jspωiki
FullRecentChanges

These are all of the changes made to these pages. A much shorter list is available in RecentChanges.

19.04.2018
Risk-Based Authentication 18:45:27 jim
Web Blog_blogentry_190418_1 18:27:43 jim
Authentication Context Class vs Authentication Method Reference 18:14:17 jim
Non-interactive 18:07:29 jim
Interactive 18:01:44 jim
Windows Logon Types 17:45:43 jim
Windows Event Log 17:41:56 jim
Windows Security Log Event 17:40:31 jim
Windows Security Event Log 17:39:54 jim Security Event Log ==> Windows Security Event Log
System Access Control List 17:37:30 jim
Microsoft Active Directory Anomalies 17:34:39 jim
Create a MAD Service To Run 17:32:54 jim
Windows registry 17:31:46 jim
Service Control Manager 17:31:37 jim
SCM 17:19:09 jim
Active Directory Account Lockout 17:14:42 jim
18.04.2018
ipProtocolNumber 17:58:27 jim
1.3.6.1.1.1.2.3 17:54:35 jim
IpServiceProtocol 17:54:00 jim
IpService 17:50:53 jim
1.3.6.1.1.1.1.15 17:47:01 jim
IpServicePort 17:46:08 jim ipServicePort ==> IpServicePort
NisNetgroupTriple 17:42:35 jim
NisNetgroup 17:39:41 jim
MemberNisNetgroup 17:36:12 jim
PosixGroup 17:22:13 jim
MemberUid 17:18:42 jim
ShadowInactive 17:12:12 jim
ShadowLastChange 17:11:32 jim
ShadowAccount 17:08:51 jim
ShadowFlag 17:06:06 jim
1.3.6.1.4.1.42.2.27.8.1.28 17:04:02 jim
ShadowExpire 17:03:43 jim
1.3.6.1.1.1.1.9 17:00:37 jim
2.5.13.15 16:57:05 jim
IntegerOrderingMatch 16:56:47 jim
ShadowWarning 16:54:09 jim
ShadowMax 16:48:18 jim
1.3.6.1.1.1.1.7 16:46:46 jim
ShadowMin 16:45:44 jim
1.3.6.1.1.1.1.6 16:44:39 jim
shadowLastChange 16:40:56 jim
LoginShell 16:38:02 jim
IA5String 16:33:51 jim
1.3.6.1.4.1.1466.115.121.1.26 16:33:27 jim
HomeDirectory 16:32:22 jim
CaseExactIA5Match 16:30:04 jim
Gecos 16:23:59 jim
GidNumber 16:18:58 jim
UidNumber 16:14:26 jim
automountMapName 14:24:27 jim
NisDomainObject 14:18:19 jim
1.3.6.1.1.1.2.15 14:17:07 jim
NisDomain 14:15:36 jim
SchemaRFC2307Bis 14:07:10 jim
Draft-howard-rfc2307bis 14:05:56 jim
2.5.13.13 13:27:18 jim
1.3.6.1.4.1.1466.101.120.6 13:26:43 jim
1.3.6.1.1.11.1.1 13:25:31 jim
2.5.4.50 13:25:03 jim
2.5.13.20 13:24:33 jim
1.3.6.1.4.1.4203.1.3.5 13:24:09 jim
1.3.6.1.4.1.1466.101.120.7 13:23:46 jim
1.3.6.1.4.1.1466.101.120.13 13:23:31 jim
2.5.23.4 13:23:10 jim
2.5.4.65 13:22:32 jim
1.3.6.1.4.1.11.1.3.1.1.2 13:22:00 jim
2.5.4.41 13:20:55 jim
2.5.21.8 13:20:25 jim
2.5.21.4 13:20:04 jim
2.5.13.14 13:19:29 jim
0.9.2342.19200300.100.1.9 13:18:54 jim
2.5.21.10 13:18:27 jim
2.5.13.28 13:17:59 jim
2.5.13.27 13:17:38 jim
1.2.840.113549.1.9.1 13:16:42 jim
EmailAddress 13:15:55 jim
1.3.6.1.4.1.11.1.3.1.2.5 13:10:26 jim
DITContentRules 13:08:13 jim DitContentRules ==> DITContentRules
Understanding DIT Content Rules 13:08:00 jim
Subschema 13:07:29 jim
OperationalAttribute 13:06:57 jim
ObjectClass 13:06:35 jim
DIT Content Rule Description 13:06:14 jim
DIT Content Rule 13:05:58 jim
2.5.21.2 13:05:38 jim
1.2.36.79672281.1.13.6 13:03:00 jim
AllComponentsMatch 13:02:41 jim
OpenAssertionType 12:58:54 jim
1.2.36.79672281.1.5.3 12:51:41 jim
1.2.36.79672281.1.13.7 12:48:03 jim
DirectoryComponentsMatch 12:47:39 jim
DepartmentNumber 12:41:28 jim
2.5.18.7 12:39:58 jim
2.5.20.2 12:39:32 jim
2.5.18.12 12:39:02 jim
2.5.23.5 12:38:41 jim
2.5.13.4 12:38:01 jim
2.5.23.6 12:37:24 jim
CaseIgnoreMatch 12:35:42 jim
2.5.13.2 12:30:38 jim
2.5.13.7 12:30:12 jim
1.3.6.1.4.1.1466.109.114.1 12:29:39 jim
2.5.13.6 12:29:14 jim
2.5.13.5 12:23:40 jim
DomainComponent 12:22:23 jim
DC 12:20:34 jim
RFC 1034 12:12:47 jim
RFC 2181 12:12:25 jim
RFC 1123 12:10:08 jim
RFC 5891 12:03:10 jim
RFC 5890 12:01:53 jim
IDNA 11:56:15 jim
Internationalizing Domain Names in Applications 11:55:43 jim
RFC 3490 11:55:02 jim
Dc 11:52:18 jim
2.16.840.1.113719.1.167.6.2.1 11:51:01 jim
1.3.6.1.4.1.1466.344 11:50:38 jim
0.9.2342.19200300.100.4.13 11:50:17 jim
RFC 4234 11:48:02 jim
0.9.2342.19200300.100.1.25 11:45:32 jim
2.16.840.1.113719.1.8.4.5 11:31:15 jim
2.5.6.6 11:30:48 jim
Person 11:30:26 jim
Company 11:23:16 jim
Digital Identity 11:18:32 jim
Identity Cube 10:18:28 jim
Credential 09:56:11 jim
Credential Repository 09:45:00 jim
Edirectory Back-Ups And Clones 09:43:16 jim
Backup 09:42:21 jim
Incremental Backup 09:41:26 jim
Berkeley DB Java Edition 09:38:29 jim BerkeleyDBJavaEdition ==> Berkeley DB Java Edition
Glossary Of LDAP And Directory Terminology 09:37:53 jim
LDAP Indexes 09:30:54 jim
Changelog 09:29:18 jim
Back-end 09:27:56 jim
17.04.2018
0.9.2342.19200300.100.4.5 19:07:34 jim
2.5.23.2 19:07:09 jim
1.3.6.1.4.1.1466.101.120.1 19:04:56 jim
AdministratorsAddress 19:03:52 jim
0.9.2342.19200300.100.1.8 19:02:06 jim
0.9.2342.19200300.100.1.5 19:01:44 jim
0.9.2342.19200300.100.1.4 18:59:59 jim
0.9.2342.19200300.100.1.2 18:59:28 jim
CarLicense 18:45:12 jim
2.16.840.1.113730.3.1.1 18:44:07 jim
INTEGER 18:34:55 jim
BIT STRING 18:26:52 jim
BitStringMatch 18:24:19 jim
2.5.13.16 17:58:56 jim
RFC 2798 17:52:17 jim
RFC 4519 17:50:58 jim
1.3.6.1.1.3.1 17:48:23 jim
UidObject 17:46:09 jim
LDAP Family 17:40:29 jim
LDAP Message 17:34:18 jim
LDAP Object Identifier Descriptors 17:23:23 jim
VPIMUser 17:22:02 jim
RFC 4237 17:16:04 jim
Reciprocal OAuth 09:35:46 jim
Web Blog_blogentry_170418_1 09:32:46 jim Reciprocal Authorization Flow ==> Reciprocal OAuth
16.04.2018
IDM Tricks 20:43:47 jim
Novell IDM Driver Filters 20:43:29 jim
Troubleshooting DirXML 20:32:28 jim
AdministrativeRole 11:59:25 jim
CollectiveAttributeInnerArea 11:58:28 jim
CollectiveAttributeSpecificArea 11:58:11 jim
SubschemaAdminSpecificArea 11:58:00 jim
AccessControlSpecificArea 11:57:45 jim
AutonomousArea 11:57:27 jim
ApplicationEntity 11:53:27 jim
RFC 2256 11:48:58 jim
Version 11:44:58 jim
Newsuperior 11:42:19 jim
2.16.840.1.113730.3.1.11 11:39:07 jim
Modify 11:37:19 jim
Newrdn 11:35:49 jim
Moddn 11:34:05 jim
Increment 11:33:32 jim
Dn 11:32:13 jim
Delete 11:30:32 jim
Add 11:23:11 jim
Deleteoldrdn 11:22:10 jim
Changetype 11:21:30 jim
Control 11:21:21 jim
EntryDN 11:15:43 jim
2.5.23.3 11:02:21 jim
AccessControlInnerArea 11:01:13 jim
RFC 3296 10:54:19 jim
RFC 8284 10:50:48 jim
RFC 5020 10:49:40 jim
RFC 2589 10:48:38 jim
RFC 2247 10:47:05 jim
RFC 6109 10:46:03 jim
RFC 7612 10:44:30 jim
RFC 3712 10:43:43 jim
RFC 4403 10:41:33 jim
RFC 7532 10:39:49 jim
RFC 2293 10:38:29 jim
RFC 2739 10:37:22 jim
RFC 2164 10:35:57 jim
RFC 4104 10:34:52 jim
Audio 09:43:31 jim
X-NOT-HUMAN-READABLE 09:34:11 jim
1.3.6.1.4.1.1466.115.121.1.4 09:32:05 jim
0.9.2342.19200300.100.1.55 09:21:13 jim
1.3.6.1.4.1.1466.115.121.1.20 09:12:06 jim
DSE Type 09:10:18 jim
Attribute Type Description 08:57:24 jim
1.3.6.1.4.1.1466.115.121.1.1 08:54:30 jim
ACI Item 08:53:58 jim
ACI 08:53:17 jim
Access Point 08:46:44 jim
Microsoft Active Directory Syntax 08:45:37 jim
Zero 08:42:17 jim
Signed int 08:38:28 jim
ADSTYPE_DN_WITH_BINARY 08:29:12 jim
2.5.5.15 08:26:13 jim
ADSTYPE_NT_SECURITY_DESCRIPTOR 08:24:16 jim
1.2.840.113556.1.4.907 08:24:07 jim
ADSTYPE_BOOLEAN 08:17:58 jim
ADSTYPE_OCTET_STRING 08:16:29 jim
SID string 08:14:27 jim
Security Identifier 08:11:33 jim
15.04.2018
SDDL 20:09:32 jim
NT-Sec-Desc 20:09:12 jim
ABNF 20:07:08 jim
RFC 5234 20:06:38 jim
Security Descriptor Description Language 20:04:46 jim
Security Descriptor 20:01:46 jim
2.5.5.14 19:46:26 jim
2.5.5.13 19:45:05 jim
2.5.5.12 19:43:29 jim
2.5.5.10 19:41:02 jim
ADSTYPE_INTEGER 19:39:14 jim
Enumeration syntax 19:38:56 jim
2.5.5.8 19:37:30 jim
2.5.5.7 19:32:58 jim
2.5.5.6 19:27:42 jim
2.5.5.5 19:24:24 jim
Telex 19:22:30 jim
2.5.5.2 19:21:15 jim
MSADTS 19:16:46 jim
Microsoft Active Directory Technical Specification 19:16:29 jim
2.5.5.3 19:14:26 jim
2.5.5.11 19:13:53 jim
ADSTYPE_CASE_EXACT_STRING 19:07:39 jim
1.2.840.113556.1.4.905 19:03:36 jim
UTCTime 18:57:13 jim
Decision Tree 18:35:07 jim
Machine Learning Algorithms 18:33:21 jim
Naive Bayes 18:28:12 jim
Training dataset 18:27:41 jim
GeneralizedTime 17:34:09 jim
Presentation Address 17:32:24 jim
ADSTYPE_LARGE_INTEGER 17:26:43 jim
VisibleString 12:59:31 jim
VideotexString 12:59:17 jim
UTF8String 12:59:09 jim
UniversalString 12:58:59 jim
TeletexString 12:58:51 jim
Gender 12:57:28 jim Printable String ==> PrintableString
LDAPSyntaxes 12:57:28 jim Printable String ==> PrintableString
SYNTAX 12:57:28 jim Printable String ==> PrintableString
Telephone Number LDAP Syntax 12:57:28 jim Printable String ==> PrintableString
CaseExactMatch 12:57:27 jim Printable String ==> PrintableString
CaseExactOrderingMatch 12:57:27 jim Printable String ==> PrintableString
CaseExactSubstringsMatch 12:57:27 jim Printable String ==> PrintableString
PrintableString 12:57:27 jim Printable String ==> PrintableString
Supertype 12:56:48 jim IA5 String ==> IA5String
DNSName 12:56:47 jim IA5 String ==> IA5String
GraphicString 12:56:13 jim
GeneralString 12:56:05 jim
BMPString 12:55:42 jim
CaseIgnoreString 12:53:44 jim Directory String ==> DirectoryString
DirXML-NTAccountName 12:53:44 jim Directory String ==> DirectoryString
Directory (Case Ignore) String 12:53:44 jim Directory String ==> DirectoryString
NickName 12:53:44 jim Directory String ==> DirectoryString
SupportedSASLMechanisms 12:53:44 jim Directory String ==> DirectoryString
1.3.6.1.4.1.1466.115.121.1.15 12:53:43 jim Directory String ==> DirectoryString
DirectoryString 12:53:43 jim Directory String ==> DirectoryString
ADSTYPE_NUMERIC_STRING 12:52:09 jim Numeric String ==> NumericString
Object Class Description 12:52:09 jim Numeric String ==> NumericString
1.3.6.1.4.1.1466.115.121.1.36 12:52:08 jim Numeric String ==> NumericString
NumericString 12:52:08 jim Numeric String ==> NumericString
Component Matching Rules 12:48:41 jim
RFC 3687 12:38:28 jim
LDAP String Matching 12:37:23 jim
MatchingRule 12:32:34 jim
CaseExactString 12:21:26 jim
2.5.5.1 12:15:17 jim
ADSTYPE_DN_WITH_STRING 12:04:36 jim
ADSTYPE_CASE_IGNORE_STRING 12:04:06 jim
ADSTYPE_DN_STRING 12:03:39 jim
ADSTYPE_UTC_TIME 12:02:22 jim
ADsType 12:01:58 jim
2.5.5.4 12:00:53 jim
DNWithString 11:54:34 jim
1.2.840.113556.1.4.904 11:52:04 jim
OR-Name 10:22:27 jim
1.2.840.113556.1.4.1221 10:16:45 jim
1.2.840.113556.1.4.903 10:16:11 jim
Draft-armijo-ldap-syntax-00 10:13:14 jim
DNWithOctetString 10:11:50 jim
LDAP_MATCHING_RULE_DN_WITH_DATA 10:09:23 jim DN-Binary ==> DNWithOctetString
1.2.840.113556.1.4.1362 10:02:15 jim
OID Syntax 09:56:22 jim
1.3.6.1.4.1.1466.115.121.1.38 09:51:29 jim
Replica Link 09:32:30 jim
1.3.6.1.4.1.1466.115.121.1.43 09:26:42 jim
2.5.5.9 08:51:54 jim
Interval Syntax 08:47:12 jim
LargeInteger 08:43:10 jim
OctetString 08:28:12 jim
1.3.6.1.4.1.1466.115.121.1.40 08:26:24 jim
System-Id-Guid 08:17:27 jim
1.2.840.113556 08:15:02 jim
Country-Code 08:10:20 jim
14.04.2018
Web Blog_comments_170914_1 11:52:34 AKUJineafe
International Standard Recording Code 10:55:56 jim
ISO 4217 10:51:10 jim
Currency Code 10:48:18 jim
ISO 3166-1 alpha-2 10:34:17 jim
Data Country Codes 10:16:57 jim
CountryName 10:15:41 jim
Co 10:14:52 jim
FriendlyCountryName 10:13:23 jim
