:06:26 jim
OSF 11:05:44 jim
DCE-DFS 10:52:51 jim
DFS 10:52:09 jim
HDFS 10:44:57 jim
Hadoop 10:35:25 jim
Computing Cluster 10:19:57 jim
Amazon Simple Storage Service 10:13:32 jim
Big data 10:03:55 jim
FLAIM Block Cache 09:50:15 jim
Block 09:48:49 jim Blocks ==> Block
Block Cipher 09:48:49 jim Blocks ==> Block
Inter-Planetary File System 09:48:49 jim Blocks ==> Block
S3 09:41:19 jim
Amazon Web Services 09:39:41 jim
AWS 09:38:39 jim
Amazon 09:36:47 jim
29.04.2017
Patient Data 09:58:41 jim
Clinical Data 09:48:39 jim
Web Blog_blogentry_310715_1 09:39:03 jim
Blockchain Identity 09:37:32 jim
Web Blog_blogentry_290417_1 09:08:32 jim
28.04.2017
Data Breach 11:50:02 jim
Breach 11:38:35 jim
Common Object Request Broker Architecture 09:11:53 jim
UML 09:06:33 jim
Object Management Group 09:06:04 jim
OMG 09:01:30 jim
People And Things Every IDM Person Should Know 08:59:35 jim
Burton Group 08:58:44 jim
Bob Blakley 08:58:24 jim
Maverick Research The Death of Authentication 08:49:16 jim
Web Blog_blogentry_280417_1 08:44:08 jim
Gartner 08:42:37 jim
Access360 08:23:46 jim
IBM IDM 08:22:51 jim
The Seven Laws Of Identity 08:10:04 jim
Kim Cameron 08:07:31 jim
Microsoft Passport 08:05:36 jim
Law of Justifiable Parties 08:01:04 jim
Law of Minimal Disclosure For A Constrained Use 07:55:18 jim
Law of User Control and Consent 07:51:48 jim
IRM 07:41:05 jim
25.04.2017
LDAP Transactions 16:39:02 jim
2.16.840.1.113719.1.27.103.4 16:33:31 jim
EndGroupingNotice 16:32:46 jim
EDirectory LDAP Transaction 16:29:40 jim
EndGroupingResponse 16:27:21 jim
EndGroupingRequest 16:26:02 jim
CreateGroupingResponse 16:25:04 jim
CreateGroupingRequest 16:23:59 jim
2.16.840.1.113719.1.27.103.2 16:15:13 jim
2.16.840.1.113719.1.27.103.7 16:09:58 jim
GroupingControl 16:09:26 jim
CreateGroupValue 16:08:01 jim
GroupCookie 16:05:07 jim
2.16.840.1.113719.1.27.103.8 15:55:36 jim
CreateGroupType 15:54:43 jim
2.16.840.1.113719.1.27.103.1 15:51:48 jim
LDAP Grouping of Related Operations 15:39:09 jim GroupingControl ==> LDAP Grouping of Related Operations
LDAPv3 Grouping of Related Operations 15:39:09 jim GroupingControl ==> LDAP Grouping of Related Operations
Lightweight Directory Access Protocol (LDAP) Transactions 15:37:15 jim
23.04.2017
Novell Access Manager 19:40:54 jim
ULA 11:49:27 jim
RFC 4193 11:47:09 jim
RFC 6598 11:36:06 jim
RFC 2640 11:26:05 jim
RFC 2460 11:25:09 jim
Internet Protocol Version 6 11:24:30 jim
IPv6 11:23:23 jim
RFC 791 11:19:35 jim
IPv4 11:18:49 jim
Internet Protocol Version 4 11:18:30 jim
NAT 10:58:00 jim
Transparent Proxy 10:57:30 jim
The Onion Router 10:48:15 jim
Tor 10:46:05 jim
Socket Secure 10:41:41 jim
Response 10:34:23 jim
Request 10:32:51 jim
Clients 10:28:13 jim
Server 10:27:21 jim
Protocol Server 10:26:06 jim
Protocol Client 10:20:43 jim
Web Origin 10:05:06 jim
Port 10:03:50 jim
URI Authorities 10:02:57 jim
Hostname 10:01:19 jim
RFC 6454 09:55:37 jim
SOP 09:50:50 jim
URI Template 09:50:04 jim
RFC 6570 09:46:25 jim
URI Query 09:43:14 jim
URI Path 09:41:50 jim
RFC 6838 09:35:36 jim
RFC 7320 08:53:03 jim
RFC 6874 08:52:23 jim
Web Blog_blogentry_230417_1 08:26:59 jim
21.04.2017
LSTM 11:41:24 jim
Feedforward Neural network 11:40:32 jim
RNN 11:38:50 jim
ANN 11:38:07 jim
Web Blog_blogentry_210417_1 11:03:58 jim
Paradox of Knowability 09:56:10 jim
Responsible 09:19:42 jim
19.04.2017
Graded Authentication 14:24:18 jim
Single Sign-On 13:38:05 jim
Micro Focus 13:10:06 jim
BMC 13:04:38 jim
HP OpenView Select Identity 13:03:24 jim
Hewlett Packard Enterprise 12:55:55 jim
HPE 12:53:53 jim
Web Services Federation 12:52:18 jim
WS-Federation 12:47:40 jim
18.04.2017
Abstraction 12:07:16 jim
Directed Acyclic Graph 11:01:01 jim
Merkle DAG 11:00:03 jim
DAG 10:58:12 jim
Git 10:54:51 jim
Object-oriented Programming 09:53:19 jim
Object-based 09:52:50 jim
Object 09:49:56 jim Objects ==> Object
Object-oriented 09:46:01 jim
Polymorphism 09:37:27 jim
Inheritance 09:30:45 jim
Encapsulation 09:22:59 jim
OOP 08:55:50 jim
Web Blog_blogentry_180417_1 08:54:21 jim
DIT Chaining 08:48:00 jim
Chaining 08:45:56 jim
16.04.2017
Advanced Key Processor 09:55:22 jim
Web Blog_blogentry_160417_1 09:53:51 jim
Active attacker 09:50:39 jim
NISTIR 7298 09:48:04 jim
Accountability 09:46:19 jim
Protected Resource 09:35:57 jim
Identity Attributes 09:23:26 jim
14.04.2017
Web Blog_blogentry_140417_1 09:10:52 jim
13.04.2017
Password Statistics 14:14:03 jim
Risk 14:08:03 jim
Password Guessing Attacks 13:31:15 jim
10.04.2017
Barcode 13:37:51 jim
Year 1974 13:36:53 jim
UPC 13:36:31 jim
QR-code 13:29:51 jim
Quick Response Code 13:26:50 jim
Pre-shared key 13:19:02 jim SharedSecret ==> Shared Secret
Web Blog_blogentry_100417_1 13:06:46 jim
status 05:58:24 jim
Replica convergence 05:47:29 jim
Basically Available Soft state Eventual consistency 05:46:23 jim
BASE 05:45:31 jim
Replication 05:39:37 jim
Synchronization 05:36:13 jim DefinitionSynchronization ==> Synchronization
Changelog 05:34:48 jim
Attribute Usage Flags 05:33:48 jim
Node.js 04:46:24 jim
JavaScript 04:42:49 jim
ECMAScript 04:39:06 jim
IDM The Manager Dilemma 03:47:07 jim
09.04.2017
Password Authentication 14:30:19 jim
08.04.2017
Password Authentication Policy 12:34:11 jim
Password Expiration Warning 12:29:57 jim
Usability 12:08:29 jim
Password 11:13:46 jim
Traditional Registration 11:01:34 jim
06.04.2017
Identified 12:04:56 jim
Unlinkability 12:01:35 jim
Pseudonymity 11:54:03 jim
Individual 11:44:38 jim
Identifiable 11:42:42 jim
Identifiability 11:40:59 jim
Undetectability 11:35:55 jim
IOI 11:34:40 jim
Item of Interest 11:34:23 jim
PANOPTICLICK 11:32:34 jim
Fingerprinting 11:31:34 jim
Fingerprint 11:26:06 jim
Observer 11:16:15 jim