Language-Tag 10:04:44 jim
Language 09:59:07 jim
Country Code 09:56:47 jim
CountryCode 09:49:08 jim
1.2.840.113556.1.4.25 09:09:25 jim
Web Blog_blogentry_140418_1 09:00:32 jim
13.04.2018
ETH 10:39:31 jim
Compare Request 09:27:30 jim
Modify DN Response 09:24:25 jim
ModifyDNRequest 09:21:58 jim
Delete Response 09:20:50 jim
Delete Request 09:16:08 jim
LDAP Result 09:14:08 jim
Add Response 09:13:28 jim
Add Request 09:09:32 jim
Modify Response 09:08:36 jim
Modify Request 09:06:44 jim
SearchResultDone 09:05:32 jim
SearchResultEntry 09:03:17 jim
SearchRequest 09:01:30 jim
Unbind Request 09:00:32 jim
Bind Request 08:58:35 jim
Bind Response 08:58:16 jim
EDirectory LDAP Transaction 08:52:12 jim
Transaction Account 08:40:30 jim
Transaction 08:39:20 jim
Account 08:37:46 jim
Distributed Ledger Technology 08:32:43 jim
Ethereum 08:24:59 jim
Ether 08:16:15 jim
Nakamoto consensus 08:12:19 jim
Web Blog_blogentry_130418_1 07:59:20 jim
Sovereign-source Identity 07:47:35 jim
SSI 07:42:46 jim
Self-Sovereign Identity 07:41:27 jim
12.04.2018
Legitimacy of Social Login 16:33:00 jim
Cloud Identity Providers 16:21:31 jim
Web Blog_blogentry_090418_1 16:07:57 jim
Google OpenID Connect 14:45:24 jim
Include_granted_scopes 14:36:25 jim
Active Directory and Passwords 10:12:17 jim
Decentralized Exchange 09:54:48 jim
Perspectives Project 09:51:18 jim
EFF 09:48:27 jim
Free Software Foundation 09:47:35 jim
Electronic Frontier Foundation 09:47:20 jim
Intellectual Property 09:46:52 jim
Digital Rights Management 09:45:09 jim
Digital Asset 09:42:02 jim
Web Blog_blogentry_120418_1 09:28:07 jim
Containerization 09:18:12 jim
Network devices 09:16:41 jim
Data Center 09:16:20 jim
Host 09:15:27 jim
Container Orchestration 09:12:34 jim
Operating-system-level virtualization 08:56:40 jim
Docker 08:55:58 jim
Virtual Machine 08:46:44 jim
Virtualization method 08:41:17 jim
Container 08:35:51 jim
Ephemeral 08:34:54 jim
Functions as a Service 08:33:25 jim
Computing Service 08:30:47 jim
Platform as a Service 08:30:18 jim
Software as a Service 08:27:37 jim
Infrastructure as a Service 08:26:22 jim
EdirectoryPasswords 07:56:24 jim
Password Management 07:52:06 jim
PWFILTER Windows Events 07:49:10 jim
DirXML PWFILTER.DLL 07:48:16 jim
AD Driver version 4.0.0.4 07:46:43 jim
AD Password Filters 07:46:00 jim
11.04.2018
Extract Transform Load 18:09:20 jim
NetworkAddress 15:33:03 jim
HTTP Status Code 15:31:02 jim
Bug 15:27:59 jim
Product Backlog 15:25:33 jim
Backlog 15:23:32 jim
Iteration Planning 15:22:00 jim
Sprint Backlog 15:16:26 jim
Iteration Backlog 15:11:49 jim
Product Owner 14:06:02 jim
Delivery Team 14:02:42 jim
Scrum Team 13:59:56 jim
Development Team 13:46:22 jim
Web Blog_blogentry_090318_1 13:00:24 jim WC3 WebAuthn ==> W3C WebAuthn
WebAuthn 13:00:24 jim WC3 WebAuthn ==> W3C WebAuthn
W3C WebAuthn 13:00:23 jim WC3 WebAuthn ==> W3C WebAuthn
FIDO Standards 12:59:25 jim
K-Nearest Neighbor 12:49:58 jim
Supervised Learning 12:46:45 jim
KNN 12:45:18 jim
Artificial Intelligence 12:11:45 jim
Cognitive Security 12:08:36 jim
Anomaly Detection 08:29:40 jim
Data-lake 08:23:32 jim
Buzzword 08:20:35 jim
Data mining 08:18:36 jim
Web Blog_blogentry_110418_1 08:06:26 jim
10.04.2018
Centralized Exchange 11:01:51 jim
DEX 10:59:29 jim
Digital Currency Exchange 10:45:28 jim
Fiat Currency 10:14:12 jim
Commodity 10:11:12 jim
Money 10:05:49 jim
Cryptocurrency 09:48:44 jim
Distinguished Names 09:07:05 jim
DistinguishedNameMatch 08:51:07 jim
String Representation of Distinguished Names 08:45:24 jim
DN Syntax 08:35:19 jim
09.04.2018
Authentication Context Class 17:08:00 jim
Graded Authentication 16:41:54 jim
Incremental authorization 16:25:18 jim
OAuth 2.0 Incremental Authorization 16:16:11 jim
Network-Auth 16:07:10 jim
Implicit Scopes 16:00:55 jim
OAuth Scope Example 15:57:53 jim
Elevated Token 15:55:05 jim
Trust Elevation 15:45:24 jim
Windows Logon 15:37:20 jim
Event 4625 15:28:56 jim
Event 4624 15:22:20 jim
Active Directory Group Related Searches 15:08:32 jim
08.04.2018
ERC20 21:23:51 jim
Repudiation 20:26:00 jim
Zero-knowledge proof 20:07:36 jim
ZKP 20:04:15 jim
07.04.2018
Common Event Format 13:58:00 jim
ArcSight 13:53:49 jim
CEF 13:52:59 jim
Event System 13:47:43 jim
EDirectory Version 13:38:39 jim
NDS Unknow Entries 13:31:04 jim
Flat Cleaner 13:24:21 jim
Limber 13:22:47 jim
EDirectory Synchronization 13:15:45 jim
Change Cache 13:13:32 jim
Imonitor 12:57:31 jim
Translation Processor 12:39:57 jim
Out of Band Requests 12:39:07 jim
Events vs Commands 12:38:35 jim
DirXML Out-of-Band Requests 12:29:29 jim IDM Out-of-Band Requests ==> DirXML Out-of-Band Requests
DirXML Trace File Searches 12:25:57 jim
DirXML Toolbox 12:25:38 jim
DirXML 12:25:22 jim
DirXML Required Reading 12:23:56 jim Novell IDM Required Reading ==> DirXML Required Reading
DirXML Level Three Trace 12:20:09 jim NIDM Trace File Searches ==> DirXML Trace File Searches
Jims Toolbox 12:14:10 jim IDM Toolbox ==> DirXML Toolbox
Single Logout 12:08:03 jim
Logged out 12:07:34 jim
OpenID Connect Back-Channel Logout 12:05:40 jim
Why Use Tokens 12:04:14 jim
SAML V2.0 12:02:32 jim
Remember Me 11:59:01 jim
PostMessage 11:56:57 jim
Response_mode 11:56:37 jim
Check_session_iframe 11:56:02 jim
Logging Out 11:54:39 jim Window.postMessage ==> PostMessage
Single Logout Profile 11:18:41 jim
IDP Metadata 11:17:39 jim
Transport Layer Security 09:54:14 jim
Secure connection 09:43:50 jim
Pre-Shared Key 09:38:43 jim
Shared Secret 09:37:07 jim
Internet Threat Model 09:25:34 jim
Threat Model 09:19:16 jim
TLS 1.3 09:11:30 jim
0-RTT Handshakes 09:10:14 jim
TLS Session Resumption 08:56:17 jim
06.04.2018
OAuth 2.0 JWT Secured Authorization Request 09:54:14 jim
04.04.2018
Identity Lifecycle Management 10:55:52 jim
Account termination 10:52:54 jim
Logout Mechanism 10:50:30 jim
JSESSIONID 10:44:35 jim
Session 10:42:16 jim
LAG-catalina.out 10:41:42 jim
OpenID Connect Session Management 10:34:05 jim
OpenID Connect Front-Channel Logout 10:33:47 jim
03.04.2018
Token Revocation 10:48:58 jim
GraphQL 10:19:32 jim
Round-Trip Time 10:09:25 jim
RTT 10:04:19 jim
Round-trips 10:00:55 jim
Representational State Transfer 09:56:19 jim
Architecture 09:47:16 jim
Hypermedia As The Engine Of Application State 08:57:28 jim
Link Relation Types 08:48:40 jim
HTTP PATCH 08:23:10 jim
01.04.2018
Revocation model 08:45:39 jim
OAuth 2.0 Token Introspection 08:41:07 jim
30.03.2018
2.5.18.1 10:43:08 jim
CreateTimestamp 10:42:45 jim
Timeout 10:07:11 jim
Logout Process 09:38:35 jim
What is missing in OAuth 2.0 09:21:06 jim
29.03.2018
DirXML Events and Commands 17:13:54 jim
Translation Processor/tranlation-processor-sub.jpg 17:03:22 jim translation-processor
Schema Mapping Policy 12:37:25 jim
XDS Document 12:32:58 jim
DirXML event 12:15:46 jim
DirXML command 12:11:48 jim
DirXML Engine 12:05:48 jim
Event Transformation Policy Set 12:02:11 jim
Merge operation 11:57:43 jim
DirXML Engine/newfishbonediagram.png 11:07:54 jim newfishbonediagram.png
LDAP 4 10:59:25 jim
LDAP Result Codes 10:56:56 jim
X-NDS_NOT_CONTAINER 10:50:06 jim
Leaf 10:49:37 jim
ObjectClass=unknown 10:45:05 jim
Forward Reference 10:00:40 jim
Web Blog_blogentry_290318_1 09:52:47 jim
28.03.2018
MemberQueryURL 14:12:26 jim
MemberQuery 14:12:07 jim
ObjectSID 13:07:05 jim
Impersonation Token 12:51:32 jim
NO_IMPERSONATION_TOKEN 12:50:38 jim
Access Token 12:17:10 jim
Primary Access Token 12:15:00 jim
PrimaryGroupID 11:39:57 jim
1.2.840.113556.1.4.98 11:36:09 jim
RID 11:26:00 jim
Relative IDentifier 11:25:43 jim Relative ID ==> Relative IDentifier
Operating System 10:42:59 jim
Well-known Security Identifiers 10:40:44 jim
27.03.2018
CachedInteractive 17:27:12 jim
RemoteInteractive 17:23:43 jim
Remote Desktop Protocol 17:20:54 jim
RDP 17:18:42 jim
NewCredentials 17:15:20 jim
NetworkCleartext 17:13:24 jim
Unlock-Device 17:10:11 jim
Service-Auth 17:05:30 jim
Batch-Auth 17:03:35 jim
Login ID 14:35:30 jim
Uid 14:35:00 jim
Web Blog_blogentry_270318_1 13:34:22 jim
26.03.2018
Fine Grained Password Policies 15:55:09 jim
PSO 15:52:40 jim
MsDS-PasswordSettings 15:52:01 jim
Group Policy Object 15:49:41 jim Group Policy ==> Group Policy Object
GPO 15:49:16 jim
PwdProperties 15:48:44 jim
Max-Pwd-Age Attribute 15:48:20 jim
Local Security Authority 15:48:02 jim
LAN Manager authentication level 15:47:44 jim
How passwords are used in Windows 15:47:27 jim
Dynamic Access Control 15:46:41 jim
AD Determining Password Expiration 15:46:23 jim
1.2.840.113556.1.4.2023 15:39:36 jim
MsDS-PasswordSettingsPrecedence 15:38:55 jim
MsDS-PSOAppliesTo 15:32:10 jim
1.2.840.113556.1.4.2013 15:25:53 jim
1.2.840.113556.1.4.2014 15:25:33 jim
1.2.840.113556.1.4.2015 15:25:02 jim
1.2.840.113556.1.4.2016 15:24:32 jim
1.2.840.113556.1.4.2017 15:24:13 jim
1.2.840.113556.1.4.2018 15:23:40 jim
1.2.840.113556.1.4.2019 15:23:15 jim
1.2.840.113556.1.4.2020 15:22:42 jim
MsDS-PasswordSettingsContainer 15:19:18 jim
MsDS-LockoutThreshold 15:18:56 jim
MsDS-LockoutDuration 15:16:58 jim
MsDS-LockoutObservationWindow 15:15:08 jim
MsDS-PasswordReversibleEncryptionEnabled 15:12:06 jim
MsDS-PasswordHistoryLength 15:10:02 jim
MsDS-PasswordComplexityEnabled 15:09:26 jim
MsDS-MinimumPasswordLength 15:02:43 jim
1.2.840.113556.1.4.2011 14:58:38 jim
1.2.840.113556.1.4.2012 14:58:07 jim
MsDS-MinimumPasswordAge 14:57:38 jim
MsDS-MaximumPasswordAge 14:53:14 jim
Ms-DS-Password-Settings-Container 13:38:07 jim
Web Blog_blogentry_260318_1 13:33:47 jim
25.03.2018
Revision 10:38:51 jim
1.3.6.1.4.1.36733.2.1.1.59 10:32:16 jim
Etag 10:28:49 jim
SCIM meta 10:24:28 jim
Lucky 13 10:22:16 jim
JOSE Header 10:16:14 jim
Bitcoin block 10:15:22 jim
Header 10:13:15 jim
IPG 10:09:46 jim
Datagram 10:08:50 jim
Packet 10:07:56 jim
Packet switching 09:56:54 jim
Circuit switching 09:54:38 jim
Telephone Circuit 09:42:56 jim
Ethernet 09:39:48 jim
IEEE 802 09:35:22 jim
IEEE 802.25 09:14:35 jim
IEEE 802.24 09:14:29 jim
IEEE 802.23 09:14:24 jim
IEEE 802.22 09:14:20 jim
IEEE 802.21 09:14:16 jim
IEEE 802.20 09:14:11 jim
IEEE 802.19 09:14:06 jim
IEEE 802.18 09:14:01 jim
IEEE 802.17 09:13:57 jim
IEEE 802.16.2 09:13:53 jim
IEEE 802.16.1 09:13:48 jim
IEEE 802.16 09:13:44 jim
IEEE 802.15.7 09:13:36 jim
IEEE 802.15.6 09:13:32 jim
IEEE 802.15.5 09:13:09 jim
IEEE 802.15.4 09:12:24 jim
IEEE 802.15.3 09:10:40 jim
IEEE 802.15.2 09:10:33 jim
IEEE 802.15 09:10:25 jim
IEEE 802.13 09:10:04 jim
IEEE 802.14 09:09:53 jim
IEEE 802.12 09:09:41 jim
IEEE 802.10 09:09:32 jim
IEEE 802.9 09:09:22 jim
IEEE 802.8 09:08:55 jim
IEEE 802.7 09:08:45 jim
IEEE 802.4 09:08:30 jim
IEEE 802.2 09:06:50 jim
Logical Link Control 09:06:01 jim
IEEE 802.5 09:04:16 jim
Metropolitan Area Network 09:03:01 jim
Data-link Layer 08:47:41 jim
Bridge 08:43:41 jim
Distributed-Queue Dual-Bus 08:33:19 jim
DQDB 08:30:07 jim
24.03.2018
IEEE 802.6 22:42:47 jim
Wide Area Network 22:39:38 jim
MAN 22:39:23 jim
Token Ring 22:31:47 jim
Network Switches 20:19:47 jim
Network Repeater 14:30:52 jim
Network hub 14:28:55 jim