Authorized 11:13:23 jim
Intermediary 11:11:20 jim
Recipient 11:09:44 jim
Initiator 11:08:32 jim
Enabler 11:07:15 jim
Unauthorized 11:05:23 jim
RFC 6973 10:39:21 jim
NGI 10:22:09 jim
RISC 09:38:49 jim
AFIT 09:38:11 jim
Advanced Fingerprint Identification Technology 09:37:57 jim
Repository for Individuals of Special Concern 09:31:11 jim
Web Blog_blogentry_060417_1 09:18:04 jim
05.04.2017
DSBK 09:40:49 jim
Edirectory Backup Strategy 08:49:06 jim
Edirectory Disaster Recovery 08:29:40 jim
Edirectory Back-Ups And Clones 08:26:05 jim
NICI Configuration Files 08:19:06 jim
EmboxRecovery 08:15:42 jim
04.04.2017
Authentication Context Class vs Authentication Method Reference 12:14:49 jim
Authentication Protocol 11:30:38 jim
Mutual Authentication 11:30:21 jim
Internet Protocol Address Location 11:28:34 jim
Closed-Loop Authentication 11:27:27 jim
Open-Loop Authentication 11:25:07 jim
FIDO 10:40:09 jim
FIDO Authenticator 10:26:11 jim
U2F device 10:08:32 jim
FIDO Client 10:05:01 jim
FIDO Server 10:02:02 jim
FIDO Relying Party 09:42:29 jim
Password-based 09:23:53 jim
Web Blog_blogentry_040417_1 09:23:02 jim
Credential Enrollment 09:04:20 jim
Identity Assurance 08:41:13 jim
Assurance 08:38:29 jim
03.04.2017
HTTP POST 10:03:02 jim
Web Blog_blogentry_030417_1 09:33:36 jim
Banks 09:33:12 jim
AISP 09:30:11 jim
PISP 09:29:53 jim
Account Information Service Provider 09:28:53 jim
PSD2 09:26:18 jim
Proffer 09:14:10 jim
02.04.2017
FIDO Standards 11:09:35 jim
Universal Second Factor 10:44:28 jim
Universal Second Factor Challenges 10:23:38 jim
NIST Interagency Report 09:56:24 jim
NISTIR 09:54:03 jim
NIST.IR 7817 09:50:48 jim
Credential Management 09:32:19 jim
Credential Revocation 09:31:25 jim
Credential Issuance 09:22:50 jim
Credential Suspension 09:21:19 jim
Credential Reset 09:18:10 jim
GitLab 08:12:42 jim
01.04.2017
Yubikey NEO 19:17:48 jim
EAL 19:01:11 jim
Evaluation Assurance Level 19:00:56 jim
SAR 18:58:37 jim
Security Assurance Requirement 18:58:14 jim
SFR 18:56:14 jim
Security Functional Requirements 18:55:47 jim
CC 18:53:59 jim
Common Criteria 18:53:25 jim
Common Criteria for Information Technology Security Evaluation 18:53:03 jim
Smart Card 18:52:26 jim
Bluetooth Special Interest Group 18:30:05 jim
Personal Area Networks 18:29:21 jim
Wireless 18:26:49 jim
Bluetooth Low Energy 18:26:32 jim
BLE 18:23:16 jim
USB 18:15:47 jim
Universal Serial Bus 18:15:31 jim
FIDO protocols 18:09:25 jim
Fast IDentity Online 18:07:35 jim
PKCS 11 17:56:10 jim
Internet Protocol Suite 17:23:11 jim
OSI-Model 17:19:58 jim
RFC 1122 17:19:18 jim
Internet Layer 17:14:21 jim
Link Layer 17:12:01 jim
Transport Layer 17:09:21 jim
Application Layer 17:05:37 jim
Internet Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
Transmission Control Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
Router 16:45:02 jim
Gateway 16:40:12 jim
CISCO Commands 16:31:27 jim
Network Layer 16:26:11 jim
Session Layer 16:22:42 jim
Presentation Layer 16:19:03 jim
Frame 16:12:17 jim
Packet 16:04:34 jim
Bit 16:01:20 jim
Payload 15:59:06 jim
Datagram 15:55:10 jim
RFC 1594 15:48:44 jim
Cable Connections 15:44:48 jim
Physical Layer 15:44:16 jim
RFC 1928 15:10:27 jim
SOCKS 15:05:51 jim
Logs and File Locations 15:05:06 jim
United States federal government 11:18:24 jim
United States Judiciary 11:13:35 jim
United States House of Representatives 11:02:34 jim
United States Senate 11:02:23 jim
DOJ 11:01:12 jim
FBI 10:59:49 jim
IAFIS 10:48:02 jim
Fingerprint recognition 10:42:50 jim
Biometric 10:18:58 jim
ExtensibleMatch 09:00:12 jim
30.03.2017
Voice recognition 17:22:40 jim
Bio-political tattooing 17:19:27 jim
United States Department of Veterans Affairs 17:18:40 jim
US-VISIT 17:16:00 jim
United States Department of Homeland Security 17:15:23 jim
DHS 17:14:24 jim
MITRE Corporation 17:13:54 jim
United States Visitor and Immigrant Status Indicator 16:44:56 jim
Retinal recognition 16:27:15 jim
Facial recognition 16:23:46 jim
Tel 16:20:53 jim
Iris recognition 16:13:41 jim
Spoofing Attack 15:55:45 jim
FNMR 15:50:50 jim
False Non-Match Rates 15:50:33 jim
FMR 15:47:28 jim
False Match Rates 15:46:29 jim
24.03.2017
Trustmark Scheme 12:48:11 jim
Web Blog_blogentry_170816_1 12:24:13 jim
Token Binding Protocol Negotiation 12:21:50 jim
Token Binding over HTTP 12:14:58 jim
Token Binding ID 12:14:42 jim
Sec-Token-Binding 12:14:24 jim
Token Binding Protocol 12:13:45 jim The Token Binding Protocol ==> Token Binding Protocol
Token Consumer 11:56:20 jim
Token Provider 11:55:31 jim
Web Blog_blogentry_240317_1 09:42:37 jim
20.03.2017
Badssl.com 13:39:03 jim
TLS Proxy 13:36:34 jim
HTTPS Inspection 13:28:15 jim
ISO 24745 13:09:14 jim
PAD 12:27:26 jim
AAL 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
Federation Models 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
Someplace You Are 11:21:30 jim
Something You Do 11:20:12 jim
Authentication Factor 10:54:59 jim
Sensitive Authentication Data 10:35:59 jim
Cardholder Data 10:25:30 jim
Multi-Factor Authentication 10:07:35 jim
CDE 09:59:25 jim
Cardholder Data Environment 09:58:40 jim
18.03.2017
May_act (May Act For) Claim 15:14:57 jim
Cid (Client Identifier) Claim 15:09:25 jim
Scp (Scopes) Claim 15:06:11 jim
Authentication Double-Hop 14:50:04 jim
Logout Process 12:29:08 jim
Web Blog_blogentry_180317_1 09:55:11 jim
Client Application 09:43:43 jim
Web Authentication 09:26:59 jim
LDAP Authentication 09:22:34 jim
Password Manager 09:15:18 jim
Password Vault 09:14:16 jim
16.03.2017
AICPA 12:41:28 jim
SSAE 16 12:41:03 jim
American Institute of Certified Public Accountants 12:40:03 jim
Statement on Standards for Attestation Engagements 12:13:08 jim