Routing 13:50:12 jim Bridges ==> Bridge
IEEE 802.1 13:50:11 jim Bridges ==> Bridge
IEEE 802.1Q 13:50:11 jim Bridges ==> Bridge
Node 13:43:05 jim
Gateway 13:42:06 jim
Router 13:40:29 jim
IDM Related Compliance Items 09:15:36 jim
Novell Access Manager 09:12:08 jim
Best Practices for LDAP Security 09:09:18 jim
Payment Card Industry Data Security Standard 09:03:42 jim
NT LAN Manager 09:03:07 jim
Ping Identity 08:59:56 jim
X.500 08:56:04 jim
Identity Aware Proxy 08:51:01 jim
GCP Virtual Private Cloud 08:50:10 jim
Transparent Proxy 08:49:15 jim
Nevis Security Suite 08:48:53 jim
Managed Security Service Provider 08:48:25 jim
Firewall 08:47:44 jim
23.03.2018
Geocast 13:35:22 jim
Anycast 13:32:47 jim
Broadcast 13:31:44 jim
Virtual LAN 13:14:55 jim
Bridging 13:14:16 jim
Wireless LAN 13:06:48 jim
IEEE 802.1X 13:06:07 jim
RFC 2284 13:03:01 jim
Extensible Authentication Protocol 13:00:39 jim
RFC 3748 12:55:20 jim
Authentication Mechanism 12:53:34 jim
Authentication Method 12:53:09 jim
EAP 12:50:24 jim
RFC 5247 12:50:04 jim
Authentication, Authorization and Accounting (AAA) Transport Profile 12:44:58 jim
RFC 3539 12:42:18 jim
RFC 4960 11:22:43 jim
Stream Control Transmission Protocol 11:22:03 jim
SCTP 11:18:43 jim
DIAMETER 11:17:04 jim
Protocol 11:15:00 jim Diameter (protocol) ==> DIAMETER
Internet Layer 10:27:48 jim
Link Layer 10:26:59 jim
Application Layer 10:25:50 jim
Session Layer 10:25:35 jim
Transport Layer 10:25:24 jim
Network Layer 10:25:12 jim
Physical Layer 10:23:58 jim
Presentation Layer 10:17:21 jim
OSI-Model 10:14:26 jim
Password Authentication Protocol 10:11:13 jim
PPP 10:10:42 jim
Point-to-Point Protocol 10:10:24 jim
Octal 10:04:45 jim
Asynchronous Transfer Mode 10:02:36 jim
Octet 10:02:08 jim
Content-Length 10:01:02 jim Octets ==> Octet
DNS Resource Records 10:01:02 jim Octets ==> Octet
ES256 10:01:02 jim Octets ==> Octet
Frame 10:01:02 jim Octets ==> Octet
Time-Division Multiplex 09:55:00 jim
TDM 09:54:30 jim
TDMA 09:54:04 jim
Time-Division Multiple Access 09:53:38 jim
SDH 09:40:10 jim
Synchronous Digital Hierarchy 09:39:53 jim
Synchronous Optical NETworking 09:35:45 jim
SONET 09:29:13 jim
3G 09:23:54 jim
4G 09:19:28 jim
InterPacket Gap 09:11:42 jim
InterFrame Gap 09:11:02 jim
IFG 09:10:38 jim
BCP 62 08:58:25 jim
Automatic Repeat-reQuest 08:57:04 jim
ARQ 08:55:10 jim
Packet segmentation 08:51:56 jim
Segment 08:44:43 jim
User Application Clustering 08:37:56 jim
VLAN 08:30:29 jim
Trust Inferer 08:28:59 jim
Access Proxy 08:28:45 jim
Trust Tier 08:28:35 jim
Resource Inventory Service 08:28:21 jim
Device Inventory Service 08:27:18 jim
22.03.2018
Access Control Models 16:40:42 jim
Adaptive Policy-based Access Management 16:39:10 jim
Lattice Based Access Control 16:33:08 jim
Contextual Attributes 16:24:02 jim
Data State 13:22:04 jim
Data Metadata 13:21:53 jim
Application Attributes 13:20:09 jim
Network Attributes 13:19:09 jim
Resource Action 13:18:57 jim
Geolocation Attributes 13:18:02 jim
Organizational Attributes 13:12:35 jim
Data Provenance 12:05:30 jim
Data Ownership 12:03:23 jim
Data Origin 11:55:52 jim
Data 11:43:30 jim
Attribute Based Access Control 11:29:18 jim
REL 11:28:02 jim
Rights Expression Language 11:27:08 jim
Metadata 11:11:35 jim
Data Classification 11:03:21 jim
ABAC 10:44:39 jim
Subject Attributes 10:29:43 jim
RBAC vs ABAC 10:28:54 jim
Operating System Attributes 10:19:11 jim
Context Based Access Control 10:08:57 jim
21.03.2018
OAuth Client 10:30:20 jim
Covert Redirect Vulnerability 09:40:55 jim
Unvalidated redirects and forwards 09:40:25 jim
OAuth 2.0 Security-Closing Open Redirectors in OAuth 09:17:37 jim
HTTP Referer 09:04:41 jim
HTTP Request Header 08:56:08 jim
Open redirect 08:48:49 jim
Covert Redirect 08:48:15 jim
Best Practices OpenID Connect 08:11:46 jim
20.03.2018
W3C Credential Management API 15:58:46 jim
Content-Security-Policy 14:24:35 jim
Cross-site scripting 14:22:07 jim
Discovery Mechanism 14:02:20 jim
Web Services Dynamic Discovery 14:02:02 jim
Universal Description, Discovery, and Integration 14:01:20 jim
RootDSE 13:55:37 jim
PASSWD_NOTREQD 13:53:17 jim
Processes 13:39:47 jim
Multitasking 13:39:10 jim
LWP 13:38:37 jim
Light-Weight Process 13:38:20 jim
FLUSH+RELOAD 13:29:46 jim
Data In Process 13:24:47 jim
FanOutDriverPlatformReceiverRunModes 13:22:53 jim
System Metrics 13:22:35 jim
Instruction cycle 13:20:55 jim
Internal Metrics 13:20:06 jim
Central Processing Unit 13:18:52 jim
CPU 13:18:03 jim
Thread 13:05:05 jim
NDS Threads 12:56:10 jim
Windows user 12:54:32 jim
Security Principal Objects 12:53:09 jim
Windows Client 12:50:56 jim
Computer account 12:49:34 jim
Password Policy 12:27:10 jim
Windows Default Password Policy 12:25:48 jim Windows Server 2003 Default Password Policy ==> Windows Default Password Policy
FGPP 12:24:19 jim
UserAccountControl 11:59:30 jim
User-Account-Control Attribute 11:58:45 jim
Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs) 09:39:01 jim
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture 09:38:46 jim
Login_hint 09:03:27 jim
19.03.2018
NDSBACKUP 13:35:03 jim
EDirectory 9.1.0.0 (40101.29) 12:57:43 jim
EDirectory 9.0.4.0 (40006.33) 12:57:34 jim
EDirectory 9.0.3.1 (40005.13) 12:57:19 jim
Partition 12:21:48 jim
Cn=Partition, cn=Agent, cn=monitor 12:11:13 jim
Cn=Monitor 12:08:47 jim
Monitor Entry 12:07:55 jim
Maximum Ring Delta 12:00:25 jim
EDirectory 9.0.1.0 (40003.37) 11:13:44 jim
EDirectory 9.0.1.1 (40003.38) 11:13:24 jim
EDirectory 9.0.2.2 (40004.44) 11:12:42 jim
Input-constrained device 10:08:22 jim
18.03.2018
Reverse Proxy 19:39:04 jim
Proxy Server 19:38:22 jim Load-Balancing ==> Load Balancing
Load Balancing 19:38:21 jim Load-Balancing ==> Load Balancing
Query 11:00:19 jim
Graph 10:54:10 jim
Cooperation for Open Systems Interconnection Networking in Europe 10:41:33 jim
Reliable protocol 10:37:56 jim
Unreliable protocol 10:35:55 jim
Hypertext Transfer Protocol 10:33:28 jim
HTML link 10:23:20 jim
HTML Element 10:20:29 jim
Hyperlinks 10:18:56 jim
HTTP Method 10:06:23 jim
Verb 10:05:16 jim
OAuth 2.0 10:03:52 jim
RESTful 10:01:54 jim
Hypermedia 10:00:57 jim
Link 10:00:23 jim
Hypertext 09:59:56 jim
Cheat Sheets 09:48:19 jim
Open Web Application Security Project 09:44:23 jim
Session Management 09:15:33 jim
Proprietary Session Management 08:44:16 jim
Session ID 08:38:49 jim
16.03.2018
API versioning 07:59:42 jim
Web Service 07:53:05 jim
14.03.2018
External Security Managers (ESM) 16:40:20 jim
ACF2 16:39:33 jim
Access Control Facility 16:39:05 jim
Access Control 16:33:33 jim
Access Control List 16:26:56 jim
Hosted domain 12:03:22 jim
Hd 11:57:32 jim
Openid-configuration 11:42:31 jim
Revocation_endpoint 11:17:32 jim
OAuth 2.0 Token Revocation 11:16:03 jim
Token_type_hint 10:42:39 jim
Revocation Request 10:28:47 jim
OK 10:25:01 jim
Service Unavailable 10:13:08 jim
Retry-After 10:11:39 jim
HTTP 503 10:05:25 jim
11.03.2018
Replication 09:25:37 jim
Master-slave 09:19:40 jim
Multi-master replication 09:18:13 jim
Distributed system 08:58:00 jim
Decentralised system 08:52:09 jim
Eventual consistency 08:36:05 jim
Distributed Data Store 08:34:17 jim
Consensus 08:32:49 jim
Consistency 08:28:21 jim
10.03.2018
ISO 8601 11:11:56 jim
Year 11:11:30 jim
BCE 11:05:42 jim
YYYY 11:02:38 jim
Year 1917 11:01:52 jim
TAD 11:01:16 jim
Thinking About Today 11:00:55 jim
Web Blog_blogentry_100318_1 10:59:09 jim
LDIF Sort Tools 09:29:32 jim
LDAP Tools From Others 09:19:58 jim
09.03.2018
Policy 10:11:23 jim
Identity Management Architecture 10:03:32 jim
Identity Governance and Administration 09:58:40 jim
IGA 09:57:10 jim
IDSA Integration Framework 09:48:35 jim Identity Governance ==> Identity Governance and Administration
BeyondCorp 09:25:36 jim
Cookie 09:20:21 jim
Authentication cookie 09:17:38 jim
Authenticator 09:14:37 jim
08.03.2018
Stateless 14:59:01 jim
Intermediary 14:54:52 jim
Null style 14:31:46 jim
Constraint 14:25:36 jim
OpenID Connect Discovery 10:40:54 jim
Request_uri_parameter_supported 10:24:39 jim
Response_modes_supported 10:21:01 jim
Sid 10:05:37 jim
Frontchannel_logout_session_supported 09:59:22 jim
Frontchannel_logout_supported 09:56:57 jim
End_session_endpoint 09:13:38 jim
06.03.2018
Device Flow 11:08:40 jim
IANA Registry 10:38:28 jim
Center for Applied Internet Data Analysis 10:07:12 jim
CAIDA 10:06:40 jim
IP spoofing 10:02:09 jim
EdirectorySizingHardware 09:53:25 jim
Application Shell Architecture 09:50:59 jim
Secret Files 09:49:34 jim
ISP 09:46:37 jim
Internet Service Providers 09:46:11 jim
GGC 09:45:47 jim
BCP 36 09:39:47 jim
Spoofing Attack 09:34:32 jim
Least Recently Used 09:27:14 jim
Cache 09:26:34 jim
Cache replacement algorithms 09:25:38 jim
LRU 09:23:10 jim
Name Service Cache Daemon 09:20:23 jim
NSCD 09:19:27 jim
Queue 09:16:14 jim
Memcached 09:11:49 jim
05.03.2018
Ripple Company 10:16:44 jim
Ripple Transaction Protocol 10:07:46 jim
OAuth 2.0 Authorization Server Metadata 09:29:10 jim
04.03.2018
Retry 11:33:02 jim
Fatal 11:31:18 jim
DirXML Status Events 11:30:31 jim
Warning 11:29:10 jim
HTTP Warn Codes 11:28:48 jim
RFC 7234 11:15:59 jim
Page Cache 10:52:56 jim
Cache-Control 10:51:59 jim
HTTP Cache Directive 10:48:08 jim
HTTP Header Field 10:37:06 jim
URI Fragment Identifiers 10:19:36 jim
Uniform Resource Identifier 10:15:20 jim
Form Post Response Mode 10:13:51 jim
OAuth 2.0 Security Considerations 10:10:59 jim
Fragment Response Mode 09:59:33 jim
Identity Token 09:05:28 jim
03.03.2018
Authentication 12:16:12 jim
Identity Proofing 12:13:56 jim
Internet Security Glossary 12:12:49 jim
Registration 12:08:58 jim
Enrollment 12:04:48 jim
Credential Enrollment 11:59:00 jim
User Provisioning 11:27:06 jim
Authentication Channel 11:18:56 jim
Message Authentication 10:28:33 jim
Entity Authentication 10:04:04 jim
Explicit Endpoint 09:23:58 jim
02.03.2018
RFC 6819 21:36:46 jim
P-256 20:29:53 jim
Digital Signature Standard 20:29:11 jim
Elliptic Curve Digital Signature Algorithm 20:25:15 jim
MGF 17:51:49 jim
Mask Generation Function 17:51:34 jim
MGF1 17:49:52 jim
RSASSA-PSS 17:46:58 jim
PS256 17:43:19 jim
Response Type 17:31:46 jim
OAuth 2.0 Multiple Response Type Encoding Practices 17:24:34 jim
Authorization Code Flow 16:59:36 jim
S_hash 11:05:53 jim
Identity Token Validation 10:53:27 jim
At_hash 10:44:51 jim
Access Token Validation 10:43:09 jim
RS256 10:35:35 jim
Token_endpoint_auth_signing_alg_values_supported 10:26:49 jim
Wildcard Certificates 10:05:16 jim
28.02.2018
OAuth Scopes 14:03:42 jim
Phone 13:56:00 jim
OpenID Connect Scopes 13:54:27 jim
OpenID Connect Standard Claims 13:44:35 jim
Default Profile Claims 13:40:30 jim
RFC 5646 13:03:17 jim
Openid scope 13:00:07 jim
UserInfo Response 12:32:14 jim
OAuth Scope Validation 12:29:34 jim
Voluntary Claim 12:16:37 jim
Userinfo_endpoint 11:57:03 jim
UserInfo Request 11:41:47 jim
27.02.2018
Validation 21:34:08 jim
Verification 21:33:00 jim
Identity Token Claims 21:24:41 jim
Azp 21:16:07 jim
Authorized party 21:15:47 jim
Authorization Response 20:40:11 jim
25.02.2018
Assertion Value 11:34:31 jim
Identification 11:27:09 jim
24.02.2018
Contract of Adhesion 10:16:23 jim
Disintermediation 10:08:08 jim
Contract 10:06:46 jim
Web Blog_blogentry_240218_2 09:35:09 jim
23.02.2018
Regulatory compliance 11:21:24 jim
Bank Secrecy Act 11:20:43 jim
Regulatory Burden 11:19:37 jim
Tax 11:16:20 jim
National Identification Number 11:10:37 jim
Social Security 11:07:43 jim
Medicare 11:05:50 jim
Smart-On-FHIR profile 11:03:36 jim
Tax avoidance 11:02:53 jim
Tax Evasion 11:00:54 jim
Jurisdiction 10:58:37 jim
Indirect Tax 10:57:12 jim Indirect Taxes ==> Indirect Tax
Payroll Tax 10:57:12 jim Indirect Taxes ==> Indirect Tax
Direct Tax 10:56:56 jim Direct Taxes ==> Direct Tax
United States Federal Agency 10:52:09 jim
United States Social Security Administration 10:50:17 jim
SSA 10:47:51 jim
Taxes 10:47:17 jim
Centers for Medicare and Medicaid Services 10:36:31 jim
TANF 10:34:54 jim
Temporary Assistance for Needy Families 10:34:35 jim
Supplemental Security Income 10:32:05 jim
Government Benefit 10:31:19 jim
Social Security Act 10:20:04 jim
Medicaid 10:19:16 jim
Federal Health Care Law 10:13:22 jim
OASDI 10:09:18 jim
Old-Age, Survivors, and Disability Insurance 10:09:02 jim
Year 1935 09:35:50 jim
National Provider Identifier 09:22:39 jim
NPI 09:19:05 jim
Fast Healthcare Interoperability Resources 09:08:31 jim
22.02.2018
Why OpenID Connect 17:47:00 jim
Why OAuth 2.0 17:37:24 jim
Web Blog_blogentry_200615_1 17:37:02 jim
Man-In-The-Middle 12:00:03 jim
Historic 11:57:21 jim
Internet Official Protocol Standards 11:53:24 jim
RFC 2700 11:51:33 jim
RFC 2800 11:45:37 jim
RFC 2900 11:43:52 jim
RFC 3000 11:43:00 jim
RFC 3300 11:41:12 jim
RFC 3700 11:37:05 jim
RFC 3600 11:36:38 jim
Internet Standard 11:26:09 jim
Bluetooth 11:24:24 jim
Informational 11:22:05 jim
HTTP 100 11:21:21 jim
Draft Standard 11:13:54 jim
Standard 11:13:14 jim
Not All RFCs are Standards 11:11:32 jim
Open Standard 11:06:54 jim
Open Access 11:05:38 jim
Ambiguous 11:01:15 jim
Specification 11:00:02 jim
Special Interest Group 10:57:11 jim
SIG 10:55:07 jim
Web Blog_blogentry_220218_1 10:51:21 jim
SPDY 10:19:25 jim
Hypertext Transfer Protocol Version 2 10:13:41 jim
RFC 7540 10:10:54 jim
RFC 2068 10:09:39 jim
HTTP2 10:08:26 jim
Opportunistic encryption 10:03:36 jim
RFC 8164 10:01:42 jim
RFC 7435 10:00:02 jim
RFC 7345 09:59:19 jim
Opportunistic Security 09:54:08 jim
Opportunistic TLS 09:53:16 jim
RFC 7672 09:44:42 jim
LDAPS 09:42:04 jim
StartTLS 09:38:30 jim
21.02.2018
Clock skew 09:54:47 jim
Nbf 09:52:46 jim
Kerberos Error Codes 09:51:41 jim
Exp 09:50:50 jim
19.02.2018
OAuth Token Request 18:24:03 jim
OAuth Token Response 18:17:53 jim
Authorization Request 17:27:45 jim
Authorization Request Parameters 17:23:32 jim
Authorization Grant 17:14:08 jim
17.02.2018
Logistic Regression 08:47:19 jim
16.02.2018
LDIF Generator 17:21:44 jim
15.02.2018
EditFindAndReplaceHelp 14:22:11 jim
TextFormattingRules 14:20:43 jim
Jim 14:17:55 jim
Jim Willeke Resume 13:59:45 jim
Recommended 13:53:55 jim
How SSL-TLS Works 13:52:26 jim
Biometric data 13:44:46 jim
LDAP 13:43:00 jim
Business to Employee 13:39:51 jim
AD 13:38:14 jim
Decade 13:36:55 jim
WikiName 13:30:23 jim
Image Styles 13:25:52 jim
Haddock Template 13:24:42 jim
Image Styles/woman-face.jpg 13:22:20 jim woman-face.jpg
Image Styles/poppy-small.jpg 13:22:01 jim poppy-small.jpg
Image Styles/haddock.jpg 13:21:36 jim haddock.jpg
Image Styles/bear-big.jpg 13:21:09 jim bear-big.jpg
Pic/net.png 13:01:15 jim net.png
Pic 12:58:39 jim
Image 12:46:15 jim
Pic/yahoo.png 12:38:37 jim yahoo.png
Pic/blueDot.png 12:34:32 jim blueDot.png
Pic/windows.png 12:31:02 jim windows.png
Pic/xml.png 12:21:33 jim xml.png
Pic/update.png 12:21:11 jim update.png
Pic/tech.png 12:20:55 jim tech.png
Pic/smile.png 12:19:52 jim smile.png
Pic/rss.png 12:09:44 jim rss.png
Pic/rdf.png 12:09:13 jim rdf.png
Pic/phone.png 12:08:51 jim phone.png
Pic/personal.png 12:08:34 jim personal.png
Pic/perl.png 12:08:15 jim perl.png
Pic/people.png 12:07:48 jim people.png
Pic/pdf.png 12:07:26 jim pdf.png
Pic/paperclip_xsm.png 12:07:09 jim paperclip_xsm.png
Pic/paperclip_sm.png 12:06:52 jim paperclip_sm.png
Pic/note.png 12:05:36 jim note.png
Pic/news.png 12:04:54 jim news.png
Pic/new.png 12:04:36 jim new.png
Pic/music.png 12:04:03 jim music.png
Pic/movies.png 12:03:41 jim movies.png
Pic/mail.png 12:03:20 jim mail.png
Pic/mac.png 12:02:40 jim mac.png
Pic/linux.png 12:02:23 jim linux.png
Pic/java.png 12:02:01 jim java.png
Pic/grouchy.png 12:01:38 jim grouchy.png
Pic/downGreenArrow.png 11:46:55 jim downGreenArrow.png
Pic/dev.png 11:46:35 jim dev.png
Pic/computer.png 11:46:10 jim computer.png
Pic/cb_on.png 11:45:45 jim cb_on.png
Pic/books.png 11:41:43 jim books.png
Pic/cb_off.png 11:41:19 jim cb_off.png
Pic/INFO.jpg 11:40:27 jim INFO.jpg
WikiVariables 11:28:51 jim
SystemInfo 11:09:12 jim
SearchPageHelp 11:03:08 jim
SandBox 11:01:34 jim
RecentChanges 10:57:40 jim
PageAlias 10:53:54 jim
OneMinuteWiki 10:50:54 jim
JSPWiki-2.10.3 10:50:03 jim
Community 10:44:55 jim
Main 10:34:22 jim
LoginHelp 10:30:09 jim
InstallationTips 10:25:03 jim
EditPageHelp 10:18:22 jim
LDAP_SERVER_RANGE_OPTION_OID 09:43:47 jim
14.02.2018
Web Blog_blogentry_140218_1 10:10:47 jim
Web Blog_comments_290712_1 00:35:41 Adminlmon
12.02.2018
Web Blog_blogentry_120218_1 10:43:04 jim
08.02.2018
Amazon Simple Storage Service 12:31:33 jim
Authenticated Encryption with Associated Data 09:03:47 jim
07.02.2018
LDAP Descriptor 12:34:42 jim
LDAP Schema 12:31:35 jim
Attribute-Names 12:29:28 jim
ObjectClasses 12:27:25 jim
Name Form Description 11:16:43 jim
Matching Rule Use Description 11:16:17 jim
Matching Rule Description 11:15:43 jim
DIT Structure Rule Description 11:14:50 jim
ObjectIdentifierFirstComponentMatch 10:54:56 jim
2.5.21.7 10:46:48 jim
NameForms 10:46:19 jim
Name Form 10:45:44 jim
1.3.6.1.4.1.1466.115.121.1.17 10:37:40 jim
DITStructureRules 10:37:22 jim
2.5.21.1 10:34:51 jim
2.5.20.1 10:25:29 jim
Schema 09:53:24 jim
Apache Hadoop 09:47:27 jim
Google Cloud Storage 09:46:01 jim
05.02.2018
Paxos Protocol 13:55:41 jim
Distributed Consensus 13:51:17 jim
Chubby Lock Service 13:51:06 jim
Reliable Asynchronous Event Transport 12:05:55 jim
RAET 12:04:37 jim
Plenum Byzantine Fault Tolerant Protocol 11:59:18 jim
Federated Byzantine Agreement 11:40:42 jim
Stellar Consensus Protocol 11:40:11 jim
Ripple Consensus Protocol Algorithm 11:32:00 jim
Proof-of-Stake 11:23:56 jim
PoW 11:03:15 jim
Proof-of-Work 11:02:48 jim
PBFT 10:53:28 jim
Practical Byzantine Fault Tolerance 10:53:11 jim
RBFT 10:50:05 jim
Redundant Byzantine Fault Tolerance 10:49:45 jim
Web Blog_blogentry_050218_1 10:45:09 jim
Decentralized Autonomous Organization 10:17:21 jim
Model 10:12:27 jim
04.02.2018
Linux Foundation 09:27:44 jim
Linux 09:25:31 jim
Hyperledger 09:17:28 jim
Hyperledger Indy 09:06:50 jim Hyperledger Project ==> Hyperledger
02.02.2018
SSL-TLS Interception 10:20:17 jim
MiTM 10:07:24 jim
HTTPS Inspection 09:59:49 jim
TLS Proxy 09:50:39 jim
HTTPS Interception 09:45:57 jim
HTTPS Interception Weakens TLS Security 09:45:19 jim
Legal TLS Interception 09:34:56 jim
Web Blog_blogentry_271215_1 09:32:12 jim
Certificate Validation Tools 09:31:43 jim
RFC 5246 09:22:54 jim
01.02.2018
Blockchain 09:26:39 jim
24.01.2018
IDN homograph attack 09:29:50 jim
IDN 09:26:29 jim
Internationalized Resource Identifiers 09:20:39 jim
URIs, URLs, and URNs 09:15:06 jim
BCP 190 08:55:07 jim
BCP 212 08:54:38 jim
Best Current Practice 08:52:48 jim
21.01.2018
Digital Subject 09:19:11 jim
17.01.2018
Authorization API 14:41:52 jim UMA ImplementerS Guide ==> UMA Implementer Guide
Protection API 14:41:52 jim UMA ImplementerS Guide ==> UMA Implementer Guide
UMA Implementer Guide 14:41:52 jim UMA ImplementerS Guide ==> UMA Implementer Guide
12.01.2018
Java Card 08:59:09 jim
10.01.2018
2.5.13.1 10:10:16 jim
Identity Function 08:55:46 jim
Function 08:50:01 jim
08.01.2018
DTD 09:42:43 jim
Document type definition 09:42:15 jim
XML Schema Definition Language 09:36:40 jim
XSD 09:36:18 jim
XML schema 09:32:59 jim
Extensible Resource Descriptor 09:25:41 jim
XRD 09:24:11 jim
Host-meta 09:17:51 jim
LRDD 09:17:21 jim
Link-based Resource Descriptor Documents 09:17:03 jim
OpenID Provider Issuer Discovery 09:05:10 jim Web Host Metadata ==> Web host-meta data
Web host-meta data 09:05:10 jim Web Host Metadata ==> Web host-meta data
07.01.2018
Doc Searls 10:51:16 jim
Harvard University 10:42:51 jim
Berkman Center for Internet & Society 10:41:42 jim
ProjectVRM 10:37:05 jim
Kinit 10:33:45 jim
RSA 10:30:54 jim
FreeIPA 10:30:34 jim
Year 1861 10:29:57 jim
MIT 10:29:29 jim
Massachusetts Institute of Technology 10:29:14 jim
Kerberos 10:26:57 jim
OPAL 10:22:44 jim
Open Algorithm 10:22:03 jim
OPAL Project 10:21:46 jim
OpenPDS 10:14:43 jim
CoreID 10:08:54 jim
MIT TRUST DATA CONSORTIUM 09:57:33 jim
MIT Internet Trust Consortium 09:55:17 jim
MITREid Connect 09:48:44 jim
MITRE Corporation 09:44:17 jim
05.01.2018
MAD Determine the Classes Associated With an Entry 14:16:59 jim
1.2.840.113556.1.5.6 14:14:58 jim
SecurityPrincipal 14:14:28 jim
1.2.840.113556.1.4.221 13:56:22 jim
04.01.2018
Cash 22:55:27 jim
Curity 22:31:15 jim
Customer Identification Program 17:07:25 jim
Know Your Customer 17:06:04 jim
Block 11:12:18 jim
Pay To Script Hash 11:02:39 jim
P2SH 11:00:05 jim
Pay-To-Public-Key-Hash 10:58:32 jim
P2PKH 10:57:33 jim
Bitcoin address 10:49:03 jim
Target Resource 09:49:38 jim
Protected Resource 09:48:07 jim
Resource 09:47:10 jim
Payment Transaction 09:45:30 jim
Email 09:43:53 jim
Simple Mail Transfer Protocol 09:43:11 jim
Telecommunications 09:40:27 jim
Permissionless System 09:04:44 jim
03.01.2018
Zcash 20:00:47 jim
Monero 19:48:27 jim
Best Practices For Unique Identifiers 16:09:16 jim
Machine Learning Taxonomy 15:58:07 jim
Feedforward Neural network 15:56:44 jim
Mapping function 15:55:12 jim
Features 15:52:47 jim
Dependent variables 15:49:37 jim
Independent variable 15:49:06 jim
Linear Regression 15:48:15 jim
Regression Trees 15:43:57 jim
Regression analysis 15:41:22 jim
Regression 15:40:56 jim
Least Absolute Shrinkage and Selection Operator 15:31:11 jim
RSS 15:30:25 jim
Sum of Squared Errors 15:29:56 jim
Residual Sum of Squares 15:29:15 jim
LASSO 15:24:38 jim
Regularization 15:24:02 jim
Ordinary Least Squares 15:23:25 jim
Ridge Regression 15:17:47 jim
Dropout Regularization 15:11:06 jim
Hyperparameters 14:40:17 jim
02.01.2018
Perceptron 15:21:48 jim
Perceptron/perceptron.jpg 15:20:30 jim
Payment 14:57:59 jim
Automated Clearing House 14:55:20 jim
ACH 14:53:28 jim
Payment Service Provider 14:44:02 jim
Federal Reserve Wire Network 14:41:32 jim
Machine Learning 13:31:36 jim
Feature detection 13:27:32 jim
Lowercase 13:22:44 jim
UPPERCASE 13:22:31 jim
Case-sensitive 13:22:18 jim
Cluster analysis 13:15:14 jim
Stimulus-Response 13:13:54 jim
Ground truth 13:13:25 jim
Reinforcement learning 13:12:06 jim