SOC 1 12:08:42 jim
15.03.2017
RFC 7301 08:36:06 jim
Application-Layer Protocol Negotiation 08:27:39 jim
ALPN 08:25:58 jim
14.03.2017
International Mobile Subscriber Identity 11:03:43 jim
Essential Claim 08:50:27 jim
Voluntary Claim 08:48:54 jim
13.03.2017
Social Identity Provider 11:32:52 jim
12.03.2017
GraphQL schema language 10:55:20 jim
GraphQL 10:48:53 jim
GraphQL Server 10:46:44 jim
GraphQL Client 10:33:11 jim
GraphQL/graphQL-architecutre.png 09:29:38 jim GraphQL-architecture
Representational State Transfer 09:09:38 jim
HTTP Method 09:05:32 jim
1990s 08:59:27 jim
1970s 08:52:28 jim
UNIX 08:30:25 jim
Open Software Foundation 08:29:15 jim
DCE 08:20:55 jim
Interface Definition Language 08:18:39 jim
IDL 08:17:35 jim
HATEOAS 08:10:16 jim
08.03.2017
Anonymity 17:52:48 jim
Web Blog_blogentry_080317_1 17:50:02 jim
B003281 16:37:22 jim
Millisecond 11:55:07 jim
Unix Epoch 11:44:11 jim
MacOS Epoch 11:42:07 jim
Time And Epochs 11:35:28 jim
Epoch 11:32:51 jim
Tick 11:31:15 jim
AccountExpires 11:29:34 jim Ticks ==> Tick
Instruction cycle 11:29:24 jim
Year 1904 11:26:12 jim
Hour 11:24:10 jim Hours ==> Hour
Year 1582 11:19:28 jim
Nanosecond 11:19:03 jim
TimeLimit 11:14:37 jim
TimeBeforeExpiration 11:14:25 jim
SYNC PANE ENTRIES EVAL 11:13:34 jim
PwdMinDelay 11:13:18 jim
PwdMinAge 11:12:58 jim
PwdMaxIdle 11:12:41 jim
PwdMaxDelay 11:12:05 jim
PwdLockoutDuration 11:11:17 jim
PwdGraceExpiry 11:10:57 jim
PwdFailureCountInterval 11:10:22 jim
PwdExpireWarning 11:10:01 jim
LowConvergenceSyncInterval 11:09:33 jim
LdapServerIdleTimeout 11:09:16 jim
LOGIN DELAY ENABLE 11:08:59 jim
Heartbeat Synchronization 11:08:43 jim
FAILED AUTH DELAY 11:08:30 jim
Expires_in 11:08:18 jim
DxPwdFailedTime 11:07:28 jim
Cachecleanupinterval 11:07:10 jim
Cacheadjustinterval 11:06:49 jim
Cache-Control 11:06:39 jim
Account Usability Request Control 11:05:58 jim
Java Time 11:04:02 jim Milliseconds ==> Millisecond
Year 1601 10:50:24 jim
2,147,483,647 10:23:01 jim
ShadowLastChange 10:21:45 jim
NdsServerIntTable 10:20:01 jim
Shadow 10:18:50 jim
Token Introspection Endpoint 10:17:37 jim
Year 1972 10:13:47 jim
Leap seconds 10:13:14 jim
POSIX time 09:56:21 jim
Attribute 00:58:14 jim
07.03.2017
Login_hint_token 12:53:28 jim
Binding_message 12:50:23 jim
OpenID Connect MODRNA Authentication Profile 1.0 12:49:23 jim
Account Chooser 12:23:57 jim
OpenID.Discovery 11:04:34 jim
UTMS 10:56:04 jim
MSISDN 10:51:10 jim
MODRNA.Discovery 10:43:07 jim
OpenID.Core 10:23:50 jim
MODRNA 10:23:24 jim
Web Blog_blogentry_070317_1 10:10:27 jim
OpenID Connect Account Porting 10:08:50 jim
GSMA 10:06:21 jim
03.03.2017
OAuth 2.0 Use Cases 08:46:19 jim
Public API 08:10:10 jim
Partner API 08:09:53 jim
Internal API 08:09:33 jim
API Consumer 08:05:40 jim
API Provider 08:05:00 jim
02.03.2017
TLS Full Handshake/tls13-hs-ecdhe.png 16:12:43 jim Improved Handshakes in TLS version 1.3
TLS Session Resumption 15:38:10 jim
Pre-Shared Key 15:32:23 jim
Transport Layer Security (TLS) Renegotiation Indication Extension 14:35:04 jim
RFC 5869 14:07:41 jim
HMAC-based Extract-and-Expand Key Derivation Function 14:07:02 jim
HKDF 14:05:04 jim
RFC 3874 14:03:57 jim
EdDSA 14:01:06 jim
Data Loss Prevention 12:57:27 jim
DLP 12:52:05 jim
01.03.2017
Web Blog_blogentry_010317_1 16:45:02 jim
Identity and Access Management 13:14:40 jim
Identity State 13:14:16 jim
24.02.2017
Cryptographic Collision 11:03:19 jim
SHAttered 10:58:28 jim
Cryptographic Collision/Collision-illustrated.png 10:51:49 jim SHA-1 collision
SHA-1 10:40:08 jim
AEAD_CHACHA20_POLY1305 10:39:00 jim
CHACHA20-POLY1305 10:37:13 jim
Authenticated Encryption with Associated Data (AEAD) Parameters 10:36:04 jim
Authenticated Encryption with Associated Data 10:35:04 jim
RFC 7539 10:28:30 jim
Poly1305 10:24:17 jim
ChaCha20 10:22:56 jim
ChaCha 10:21:10 jim
CBC-MAC 10:18:12 jim
CCM 10:17:01 jim
RFC-5288 10:11:13 jim
AES-GCM 10:10:19 jim
State Cipher 10:00:40 jim
Stream Cipher 09:59:58 jim
Pseudorandom 09:58:07 jim
Salsa20 09:47:35 jim
Web Blog_blogentry_240217_1 09:44:00 jim
HMAC-SHA2 09:41:08 jim
HMAC-SHA1 09:39:45 jim
HMAC-MD5 09:39:20 jim
RFC 3174 09:15:28 jim
21.02.2017
ISO 29115 16:49:26 jim
Common Access Card 16:37:41 jim
CAC 16:36:56 jim
Credential Service Provider 16:10:16 jim
Claimant 16:05:30 jim
Vectors of Trust 15:29:40 jim
M-04-04 Level of Assurance (LOA) 15:16:10 jim
NIST Electronic Authentication Guideline 15:15:28 jim
Identity Trust Framework 15:13:21 jim
Web Blog_blogentry_210217_1 15:03:09 jim
VoT 14:59:02 jim
FAL 14:37:37 jim
Federation Assurance Level 14:37:19 jim
FAL 2 14:35:38 jim
FAL 3 14:34:59 jim
FAL 1 14:29:15 jim
Holder-of-Key 12:20:29 jim
Bearer 12:19:07 jim
Federation 11:26:28 jim
Federation/federation.png 11:22:27 jim Federation Image
Assertion 11:19:23 jim
NIST.SP.800-63C 11:17:25 jim
NIST.SP.800-63A 11:14:13 jim
Authenticated Protected Channel 11:09:43 jim
BCP 195 11:09:08 jim
Password Periodic Changes 10:17:15 jim
Password Grace Authentication 09:43:18 jim
20.02.2017
Web Blog_blogentry_200217_2 18:05:53 jim
Web Blog_blogentry_200217_2/rest-ahead.jpg 18:04:52 jim REST Ahead
AuthZ 17:51:52 jim
Industry 4.0 17:38:29 jim
Industry 4.0/Industry-4-framework.jpg 17:32:35 jim industry 4.0 Framework and Contributing digital technologies
Domain Logic 14:57:04 jim
Business Logic 14:51:39 jim
UI 14:41:13 jim
User Interface 14:40:53 jim
DoD 14:36:59 jim
NIS 14:20:57 jim
Phone Line 14:18:30 jim
Peer-to-peer 14:15:05 jim
Multicast 14:13:42 jim
Wireless Access Point 14:12:15 jim
Public Switched Telephone Network 14:10:43 jim
Network Basic Input-Output System 14:09:41 jim
Virtual Private Network 14:08:25 jim
Mobile Network 14:03:41 jim