Classification Trees 12:54:47 jim
Supervised Learning/Supervised Learning.png 12:38:24 jim
Unsupervised Learning 12:23:38 jim
Regularization/l2-term.png 11:59:52 jim
Overfitting 11:36:41 jim
Cost function 11:35:05 jim
Learning 10:23:34 jim
Inductive Learning 10:22:43 jim
Evidence 10:21:57 jim
Episodic Learning 10:21:23 jim
Machine Learning model 10:06:40 jim
Variance error 10:02:57 jim
Bias error 10:02:21 jim
Hidden layer 09:44:44 jim
Input layer 09:43:36 jim
Output node 09:40:37 jim
Loss function 09:38:24 jim
Underfitting 09:35:31 jim
Target Function 09:33:40 jim
01.01.2018
Scalar 09:58:04 jim
Backpropagation 09:13:41 jim
Algorithm 09:08:14 jim
31.12.2017
JSON Resource Descriptor 21:20:35 jim
Classification and Regression Trees 11:43:13 jim
Classification and Regression Trees/Example-Decision-Tree.png 11:36:22 jim
CART 11:19:37 jim
Web Blog_blogentry_311217_1 11:11:22 jim
28.12.2017
Probabilistic Neural Network 14:01:53 jim
Classification 13:34:52 jim
Artificial Neural network 13:22:50 jim
Gradient descent 11:30:37 jim
Key Derivation Function 11:29:13 jim
Hash Function 11:27:13 jim
Pseudorandom function 11:26:17 jim
Sigmoid function 11:23:46 jim
Exponential function 11:21:33 jim
Logistic function 11:18:28 jim
Eigenvector 11:06:53 jim
27.12.2017
Matrix multiplication 12:37:19 jim
Matrix multiplication/vector-multiplication.png 12:32:37 jim
Linear transformation 12:28:38 jim
Matrix 12:23:21 jim
Vector 12:08:04 jim
Unitary matrix 12:06:52 jim
Basis vectors 12:03:36 jim
Identity matrix 11:59:10 jim
Identity matrix/identity-matrix.png 11:53:35 jim identity-matrix
Matrices 11:48:00 jim
Array 11:45:32 jim
Matrix/Matrix.svg.png 11:37:40 jim Matrix
26.12.2017
Loss function/Screen Shot 2017-12-26 at 06.51.34.png 11:52:31 jim Loss Function
Cost function/Screen Shot 2017-12-26 at 06.17.00.png 11:17:46 jim Cost Function
Mean Squared Error 10:58:59 jim
Mean Squared Error/Screen Shot 2017-12-26 at 05.56.09.png 10:57:02 jim MSE
Input neuron 10:27:11 jim
Convolutional Neural Network 10:25:56 jim
Sigmoid neuron 10:20:02 jim
MLP 10:13:04 jim
Activation Function 10:11:33 jim
25.12.2017
Double Ratchet Algorithm 08:49:41 jim
Password-Based Key Derivation Function 08:48:32 jim
PKCS5 08:48:01 jim
PBKDF2 08:47:37 jim
KDF 08:46:29 jim
Web Blog_blogentry_251217_1 08:42:20 jim
24.12.2017
BTF 12:07:31 jim
Bitcoin Faith 12:07:11 jim
Bitcoin Gold 12:01:49 jim
Bitcoin 11:56:52 jim
BCD 11:53:53 jim
Bitcoin Diamond 11:49:15 jim
BCH 11:40:18 jim
Bitcoin Cash 11:39:59 jim
BTG 11:39:20 jim
BTC 11:38:33 jim
Consent Receipts 09:59:52 jim
Consent 09:01:03 jim
23.12.2017
Financial Settlement 16:14:32 jim
Funds Transfer System 16:11:40 jim
Society for Worldwide Interbank Financial Telecommunication 16:09:20 jim
Payment Network 16:04:41 jim
Electronic Payments Network 16:02:41 jim
Clearing House Interbank Payments System 16:01:57 jim
CHIPS 16:01:22 jim
Fedwire 15:47:16 jim
Federal Reserve 15:40:20 jim
FedACH 15:30:44 jim
EPN 15:27:56 jim
Savings Account 15:04:22 jim
Depository Institutions Deregulation and Monetary Control Act of 1980 14:55:01 jim
Demand Deposit Account 14:54:03 jim
Payment Service User 14:45:38 jim
Account owner 14:44:52 jim
FOMC 14:09:20 jim
Federal Reserve Member Banks 14:08:41 jim
National Bank 14:05:51 jim
Federal Reserve Bank 14:03:19 jim
Federal Open Market Committee 13:58:15 jim
FRB 13:52:26 jim
Federal Reserve Board of Governors 13:51:58 jim
FDIC 13:40:21 jim
National Bank Act 13:38:54 jim
Federal Deposit Insurance Corporation 13:38:07 jim
Office of the Comptroller of the Currency 13:37:57 jim
OCC 10:35:38 jim
Web Blog_blogentry_231217_1 10:31:25 jim
Third-party Risk 10:24:55 jim
21.12.2017
USCB 15:10:52 jim
United States Census Bureau 15:10:28 jim
Electoral College 15:08:56 jim
Consumer Credit Reporting Agency 14:56:39 jim
Experian 14:50:47 jim
Web Blog_blogentry_211217_1 14:48:19 jim
Certificate Validation 11:13:36 jim
CA-Browser Forum 10:52:02 jim
Certification Authority Browser Forum 10:50:36 jim
20.12.2017
Protection API Token 19:31:07 jim
Grant Types 10:24:35 jim
Community of Interest 10:14:21 jim
Sociality 10:13:24 jim
JSPWiki Community 10:08:40 jim
Partner API 10:07:33 jim
Sovereignty 10:06:43 jim
Currency 09:49:32 jim
Central Banking System 09:41:34 jim
FED 09:38:09 jim
Routing Transit Number 09:33:17 jim
Federal Reserve Act 09:31:42 jim
Year 1913 09:19:48 jim
Future Prediction 09:06:24 jim
SAE International Levels of Driving Automation 08:57:00 jim
Autonomous Automobile 08:53:27 jim
Web Blog_blogentry_201217_1 08:49:48 jim SAE InternationalS Levels of Driving Automation ==> SAE International Levels of Driving Automation
The Next Big Thing 08:31:18 jim
Web Blog_blogentry_111017_1 08:25:16 jim
United States Code 08:11:27 jim
18 U.S.C. 08:04:31 jim
Computer Fraud and Abuse Act 08:03:27 jim
19.12.2017
Subscriber Identification Module 12:32:45 jim
Mobile Station International Subscriber Directory Number 12:03:20 jim
International Mobile Subscriber Identity 12:01:07 jim
Digital Subscriber Line 11:51:06 jim
Local Exchange 11:49:08 jim
Telephone Line 11:46:17 jim
Phone Number 11:43:35 jim
NDC 11:39:57 jim
PBX 11:38:49 jim
Private Branch Exchange 11:38:29 jim
Subscriber Number 11:37:49 jim
National Destination Code 11:37:18 jim
Telephone Numbering Plan 11:36:06 jim
Mobile Network Code 11:12:21 jim
Integrated Circuit Card Identifier 11:07:48 jim
Account Number 11:01:57 jim
ROC 09:58:03 jim
PRC 09:57:35 jim
China 09:56:57 jim
India 09:55:40 jim
Issuer Identification Number 09:54:02 jim
Operation Aurora 09:53:28 jim
Collapsible List 09:44:22 jim
Group of 20 09:40:21 jim
Aadhaar 09:39:03 jim
Web Blog_blogentry_191217_1 09:26:52 jim
18.12.2017
API-Gateway 12:01:16 jim
KuppingerCole 11:59:06 jim
Martin Kuppinger 11:57:05 jim
Groupthink 09:53:51 jim
Groupthink/1200-608292-the-psychological-phenomenon-of-groupthink.jpg 09:53:14 jim groupthink
Bias 09:50:58 jim
Psychological phenomenon 09:48:09 jim
Web Blog_blogentry_181217_1 09:36:12 jim
CEO 09:30:00 jim
Alphabet Inc 09:29:22 jim
American 09:24:49 jim
Google X 09:23:15 jim
Verily 09:21:22 jim
Waymo 09:19:27 jim
Google 09:11:15 jim
AppConfig Community 09:05:08 jim
De-anonymization 08:34:34 jim
17.12.2017
Gemalto 19:25:58 jim
Open Badges 16:08:27 jim
Employer 11:32:56 jim Employers ==> Employer
Administrative Identity 11:31:49 jim
Education 11:30:44 jim
InCommon 11:30:33 jim
Educational Entity 11:28:17 jim
Content curation 11:19:38 jim
Curators 11:17:33 jim
Identity Provider (IDP) 11:05:01 jim
Blockcerts 10:50:39 jim
RTXP 10:33:33 jim
XRP 10:22:15 jim
Permissioned Systems 10:02:48 jim
Certificate Revocation 09:55:05 jim
Cancelable Biometrics 09:52:46 jim
Credential Revocation 09:50:37 jim
Consent Revocation 09:49:34 jim
NIST.SP.800-63B 09:47:04 jim
Smart contracts 09:39:28 jim
Merkle Tree 09:25:21 jim
16.12.2017
LeftMenu 16:23:48 jim
15.12.2017
Serverless 11:02:18 jim
13.12.2017
Implantable Myoelectric Sensor 15:43:32 jim
Web Blog_blogentry_131217_1 15:38:41 jim
Strength of Function for Authenticators - Biometrics 13:25:27 jim
12.12.2017
Liveness Detection 16:09:41 jim
Advanced Persistent Threat 15:47:50 jim
Opportunistic Attack 15:45:22 jim
Targeted Attack 15:43:11 jim
Attack 15:39:11 jim
Attack Effort 15:35:39 jim
Presentation Attack Detection 15:21:08 jim
Cross-site request forgery 15:19:47 jim
Mallory 15:16:58 jim
Presentation Attack 15:16:22 jim
Imposter 15:15:11 jim
Strength of Function for Authenticators 15:01:08 jim
11.12.2017
Softmax function 10:18:18 jim
Exponential function/expo-function.jpg 10:16:44 jim expo-function
Logistic function/LogReg_1.png 10:10:14 jim LogisticRegression
Logistic function/Logistic-curve640px.png 10:01:10 jim Logistic-curve640px
Web Blog_blogentry_111217_1 09:07:25 jim
10.12.2017
Rectified Linear Unit 20:18:59 jim
ReLU 17:03:33 jim
09.12.2017
Output layer 20:47:39 jim
Vectors of Trust 19:48:43 jim
Privacy Considerations Distributed Ledger Technology 11:17:19 jim
Anonymous bind 11:08:25 jim
Anonymity Set 11:04:07 jim
Anonymous Identity 11:02:51 jim
Anonymous 11:01:09 jim
RFC 3261 10:58:35 jim
RFC Editor 10:41:19 jim
RFC 4844 10:38:40 jim
RFC Author 10:31:05 jim
STYLE-WEB 10:29:02 jim
RFC Style Guide 10:21:25 jim
RFC 7322 10:12:03 jim
RFC 2223 10:11:30 jim
Guidelines for Writing RFC Text on Security Considerations 10:08:24 jim
RFC 3552 10:05:41 jim
BCP 72 10:02:32 jim
Security Considerations 10:01:31 jim
Key words for use in RFCs to Indicate Requirement Levels 09:52:31 jim
BCP 14 09:45:25 jim
BCP 9 09:44:34 jim
08.12.2017
ApacheDS 12:58:54 jim
LDAP Server Implementations 12:57:38 jim
Apache Fortress 12:56:14 jim
INCITS 359-2012 12:55:13 jim
INCITS 359-2004 12:54:54 jim
INCITS 359 12:54:30 jim
Apache Directory Project 12:42:24 jim
NIST RBAC 12:40:30 jim
INCITS 12:39:21 jim InterNational Committee for Information Technology Standards ==> International Committee for Information Technology Standards
International Committee for Information Technology Standards 12:39:21 jim InterNational Committee for Information Technology Standards ==> International Committee for Information Technology Standards
Solaris 12:26:15 jim
Berkeley Software Distribution 12:24:26 jim
BSD 12:19:16 jim
Determine OS Version 12:18:30 jim
Certificate Version 11:58:00 jim
Server 11:55:26 jim
LdapServer 11:54:48 jim
2.16.840.1.113719.1.6.6.1 11:54:21 jim
2.16.840.1.113719.1.450.6.100 11:54:09 jim
2.16.840.1.113719.1.39.6.1.2 11:53:53 jim
2.16.840.1.113719.1.33.6.1 11:53:40 jim
2.16.840.1.113719.1.27.6.2 11:53:29 jim
2.16.840.1.113719.1.138.6.1.1 11:53:15 jim
2.16.840.1.113719.1.1.6.1.22 11:52:46 jim
2.16.840.1.113719.1.1.4.1.112 11:52:23 jim
Version (LDAP Attribute) 11:51:59 jim Version x (LDAP Attribute) ==> Version (LDAP Attribute)
DirXML-DriverVersion 11:49:46 jim
SEPOS 11:30:55 jim
Secure Enclave 11:26:41 jim
Java Authentication and Authorization Service 11:19:00 jim
I2C 11:17:37 jim
UART 11:13:37 jim
General-purpose input-output 11:12:53 jim
GPIO 11:10:19 jim
Secure Element 10:53:08 jim
Reliability 10:35:40 jim
Reasoning 10:34:14 jim
Converting Certificate Formats 09:57:34 jim
NIS To LDAP Tool 09:57:06 jim
Import Conversion Export 09:53:56 jim
LDAP Data Interchange Format 09:53:12 jim
Screen Scraping 09:52:56 jim
Data Scraping 09:52:41 jim
Data Extraction Transformation 09:52:13 jim
Web scraping 09:47:28 jim
Web Blog_blogentry_081217_1 09:21:59 jim Screen Scraping ==> Data Scraping
Financial Technology 09:16:05 jim
FinTech 09:14:41 jim
No Market Need 09:09:13 jim
06.12.2017
Artificial Neuron 11:52:01 jim
Synapses 11:48:58 jim
Weight 11:06:51 jim
Forward propagation 10:57:21 jim
Python 10:38:52 jim
Deep Neural networks 10:28:23 jim
Pattern-recognition 10:27:56 jim
Computer vision 10:27:28 jim
Deep Learning 10:26:03 jim
Amazon Web Services 09:54:33 jim
AWS Lambda 09:53:37 jim
AWS Cognito 09:52:32 jim
05.12.2017
NdsHomeDirectory 12:01:07 nanda
02.12.2017
MoreMenu/Mail Administrator.vcf 17:08:12 Mandygrove Null mandyscardino