Public Land Mobile Network 14:03:22 jim
Payment Network 14:01:18 jim
Network Cables 14:00:12 jim
Year 1994 13:55:36 jim
Intranet 13:55:14 jim
WAN 13:53:00 jim
Wide Area Network 13:52:42 jim
LAN 13:48:41 jim
Network 13:45:59 jim
Extranet 13:44:01 jim
Web Blog_blogentry_200217_1 13:18:42 jim
Delegation 10:01:39 jim
OAuth-Token-Exchange 09:55:14 jim
16.02.2017
Cardholder Verification Method Condition Code 13:42:57 jim
2.16.840.1.113719.1.14.100.59 13:39:09 jim 2.16.840.1.113719.1.14.100.59x ==> 2.16.840.1.113719.1.14.100.59
2.16.840.1.113719.1.14.100.17 13:35:59 jim 2.16.840.1.113719.1.14.100.17x ==> 2.16.840.1.113719.1.14.100.17
2.16.840.1.113719.1.14.100.53 13:34:33 jim 2.16.840.1.113719.1.14.100.53x ==> 2.16.840.1.113719.1.14.100.53
2.16.840.1.113719.1.14.100.39 13:00:38 jim 2.16.840.1.113719.1.14.100.39x ==> 2.16.840.1.113719.1.14.100.39
2.16.840.1.113719.1.14.100.57 12:59:13 jim 2.16.840.1.113719.1.14.100.57x ==> 2.16.840.1.113719.1.14.100.57
2.16.840.1.113719.1.14.100.15 12:58:29 jim 2.16.840.1.113719.1.14.100.15x ==> 2.16.840.1.113719.1.14.100.15
2.16.840.1.113719.1.14.100.55 12:56:56 jim 2.16.840.1.113719.1.14.100.55x ==> 2.16.840.1.113719.1.14.100.55
WikiRPCInterface 12:54:31 jim
UTF-8 12:51:06 jim
1.3.6.1.4.1.1466.115.121.1.15 12:48:09 jim
2.5.5.12 12:46:14 jim
ServicePrincipalName 12:43:25 jim
ServiceDNSName 12:40:41 jim
ServiceConnectionPoint 12:33:19 jim
Service Connection Points 12:25:12 jim
SCP 12:23:02 jim
TRUSTED_FOR_DELEGATION 11:28:12 jim
Kerberos Delegation 11:27:03 jim Microsoft Active Directory Delegation ==> Kerberos Delegation
12.02.2017
United States Social Security Administration 11:44:04 jim
Social Security Number 11:39:33 jim
IAM Project Intangibles 11:35:44 jim
IAM Charter 10:59:23 jim
11.02.2017
SEC 21:05:26 jim
United States Securities and Exchange Commission 21:04:56 jim
Financial Industry Regulatory Authority Inc 21:01:36 jim
FinCEN 21:00:02 jim
Year 1789 20:59:27 jim
United States Department of the Treasury 20:59:09 jim
Financial Crimes Enforcement Network 20:55:51 jim
Bank Secrecy Act 20:53:14 jim
Customer Identification Program 20:49:51 jim
KYC 20:31:50 jim
AML 20:29:05 jim
CIP 20:28:28 jim
USA PATRIOT Act 20:24:31 jim
Anti-Money Laundering 20:19:30 jim
Year 1970 20:18:08 jim
10.02.2017
Web Blog_blogentry_100217_1 09:41:30 jim
IAM Six Stages 09:17:58 jim
API Adoption 08:55:28 jim
09.02.2017
IDM and the Organization Dilemma 14:25:54 jim
FTTx 13:33:50 jim
Local Exchange 13:33:18 jim
Long Distance Provider 13:32:52 jim
Telecommunications Network Chain 13:27:14 jim
Last Mile Loop 13:13:29 jim Local Loop ==> Local Exchange
E.164 13:01:29 jim
Land Line 12:55:42 jim
Phone Number Portability 12:53:11 jim LandLine ==> Land Line
Phone Number 12:35:37 jim
Social Engineering Attacker 12:21:32 jim
31.01.2017
Trudy 15:06:31 jim
Mallet 15:05:55 jim
Supported Groups Registry 10:31:46 jim
RFC 4492 10:21:39 jim
Diffie-Hellman Ephemeral 10:14:56 jim
RFC 7919 10:11:25 jim
DHE 09:57:21 jim
29.01.2017
RFC 4918 21:12:42 jim
25.01.2017
MAY 13:32:40 jim
MUST 13:32:29 jim
REQUIRED 13:32:05 jim
SHOULD NOT 13:31:47 jim
SHOULD 13:31:14 jim
SHALL 13:30:44 jim
RECOMMENDED 13:30:29 jim
NOT RECOMMENDED 13:30:16 jim
SHALL NOT 13:29:58 jim
MUST NOT 13:29:40 jim
Site Certificate 13:28:25 jim
Intermediate Certificate 13:07:07 jim
Monitoring Edirectory Synchronization 10:39:51 jim
Maximum Ring Delta 10:02:53 jim
PartitionStatus 10:01:03 jim
Entity 09:30:22 jim
24.01.2017
DAC 12:06:02 jim
23.01.2017
Web Blog_blogentry_230117_1 17:09:53 jim
Year 2018 12:09:11 jim
Custodian 12:08:33 jim
RFC 2314 11:54:49 jim
RFC 2986 11:52:20 jim
PKCS10 11:51:39 jim
Certification Request Syntax 11:51:22 jim Certification Request Standard ==> Certification Request Syntax
Organization Validated Certificate 11:37:57 jim
Domain Validated Certificate 11:36:29 jim
Certificate Level Of Assurance 11:32:49 jim
Certificate Validation Levels 11:30:37 jim
Extended Validation Certificate/ev21.jpg 11:23:48 jim EV Display
20.01.2017
Discovery Mechanism 10:35:48 jim
Web Service Security Specifications 10:34:17 jim
Web Service Definition Language 10:32:42 jim
Year 1967 10:31:46 jim
ODJFS 10:29:05 jim
PAM on AIX 10:28:38 jim
OASIS 10:25:51 jim
Organization for the Advancement of Structured Information Standards 10:25:28 jim
SAML 10:21:42 jim
IBM 10:19:02 jim
WS-Security Tokens 10:17:16 jim
Web Services Inspection Language 10:16:40 jim
Web Services Dynamic Discovery 10:16:12 jim
BPEL 10:14:50 jim
WS-BPEL 10:14:21 jim
Business Process Execution Language 10:13:48 jim
ServiceMix 10:11:13 jim
WS-Specifications 10:08:05 jim
Web Services Security 10:02:43 jim
Web Service 09:59:41 jim
WSIL 09:54:47 jim
WS-Inspection 09:54:16 jim
WS-Discovery 09:48:46 jim
Web Services Description Language 09:38:16 jim
WSDL 09:36:40 jim
Universal Description, Discovery, and Integration 09:34:18 jim
UDDI 09:32:42 jim
OpenID.Registration 09:24:21 jim
13.01.2017
Security Considerations 11:39:22 jim
Server-Side Login throttling schemes 11:37:42 jim
PwdLockout 11:24:28 jim
AD Determining Password Expiration 10:56:28 jim
Password Maximum Age 10:48:43 jim
12.01.2017
IdMA 11:51:45 jim
IAM 11:49:22 jim
IDMA Too Many Names 11:49:06 jim
IDAM 11:42:46 jim
Identity Management 11:38:02 jim
SubjectAltName 09:39:03 jim
10.01.2017
NSA Suite B Cryptography 11:19:12 jim
FIPS 140 11:17:57 jim
Public Key Algorithm 11:03:05 jim
Certificate Signature Algorithm 11:01:59 jim
Algorithm 11:01:15 jim
Luhn Algorithm 10:59:53 jim
Suite B 10:52:17 jim
RFC 6460 10:51:44 jim
Web Blog_blogentry_100117_1 10:42:31 jim
NSA 10:39:42 jim
SHA-3 10:39:18 jim
United States Constitution 09:31:34 jim
US 09:30:36 jim