Zero Trust 09:49:02 jim
Gong Needham Yahalom logic 09:27:25 jim
Web Blog_blogentry_021217_1 09:19:24 jim
BAN logic 09:12:00 jim
Burrows Abadi Needham logic 09:11:44 jim Burrows--Abadi--Needham logic ==> Burrows Abadi Needham logic
01.12.2017
Legal Entity Identifier 09:27:03 jim
Permid 09:25:40 jim
Financial Stability Board 09:15:17 jim
FSB 09:14:35 jim
G-20 09:10:51 jim
LEI 09:05:14 jim
Web Blog_blogentry_011217_1 08:57:17 jim
OAuth-Token-Exchange 08:52:55 jim
29.11.2017
Directory Information Tree 09:49:44 jim
Predictor variable 09:37:31 jim
Summation layer 09:35:33 jim
28.11.2017
OAuth 2.0 Vulnerabilities 19:56:14 jim
Social Security Number 12:20:22 jim
DigiD 12:09:47 jim
Web Blog_blogentry_281117_1 11:58:57 jim
25.11.2017
Multicast 19:21:42 jim
Unicast 19:17:53 jim
Byzantine Fault Tolerance 19:07:35 jim
Swirlds hashgraph consensus algorithm 18:59:15 jim
Gossip protocol 18:54:53 jim
Hashgraph 18:49:23 jim
Web Blog_blogentry_251117_1 18:40:34 jim
Web Blog_blogentry_270815_1 18:39:01 jim
U-Prove 18:38:24 jim
Separation of Duty 18:36:49 jim
Collusion 18:34:50 jim
PNN 11:41:29 jim
Hidden node 11:28:28 jim
Perception 11:00:44 jim
Speech recognition 10:58:47 jim
Sound recognition 10:57:37 jim
Classifier 10:47:36 jim
Sensor 10:13:45 jim
NLP 10:09:39 jim
Voice recognition 10:08:04 jim
Natural Language Processing 10:03:33 jim
Taxonomy 09:43:31 jim
24.11.2017
Sigmoid function/stock-vector-sigmoid-function-451998487.jpg 12:57:08 jim sigmoid-function
Relational Learning 12:38:10 jim
Motor Learning 12:37:11 jim
Observational Learning 12:36:12 jim
Spatial Learning 12:30:23 jim
Auditory Learning 12:30:05 jim
Understanding DIT Structure Rules 12:24:07 jim
Inheritance 12:22:42 jim
Placement Policy Set 12:22:31 jim
Web of Trust 12:22:06 jim
GCP Resource 12:21:45 jim
Forest Root Domain 12:21:16 jim
Directory Partition Hierarchy 12:20:41 jim
RBAC Hierarchical 12:19:04 jim
Hierarchical 12:18:02 jim
OID 12:17:01 jim
Hierarchy 12:15:03 jim
NAME 12:13:19 jim
Variable 12:12:46 jim
Shift Invariant Artificial Neural Network 11:42:51 jim
Space Invariant Artificial Neural Network 11:41:49 jim
SIANN 11:37:49 jim
CNN 11:28:44 jim
23.11.2017
OAuth 2.0 NOT an Authentication protocol 11:29:45 jim
21.11.2017
10BASE-T 11:41:40 jim
History of LDAP 11:41:11 jim
Z-Wave 11:28:53 jim
Z-Wave Primary Controller 11:23:36 jim
Z-Wave Controller 11:21:17 jim
Manchester code 11:18:15 jim
Z-Wave Home ID 11:13:39 jim
Z-Wave Node ID 11:11:56 jim
Z-Wave Network 10:54:38 jim
Z-Wave Node 10:51:41 jim
RFC 0793 10:47:47 jim
CBOR Object Signing and Encryption 10:43:48 jim
Strategies for Using Power for Communication 10:40:06 jim
Classes of Energy Limitation 10:36:56 jim
Scaling Properties 10:35:52 jim
LoWPAN 10:35:16 jim
Low-Power and Lossy Network 10:33:30 jim
Terminology for Constrained-Node Networks 10:30:45 jim
Constrained Nodes 10:26:41 jim
Device 10:22:21 jim
Unified Extensible Firmware Interface 10:17:39 jim
EFI 10:14:40 jim
Extensible Firmware Interface 10:14:23 jim
UEFI 09:51:17 jim
Firmware 09:50:29 jim
Basic Input-Output System 09:47:05 jim
BIOS 09:44:34 jim
Web Blog_blogentry_211117_1 09:38:52 jim
20.11.2017
WholeSubtree 17:20:08 OrangeDog Completely wrong: was describing SubordinateSubtree
Trusted Execution Environment 00:49:51 jim
19.11.2017
OAuth Security Topics 15:05:15 jim
16.11.2017
HTTP 101 14:30:16 jim
URL redirection 14:08:30 jim
API Economy 13:19:27 jim
Resource Owner Password Credentials Grant 00:26:14 jim
Resource Owner Password Credentials Grant/OAuth2 — Resource Owner Password Credential Grant.jpg 00:24:45 jim Resource Owner Password Credential Grant
15.11.2017
Well-Known URIs 14:06:47 jim
Well-known 14:04:20 jim
WebFinger 13:29:01 jim
Web Linking 13:13:36 jim
QUIC 02:30:31 jim
Quick UDP Internet Connections 02:29:16 jim
User Datagram Protocol 02:22:24 jim
14.11.2017
Eran Hammer 14:25:49 jim
RFC 5849 14:06:35 jim
RFC 6749 14:05:59 jim
OAuth 14:03:37 jim
WEB Access Management 13:41:03 jim
Access Control Service 13:37:36 jim
Access Control Engine 13:35:03 jim
RFC 4949 13:32:22 jim
Diffie-Hellman key-exchange 12:47:25 jim
OAuth 2.0 for Native Apps 12:42:04 jim
12.11.2017
Client_id 20:41:38 jim
Creating an OAuth 2.0 Client Application 20:35:17 jim
Identity Assurance Level 20:09:11 jim
Open Trust Taxonomy for OAuth2 20:00:48 jim
User-Managed Access 19:49:28 jim
RqP 19:29:39 jim
Requesting Party 19:28:25 jim
JSON Web Algorithms 14:49:28 jim
JSON Object Signing and Encryption Registry 14:44:23 jim
JSON Web Key Types 14:43:45 jim
JWK Set 14:42:30 jim
Jwks_uri 14:25:12 jim
JWK 14:08:57 jim
OAuth Dynamic Client Registration Metadata 14:06:48 jim
Jwks 14:05:12 jim
11.11.2017
Year 1959 14:22:58 jim
Neuron 14:21:44 jim
Learn 14:11:54 jim
Problem Solving 13:56:32 jim
Linguistic 13:55:32 jim
09.11.2017
Data Controller 14:40:20 jim
Data Processor 14:37:50 jim
General Data Protection Regulation 14:13:02 jim
Personal data 12:39:55 jim
08.11.2017
Mutual TLS Sender Constrained Resources Access 14:10:09 jim
Mutual TLS for OAuth Client Authentication 14:00:17 jim
Digital certificate request 13:58:14 jim
Mutual TLS Profiles for OAuth Clients 13:34:10 jim
OAuth Token Endpoint Authentication Methods 13:28:01 jim
OAuth Parameters Registry 13:16:54 jim
Certificate-based Authentication 12:59:30 jim
Non-Repudiation 12:57:25 jim
Certificate Chain 12:53:45 jim
07.11.2017
Virtual Integrated Network Service 18:06:00 jim
StreetTalk 18:04:45 jim
IEEE 802.11 17:51:22 jim
XNS 17:34:47 jim
Xerox Network Systems 17:33:06 jim
VINES 17:22:24 jim
Banyan VINES 17:19:21 jim
VINES Internetwork Protocol 17:14:32 jim
Directory Service 17:11:27 jim
Linked Data 13:18:22 jim
JSON for Linking Data 13:18:05 jim
04.11.2017
Schema Extensions 13:37:50 jim
03.11.2017
Determining the FDN 16:40:49 jim
02.11.2017
Ian Glazer 21:24:23 jim
Google Remote Procedure Call 18:54:03 jim
Edge Proxy 14:18:22 jim
Web Blog_blogentry_021117_1 14:16:12 jim
30.10.2017
DNS Certification Authority Authorization 09:42:40 jim
RR 09:34:59 jim
RFC 6844 09:30:17 jim
CAA 09:28:18 jim
User-agent 09:21:23 jim
HPKP 09:19:44 jim
Public Key Pinning Extension for HTTP 09:19:20 jim
Certificate Transparency 09:17:48 jim
29.10.2017
JSON-LD Examples 15:33:38 jim
28.10.2017
JAN 19:35:37 jim
Japanese Article Number 19:35:18 jim
Global Trade Item Number 19:34:08 jim
International Article Number 19:32:46 jim
ISO 10957 19:31:51 jim
ISMN 19:30:44 jim
International Standard Music Number 19:30:24 jim
ISSN 19:27:25 jim
International Standard Serial Number 19:27:02 jim
European Article Number 19:23:42 jim
International Standard Book Number 19:14:26 jim
GS1 Company Prefix 19:10:19 jim ISBNs ==> ISBN
ISBN 19:10:19 jim ISBNs ==> ISBN
Manufacturer Code 19:08:26 jim
Product Code 19:08:10 jim GS1 Prefix ==> GS1 Company Prefix
Check Digit 19:01:49 jim
EAN 18:44:08 jim
GS1 18:43:22 jim
Universal Product Code 18:40:57 jim
Google Group 14:38:32 jim
27.10.2017
Universal Links 11:59:06 jim
AppAuth 11:48:05 jim
IOS.URIScheme 11:45:33 jim
Private-Use URI Scheme Redirection 11:40:03 jim
Claimed Https Scheme URI Redirection 11:39:52 jim
Loopback Interface Redirection 11:39:34 jim
OAuth 2.0 Client Registration 11:39:20 jim
Private URI Scheme 11:21:38 jim
Custom URI scheme 10:58:39 jim
RFC 7595 10:56:46 jim
Web Blog_blogentry_261215_1 10:23:02 jim
SFSafariViewController 10:22:30 jim
OpenID Connect Use Cases 10:21:21 jim
OAuth Public Client 10:20:47 jim
Custom URI scheme pattern 10:13:08 jim
Same-Document Reference 09:26:27 jim
Absolute URI 09:09:24 jim
Cleartext 08:56:56 jim
Plaintext 08:56:33 jim
URI Schemes 08:48:14 jim
Password Storage Scheme 08:41:49 jim
RC4 08:39:27 jim
Authentication Password Syntax 08:31:58 jim
SupportedAuthPasswordSchemes 08:28:29 jim
AuthPasswordSyntax 08:22:13 jim
AuthPasswordObject 08:17:36 jim
AuthPassword 08:14:12 jim authPassword ==> AuthPassword
RFC 3112 08:13:50 jim
GroupOfEntries 08:03:39 jim
LDAP Group 08:00:46 jim
GroupOfNames 07:57:28 jim
26.10.2017
Media Access Control 13:40:20 jim
LLC 13:24:44 jim
Media Access Control Address 13:21:06 jim
IEEE 802.3 13:19:38 jim
IEEE 802.15.1 13:17:54 jim
Certificate Pinning 12:52:51 jim
IMT-Advanced 12:50:16 jim
3rd Generation Partnership Project 12:48:25 jim WiFi ==> Wi-Fi
Wi-Fi 12:48:25 jim WiFi ==> Wi-Fi
General Packet Radio Service 12:42:29 jim
3GPP 12:41:10 jim
ETSI 12:40:48 jim
European Telecommunications Standards Institute 12:40:27 jim
5G-ENSURE 12:33:52 jim
5G 12:33:12 jim
LTE 12:28:12 jim
Long Term Evolution 12:27:57 jim
International Telecommunication Union 12:25:46 jim
ITU Radiocommunication Sector 12:18:37 jim
ITU-R 12:17:39 jim
Web Blog_blogentry_261017_1 12:04:06 jim
Responsive Organizations 11:46:27 jim
15.10.2017
Sovrin 10:22:20 jim
Provenance 10:14:52 jim
JSON-LD 09:49:56 jim
Inspector-verifier 09:46:48 jim
Holder 09:44:37 jim
Verifiable Claims 09:38:25 jim
Identifier 09:00:05 jim
14.10.2017
DirXML Code Snippets 09:23:08 jim
Microsoft TIME 09:22:28 jim
FILETIME 09:21:30 jim
Leap year 09:12:05 jim
Day 09:06:15 jim
Minute 08:59:11 jim
Seconds 08:53:36 jim
Coordinated Universal Time 08:49:45 jim
UTC 08:48:53 jim
DateTime 08:46:31 jim
Week 08:34:19 jim
Month 08:26:42 jim
Calendar 08:25:10 jim Months ==> Month
Year 1952 08:14:33 jim
13.10.2017
PADME 11:34:27 jim
Policy Access Decision Management Engine 11:33:56 jim
Policy Based Management System 11:32:03 jim
Istio 11:29:02 jim
SPIFFE 11:17:52 jim
Secure Production Identity Framework For Everyone 11:17:20 jim
Open Policy Agent 11:10:52 jim
OPA 11:08:31 jim
Risk Assessment 09:18:22 jim
12.10.2017
SPARQL 13:23:11 jim
GCP Cloud VPN 08:41:08 jim
Web Blog_blogentry_121017_1 08:39:39 jim
Google Cloud Security 08:38:25 jim
GRPC 08:33:14 jim
11.10.2017
VR 16:02:54 jim
AR 16:02:38 jim
Virtual Reality 16:02:15 jim
Augmented Reality 16:00:40 jim
Web Hypertext Application Technology Working Group 09:30:58 jim
Document Object Model 09:27:41 jim
XMLHttpRequest 09:27:09 jim
Single-Page Application 09:26:45 jim
SPA 09:26:21 jim
AJAX 09:25:50 jim
WC3 09:25:22 jim
WHATWG 09:24:04 jim
DOM 09:19:55 jim
OAuth 2.0 Protocol Flows 08:53:37 jim
10.10.2017
Web Blog_blogentry_101017_1 18:43:20 jim
09.10.2017
PCT 18:17:26 jim
Subject Relationship 17:52:53 jim
OAuth 2.0 Actors 17:50:13 jim
07.10.2017
RFC 8252 22:38:51 jim
Web Blog_blogentry_071017_1 22:28:49 jim
Trust 09:01:12 jim
Security 08:46:04 jim
Relationship 08:33:40 jim
Faythe 08:14:52 jim
Key Deletion 08:12:45 jim
Crypto-shredding 08:12:16 jim
06.10.2017
HAL 10:34:51 jim
JSON Hypertext Application Language 10:34:29 jim Hypertext Application Language ==> JSON Hypertext Application Language
05.10.2017
HostServer 12:52:43 jim hostServer ==> HostServer
Year 1987 10:47:28 jim
Perl 10:40:19 jim
NMAS Get Password Request 10:38:28 jim
Universal Password Policy Definitions 10:31:00 jim
What To Do About Passwords 10:30:04 jim
FreeRADIUS Password Request 10:27:44 jim
Remote Authentication Dial-In User Service 10:26:03 jim
RFC 2058 10:17:36 jim
RADIUS 10:10:24 jim
Web Blog_blogentry_051017_1 09:46:31 jim
04.10.2017
Jspwiki.policy 12:38:28 jim
JSPWiki Permission 12:36:48 jim
Using User Attribute Values for Tomcat Roles 12:21:33 jim
WIKI-Security Policy 12:09:58 jim
WIKI-ACLs 11:58:25 jim
WIKI-Roles 11:54:40 jim
JSPWiki Roles and Groups 11:41:56 jim
Policy Administration Point 09:09:01 jim
Dynamic Authorization Management 08:53:49 jim
XACML 08:52:54 jim
Policy Information Block 08:38:49 jim Policy Information Blocks ==> Policy Information Block
PIB 08:38:37 jim
Policy Decision Point 08:15:30 jim
PRP 08:03:32 jim
Policy Retrieval Point 08:03:17 jim
Environment 07:49:07 jim
RFC 2904 07:36:57 jim
03.10.2017
Policy Based Management System/XACML_Architecture_&_Flow.png 21:56:06 jim Policy Based Access Management
Common Active Directory Bind Errors 14:25:41 jim
Countering the Financing of Terrorism 11:00:55 jim
CFT 11:00:41 jim CFT) ==> CFT
Electronic Identity Verification 10:56:46 jim
EIDV 10:51:48 jim
Web Blog_blogentry_031017_1 10:48:41 jim
Iss 09:02:08 jim
02.10.2017
Spyware 11:47:39 jim
EvilRegime 11:47:19 jim
Web Blog_blogentry_021017_1 11:46:08 jim
22.09.2017
Sovrin Steward 13:48:58 jim
Sovrin Foundation 13:34:52 jim
20.09.2017
Web Blog_blogentry_200917_1 09:09:08 jim
RFC 6410 09:04:49 jim
RFC 2026 09:03:50 jim
FYI 09:02:22 jim
RFC 8174 09:00:21 jim
RFC 2119 08:55:42 jim
Same-site Cookies 08:46:49 jim
CXRF 08:39:58 jim
19.09.2017
Wendy 09:41:51 jim
Walter 09:40:44 jim
Trent 09:40:23 jim
Sybil 09:39:36 jim
Victor 09:38:56 jim
Peggy 09:38:07 jim
Oscar 09:37:11 jim
Craig 09:35:24 jim
Eve 09:34:08 jim
Bob 09:33:10 jim
Alice 09:32:51 jim
Alice And Bob 09:32:20 jim
Resource Server 09:31:21 jim
Authorization Server 09:29:42 jim
Resource Owner 09:23:51 jim
Actor 09:22:48 jim
14.09.2017
Security Support Provider Interface 10:15:01 jim
Decentralized Identifier 09:33:22 jim
LDAP_SERVER_NOTIFICATION_OID 08:33:30 jim
LDAP Extensions and Controls Listing 08:25:21 jim
13.09.2017
Reputation System 15:01:37 jim
11.09.2017
Card Issuer 20:12:38 jim
Payment Initiation Service Provider 20:10:51 jim
Account Servicing Payment Service Provider 20:07:44 jim
07.09.2017
Front-channel communication 08:53:52 jim
OpenID.FrontChannel 08:45:58 jim
OpenID.BackChannel 08:45:30 jim
OpenID.Session 08:44:58 jim
06.09.2017
Account-Based Marketing 11:23:40 jim
Web Blog_blogentry_060917_1 11:22:31 jim
31.08.2017
Four-Party Credit Card System 09:01:28 jim
Card Not Present 08:50:19 jim
CNP 08:43:51 jim
28.08.2017
About 10:26:55 jim
REST Profile of XACML 10:14:15 jim
Web Blog_blogentry_231215_1 10:01:27 jim
Authorization 09:59:39 jim
AllAuthenticatedUsers 09:23:59 jim
AllUsers 09:23:22 jim
GCP IAM Policy 09:22:16 jim
GCP Identity 09:16:19 jim
Group 09:07:18 jim
Google Account 09:00:58 jim
27.08.2017
GCP Domain 20:08:19 jim GCP Cloud Identity Domain ==> GCP Domain
Google Cloud IAM 20:01:38 jim
GCP Bucket 19:45:43 jim
GCP Role 19:30:37 jim
Service Account 19:25:09 jim
25.08.2017
Rinse and Repeat 13:02:43 jim
IMA Interoperability Framework 12:48:27 jim
IMA Policies 12:46:35 jim IMAPolicies ==> IMA Policies
IMA Data Architecture 12:45:30 jim IMADataArchitecture ==> IMA Data Architecture
IMA Technical Reference Architecture 12:42:35 jim IMATechnicalReferenceArchitecture ==> IMA Technical Reference Architecture
Technical Positions Statements 12:38:40 jim TechnicalPositionsStatements ==> Technical Positions Statements
24.08.2017
Second Preimage Resistance 08:35:41 jim
Preimage Resistance 08:35:08 jim
Collision Resistance 08:34:23 jim
Web Blog_blogentry_240817_1 07:26:41 jim
23.08.2017
Google App Engine 16:02:07 jim
21.08.2017
Session Affinity 12:14:14 jim
Connection Draining 12:10:39 jim
Web Blog_blogentry_210817_1 12:05:34 jim
GCP Networking Products 10:04:02 jim
VPC 09:59:48 jim
Invalid_scope 08:08:55 jim
OAuth Error 08:03:50 jim
Invalid_grant 08:02:58 jim
20.08.2017
NIST.SP.800-53 10:13:25 jim
NIST Special Publication 10:08:31 jim
OpenID Connect Client 08:46:26 jim
OpenID Connect 08:45:01 jim
19.08.2017
G-Suite User 16:42:40 jim
G-Suite Group 16:42:19 jim
G-Suite Domain 16:41:50 jim
G-Suite 16:40:59 jim
17.08.2017
Access Complexity 09:48:52 jim
Advanced Local Procedure Call 09:40:14 jim
ALPC 09:38:50 jim
Local Procedure Call 09:35:12 jim
LPC 09:31:33 jim
Golden Ticket 09:03:19 jim
16.08.2017
Analytics 19:32:14 jim
Metric Analysis 19:31:29 jim
Gigabyte 19:27:46 jim
Terabyte 19:25:45 jim
PB 19:24:54 jim
Petabyte 19:24:33 jim Terabytes ==> Terabyte
TB 19:24:33 jim Terabytes ==> Terabyte
BigQuery 19:21:05 jim
Google Cloud Platform 19:10:01 jim
GCP Multi-Regional 19:07:05 jim
GCP Location 19:03:24 jim
GCP Zonal 19:00:54 jim
GCP Storage Classes 18:54:54 jim
GCP Cloud Load Balancing 18:52:10 jim
GCP Regional 18:51:50 jim Google Regional ==> GCP Regional
Google Cloud Interconnect 18:35:59 jim
Google Edge Points of Presence 18:23:28 jim
Google Global Cache 18:15:24 jim
Google Data Centers 18:14:58 jim
Google Network Infrastructure 18:07:52 jim
Edge-Node 17:57:04 jim
HBase 11:14:20 jim
GCP Storage Products 11:07:49 jim
Relational Database Management System 11:05:11 jim
RDBMS 10:57:55 jim
15.08.2017
EDirectory 9.0.2.1 (40004.44) 20:23:41 jim
GCP Cloud CDN 10:37:40 jim
Google Cloud DNS 10:32:39 jim
ScaleFT 09:58:45 jim
Google Persistent Disk 09:20:17 jim
Google Cloud DataStore 09:16:40 jim
NoSQL 09:14:16 jim
BigTable 09:12:37 jim
Google Cloud SQL 09:09:50 jim
Google Drive 09:03:50 jim
GCP Compute Products 08:41:21 jim
Web Blog_blogentry_150817_1 08:33:19 jim
Object storage 08:25:00 jim
E-residency 08:11:42 jim
PayPal 08:11:28 jim
14.08.2017
BFT 10:25:29 jim
Two Generals Problem 10:21:26 jim
Fair Information Practices 10:03:01 jim
Create The Vision 10:02:16 jim
JLINC 09:44:36 jim
American National Standards Institute 09:42:27 jim
Stellar Network 09:41:49 jim
Stellar Ledger 09:40:55 jim
Our Approach 09:34:11 jim
We 09:28:55 jim
ContactUs 09:25:34 jim
Informed Consent 09:14:19 jim
13.08.2017
GCP ACL 11:08:22 jim
Durability 10:33:24 jim
12.08.2017
Open Banking Security Profile 22:01:28 jim
Open Banking 21:57:48 jim
GCP Project Owner 11:17:07 jim
Google Cloud Project 11:16:31 jim
GCP Project Creator 11:16:16 jim
GCP Permission 10:58:37 jim
GCP Organizational Viewer 10:35:54 jim
G-Suite Super Admin 10:23:05 jim
GCP Organizational Admin 10:11:06 jim
Circle of Trust 09:09:57 jim
IT Infrastructure Library 09:08:57 jim
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework 09:07:34 jim
IMA Governance Framework And Organizational Context 09:06:22 jim
The OAuth 2.0 Authorization Framework 09:05:51 jim
Resource Description Framework 09:05:07 jim
Universal Authentication Framework 09:04:10 jim
Mobile Security Framework 09:02:37 jim
Open Identity Trust Framework 08:56:06 jim
HTTP Authentication Framework 08:54:34 jim
Identity Ecosystem Framework 08:52:24 jim
Respect Trust Framework 08:50:46 jim
.NET 08:48:49 jim
Geneva Framework 08:47:52 jim
Implementation 08:45:05 jim
Design 08:44:35 jim
Trust Framework 08:18:54 jim
Framework 08:16:45 jim
Software Architecture Model 07:57:01 jim
Best Practices 07:53:23 jim
11.08.2017
Kubernetes 11:53:24 jim
Google Container Engine 11:49:11 jim
Google Coldline 10:36:43 jim
Google Nearline 10:35:39 jim
Data Store Service 10:32:04 jim
Elasticity 09:21:13 jim
SaaS 09:00:25 jim
Identity as a Service 08:59:52 jim
Identity Relationship Management 08:59:36 jim
Cloud Services Model 08:59:05 jim
Azure 08:58:49 jim
Authentication Challenges 08:58:32 jim
PaaS 08:57:18 jim
Google Compute Engine 08:27:41 jim
10.08.2017
IAP 12:32:39 jim
Gsutil 09:11:06 jim
Gcloud 09:09:57 jim
Google Cloud SDK 09:02:49 jim
Microservice 08:47:59 jim
Polyglot 08:44:26 jim
Atomicity 07:46:21 jim
09.08.2017
Interface Description Language 19:50:16 jim
Distributed Computing Environment 19:48:31 jim
Isolation 19:39:32 jim
Law of Consistent Experience Across Contexts 19:33:44 jim
Single Responsibility Principle 19:25:23 jim
Google Cloud Client Libraries 14:42:14 jim
Google API Explorer 14:36:24 jim
Google Cloud Shell 14:29:09 jim
Role 13:51:56 jim
GCP 13:36:07 jim
Google Cloud Resource Manager API 13:33:02 jim
Google Cloud Platform Console 13:30:56 jim
Cloud computing 13:30:24 jim
Computing 09:21:18 jim
Data Store 09:10:02 jim
IBM 701 08:24:06 jim
Web Blog_blogentry_090817_1 08:19:50 jim
08.08.2017
Tensors 14:23:32 jim
TensorFlow 13:57:38 jim
Attribute Value Assertion 10:49:44 jim
LDAP URL Extension 10:40:47 jim
2.5.18.5 10:38:48 jim
LDAP Administrative Role 10:38:20 jim
LDAP Schema Element Type 10:27:49 jim
Internet Assigned Numbers Authority (IANA) Considerations for the Lightweight Directory Access Protocol (LDAP) 10:03:49 jim
Lightweight Directory Access Protocol (LDAP) Parameters 10:01:02 jim
AttributeTypes 09:36:28 jim
TypesOnly Flag 09:34:08 jim
AttributeSelection 09:28:18 jim
DESC 09:13:24 jim
Security Information and Event Management 09:07:36 jim
Security Event Manager (SEM) 09:04:27 jim
Secure Hash Algorithm 08:50:10 jim
SHA-224 08:49:05 jim
07.08.2017
Terms 15:29:22 jim
Web Blog_blogentry_070817_1 11:24:54 jim
06.08.2017
Publisher Flow 12:04:31 jim
Subscriber Flow 12:03:44 jim
Subscriber Channel 12:02:43 jim
Challenge-response 11:55:01 jim
Request-Response 11:49:57 jim
Publish-Subscribe 11:46:44 jim
Fan-out 11:37:14 jim
Messaging pattern 11:34:19 jim
Subscriber 11:33:52 jim
Publisher 11:33:30 jim
Message 11:20:30 jim
Consent Mechanism 11:00:29 jim
Privilege 10:58:59 jim
Intelligence Assessment 10:58:18 jim
Security Incident 10:56:04 jim
ETP 10:54:46 jim
Complex Event Processing 10:46:58 jim
SubmitEventRequest 10:45:35 jim
Event Correlation 10:44:43 jim
Unfortunate event 10:42:39 jim
Novell Audit 10:42:03 jim
Event Cache 10:41:17 jim
XDAS Event 10:40:48 jim
Domain Event 10:37:53 jim
LDAP Monitoring Overview 10:36:17 jim
Event Monitoring 10:34:11 jim EventMonitoring ==> Event Monitoring
CAP theorem 09:47:22 jim
LATA 08:51:44 jim
Local Access and Transport Area 08:46:52 jim
Point-of-Presence 08:42:01 jim
PoP 08:31:32 jim
05.08.2017
Blockstack 08:42:33 jim
Public Key Infrastructure Weaknesses 08:26:14 jim
04.08.2017
Event-triggered 15:27:44 jim
Event 15:24:03 jim
Logout Token 15:22:03 jim
Triggerless vs Triggered Publication 15:19:59 jim
GBR 12:32:07 jim
USA 12:30:51 jim
ISO 9834.1 12:02:15 jim
X.660 12:01:31 jim
DCC 11:50:44 jim
How To Get Your Own OID 11:45:05 jim
2.16.840.1.113883 11:41:52 jim
Health Level Seven 11:41:16 jim
HL7 11:40:43 jim
ISO 11:29:38 jim
CCITT 11:28:40 jim
1.3.6.1.4.1.8876 11:27:11 jim
2.16.840.1.113730 11:17:38 jim
Netscape Communications Corp 11:04:53 jim
Virtual List View Control 11:01:17 jim
VLV 10:59:07 jim
Virtual Directory 10:57:10 jim
Oracle 10:54:01 jim
Oracle Passwords 10:51:27 jim
Event Sequencer 10:23:26 jim
AlertErrorEvent 10:16:54 jim
EDirectory 10:11:07 jim
Web Blog_blogentry_040817_1 10:05:46 jim
Persistent Compute Objects 09:18:17 jim
OpenWhisk 08:56:39 jim
Azure Functions 08:49:57 jim
Google Cloud Functions 08:45:31 jim
Webtask 08:42:57 jim
Web Blog_blogentry_131016_1 08:41:21 jim
03.08.2017
Centrify 21:04:01 jim
Web Blog_blogentry_030817_1 21:01:00 jim
02.08.2017
Service Worker 14:37:53 jim
Progressive Web Application 14:09:39 jim
Web Blog_blogentry_020817_1 13:51:17 jim
RFC 2891 11:39:31 jim
RFC 3447 10:54:24 jim
Digital Signature Algorithm 10:48:13 jim
RFC 8017 10:46:27 jim
RSA Digital Signature Algorithm 10:45:31 jim
RFC 3279 10:44:34 jim
Signature Primitive 10:29:58 jim
Verification Primitive 10:25:48 jim
Digital Signature 09:57:42 jim
FIPS 186 08:56:21 jim
Electronic Signatures 08:41:08 jim
Electronic IDentification Authentication and trust Services 08:36:34 jim
01.08.2017
Key Management 14:29:29 jim
BCP 107 14:26:48 jim
NIST.SP.800-133 14:21:27 jim
Key Generation 14:20:19 jim
Key Revocation 14:18:00 jim
DPKI 13:59:18 jim Decentralized PKI ==> Decentralized Public Key Infrastructure
Decentralized Public Key Infrastructure 13:59:18 jim Decentralized PKI ==> Decentralized Public Key Infrastructure
Keystore 13:55:31 jim
DID method 11:38:59 jim
DID record 11:35:42 jim
FHIR Element 10:45:10 jim
Health Relationship Trust 10:27:15 jim
Non Permissioned System 09:55:02 jim
Attestation 08:59:30 jim
Web Blog_blogentry_010817_1 08:43:30 jim
31.07.2017
Cryptographic Hash Function 09:39:34 jim
Keyed-Hash Message Authentication Code 09:38:44 jim
FIPS 198-1 09:37:10 jim FIPS198-1 ==> FIPS 198-1
Password Validator 09:37:10 jim FIPS198-1 ==> FIPS 198-1
MAC 09:31:56 jim
Message Authentication Code 09:31:12 jim
OWHF 08:32:40 jim
One-Way Hash Function 08:32:24 jim
Web Blog_blogentry_310717_1 07:49:32 jim
30.07.2017
Sub 14:13:29 jim
Web Blog_blogentry_300717_1 14:07:40 jim
Web Blog_blogentry_030117_1 13:34:53 jim
Resource Provisioning 13:32:23 jim
Privileged Access Management 13:31:45 jim
Privilege Conflict 13:31:14 jim
Identity Credential and Access Management 13:30:43 jim
IDPro 13:29:48 jim
API Service Delivery 13:28:47 jim
Data Management 12:27:07 jim
Data Pedigree 12:21:11 jim
Information Lifecycle Management 12:19:41 jim
Vendor Relationship Management 12:18:31 jim
Privacy by Design 12:17:17 jim
Data Access Governance 12:10:32 jim
Customer Relationship Management 12:03:06 jim
Access Control Policy 11:48:11 jim
Human Limitation 11:38:06 jim
Attacker 11:33:21 jim
Internal Attacker 11:31:43 jim
Verizon Data Breach Investigations Report 11:26:53 jim
Organizational-centric 11:20:08 jim
Local Area Network 11:18:09 jim
Untrusted network 11:16:27 jim
Trusted network 11:15:13 jim
Forrester 11:11:24 jim
Application-centric 10:56:37 jim
Bounded Context 10:49:04 jim
Releasability 10:31:57 jim
Information Rights Management 10:01:15 jim
Data Security Analytics 09:58:49 jim
Data Visibility 09:54:11 jim
Data Discovery 09:51:17 jim
Data Disposal 09:32:23 jim
Disclosure-Alteration-Destruction 09:13:24 jim
Data Protection 09:04:37 jim
Life cycle 08:50:39 jim
Reference Information Model 08:46:14 jim
State 08:43:35 jim
Password Modify Operation 08:31:03 jim
29.07.2017
Sensitive Data 21:53:10 jim
Data-centric 21:47:18 jim
Authenticity 09:51:01 jim
Stagefright 09:47:20 jim
APT 09:38:50 jim
Partners 09:37:20 jim
Voice over IP 09:29:30 jim
Internet Relay Chat 09:28:14 jim
IRC 09:26:16 jim
Instant Messaging 09:22:43 jim
Web Blog_blogentry_290717_1 08:46:12 jim
SOAP back-channel 08:38:09 jim
Code Division Multiple Access 08:36:19 jim
Protocol Data Unit 08:35:41 jim
QoP 08:34:16 jim
Quality of Protection 08:34:01 jim
Implementing and Integration 08:31:03 jim
Back-channel Communication 08:30:14 jim
Near Field Communication 08:29:40 jim
Inter-Process Communication 08:27:52 jim
Communication Layers 08:25:32 jim
Digital communication 08:24:01 jim
Communication 08:22:47 jim
Voice 08:21:57 jim
Proprietary Protocol 07:55:53 jim
Universal Inbox 07:52:51 jim
Facebook Messenger 07:50:26 jim
IM 07:50:21 jim
Rich Communication Services 07:37:24 jim
Off-the-Record Messaging 07:17:52 jim
Extensible Messaging and Presence Protocol 07:16:58 jim
Short Message Service 07:13:29 jim
Mobile Application Part 07:06:41 jim
MAP 07:06:18 jim
28.07.2017
Proxy 21:10:43 jim
SOA 20:49:25 jim
Web Blog_blogentry_280717_1 20:20:56 jim
User-centric Identity 11:05:11 jim
Privacy 10:48:28 jim
LIGHTest 10:37:11 jim
Cross-domain authentication 10:09:28 jim
Cross Origin Resource Sharing 10:09:17 jim
Cross-domain 10:08:27 jim Cross-Domain ==> Cross-domain
Update 09:21:07 jim
Read 09:20:08 jim
Create 09:17:56 jim
Create Read Update Delete 09:04:15 jim
Recurrent Neural networks 08:09:15 jim
Long Short Term Memory networks 08:07:08 jim
Turing test 07:49:04 jim
27.07.2017
Year 1978 20:49:57 jim
NIST.SP.800-63 20:32:41 jim
Web Blog_blogentry_270717_1 20:18:01 jim
Password Dictionary 11:56:35 jim
Who Owns the Data 11:29:19 jim
Ownership 11:28:38 jim
Electronic Fitness Device 11:20:49 jim
Vehicle 10:49:24 jim
Local device 10:44:38 jim
Mobile Device 10:43:03 jim
Internet of Things 10:31:08 jim
Personal Health Record 10:08:26 jim
Electronic Health Record 09:19:08 jim
Electronic Medical Record 09:16:04 jim
Health information 09:04:31 jim
HIPAA Privacy Rule 08:58:08 jim
HIPAA Covered Entity 08:42:55 jim
United States Department of Health and Human Services 08:31:41 jim
Protected Health Information 08:19:43 jim
26.07.2017
Best Practices Password 17:23:11 jim
Password Anti-Pattern 17:21:56 jim
Government Communications Headquarters 17:14:07 jim
GCHQ 17:10:01 jim
Password Expiration 17:07:47 jim The National Cyber Security Centre ==> National Cyber Security Centre
National Cyber Security Centre 17:07:46 jim The National Cyber Security Centre ==> National Cyber Security Centre
NCSC 17:07:37 jim
Password Hint 16:48:31 jim
Password Character Composition 16:38:53 jim
Password Maximum Length 16:30:08 jim
Refresh Token 12:09:56 jim
Offline_access 12:09:08 jim
HTTP 400 11:10:17 jim
Backchannel_logout_session_required 10:56:27 jim
Backchannel_logout_uri 10:54:43 jim
PROHIBITED 10:34:51 jim
Backchannel_logout_session_supported 10:34:10 jim
Backchannel_logout_supported 10:30:50 jim
Frontchannel_logout_session_required 09:51:40 jim
Frontchannel_logout_uri 09:47:27 jim
NAM Customized JSP Pages 08:47:19 jim
Posting Credentials to NAM 08:46:29 jim
Standards Based SSO 08:45:56 jim
Iframe 08:45:07 jim
WebView 08:43:47 jim
Embedded user-agent 08:41:17 jim
Native application 08:38:00 jim
Application 08:33:23 jim
Hybrid apps 08:32:16 jim
Mobile App 08:30:58 jim
Firebug 08:18:51 jim
NAM Troubleshooting 08:18:15 jim
WebKit 08:13:18 jim
Safari 08:11:27 jim
System browser 08:08:51 jim
Chrome 08:08:01 jim
Chrome Custom Tabs 08:03:18 jim
25.07.2017
Pseudonym 17:37:12 jim
Pseudonymization 17:35:47 jim
Data anonymization 17:33:40 jim
MaaP 10:43:43 jim
Web Blog_blogentry_130717_1 10:42:55 jim
RCS 10:42:49 jim
RCS Universal Profile 10:39:50 jim
Messaging as a Platform 10:37:01 jim
Composite data type 10:22:11 jim
Complex Attribute 10:10:49 jim
Component Syntax 10:09:05 jim
DirXML-Entitlement 10:07:44 jim
Reference data type 09:59:37 jim
Primitive data type 09:56:49 jim
Data type 09:54:34 jim
Integer 09:35:06 jim
Digital Imaging and Communications in Medicine 09:05:26 jim
DICOM 09:01:21 jim
CDA 09:00:41 jim
Clinical Document Architecture 08:58:45 jim
RIM 08:42:39 jim
Integrating the Healthcare Enterprise 08:39:28 jim
IHE 08:37:10 jim
OpenEHR 08:36:21 jim
24.07.2017
Constrained Networks 11:18:38 jim
Constrained-Node Networks 11:16:36 jim
ROM 10:57:29 jim
Edirectory ReadOnly Replica 10:55:39 jim EdirectoryReadOnlyReplica ==> Edirectory ReadOnly Replica
Edirectory Replicas 10:55:39 jim EdirectoryReadOnlyReplica ==> Edirectory ReadOnly Replica
Removing Failed Server 10:55:39 jim EdirectoryReadOnlyReplica ==> Edirectory ReadOnly Replica
NO-USER-MODIFICATION 10:54:00 jim
Mutability 10:53:06 jim
Remote Procedure Call 10:51:11 jim
MD5 10:25:29 jim
Triple DES 10:24:13 jim
Birthday Paradox 10:21:42 jim
3DES 10:17:41 jim
Salesforce 09:54:43 jim
Web Blog_blogentry_240717_1 09:45:40 jim
DNS NCACHE 09:09:20 jim
Negative Caching of DNS Queries 09:08:56 jim
RFC 2308 09:05:17 jim
PAPE 08:58:51 jim
OpenID.PAPE 08:58:01 jim
Social Login 08:56:51 jim Provider Authentication Policy Extension ==> OpenID Provider Authentication Policy Extension
OpenID Provider Authentication Policy Extension 08:56:50 jim Provider Authentication Policy Extension ==> OpenID Provider Authentication Policy Extension
Federal Identity Credential and Access Management 08:48:12 jim
FICAM 08:45:19 jim
ICAM 08:39:15 jim Identity, Credential, and Access Management ==> Identity Credential and Access Management
Web Blog_blogentry_260815_1 08:39:15 jim Identity, Credential, and Access Management ==> Identity Credential and Access Management
23.07.2017
Web Blog_blogentry_230717_1 12:13:59 jim
Not For Identification Purposes 12:12:37 jim
Select_account 11:13:19 jim
Prompt Parameter 11:09:27 jim
SIM Swap 10:55:35 jim
Personally Identifiable Information 10:46:35 jim
Mobile TAN 10:38:00 jim
Signalling System No. 7 10:31:38 jim
Paym 10:28:27 jim
SSN 10:22:19 jim
Identity Broker 10:12:24 jim
Identity Correlation 10:11:47 jim
22.07.2017
LDAP_INVALID_CREDENTIALS 21:05:30 jim
Web Blog_blogentry_220717_1 19:56:56 jim
19.07.2017
Oidc-client-js 16:36:49 jim
FETT 10:30:08 jim
OAuth 2.0 Threat Model and Security Configurations 10:21:27 jim
JSON Web Token Best Current Practices 09:36:46 jim
Malicious Endpoint 09:05:46 jim
OAuth 2.0 Mix-Up Mitigation 09:02:20 jim
OAuth 2.0 Tokens 08:52:31 jim
Encoding claims in the OAuth 2 state parameter using a JWT 08:44:13 jim
OAuth state parameter 08:38:16 jim
17.07.2017
Web Blog_blogentry_170717_1 10:52:45 jim
YubiKey 10:33:16 jim
U2F 10:32:41 jim
Authenticator Assurance Levels 10:29:13 jim
Authenticator App 10:26:34 jim
CloudFlare 10:19:22 jim
Content Delivery Network 10:19:03 jim
CDN 10:18:41 jim
Apache 10:13:26 jim
SHA-1 Deprecation 10:12:47 jim
Cipher Suite 10:09:57 jim
NGINX 10:09:30 jim
Lua-resty-openidc 10:04:01 jim
Mod_auth_openidc 09:59:13 jim
RFC 7800 09:48:21 jim
JWT Confirmation Methods 09:47:42 jim
NaCl 09:35:20 jim NaCL ==> NaCl
Networking and Cryptography library 09:35:07 jim
Special-Use Domain Names 09:18:55 jim
RFC 6761 09:17:32 jim
127.0.0.1 09:16:40 jim
Localhost 09:16:02 jim
Private-Use Networks 09:12:31 jim
RFC 5735 09:09:32 jim
Carrier-grade NAT 09:08:51 jim
Unique Local IPv6 Unicast Addresses 09:08:19 jim
RFC 1918 09:06:38 jim
Network Security 09:04:21 jim
Network Address Translation 09:03:46 jim Private Network ==> Private-Use Networks
Loopback 08:54:30 jim
16.07.2017
OAuth 2.0 Token Exchange 22:28:42 jim
XRDS 10:03:54 jim
EXtensible Resource Descriptor Sequence 10:03:35 jim (eXtensible Resource Descriptor Sequence ==> EXtensible Resource Descriptor Sequence
I-name 10:02:43 jim
I-number 09:59:42 jim
OpenID 09:54:23 jim
Yadis 09:42:33 jim
Web Blog_blogentry_160717_1 09:29:39 jim
Web Blog_blogentry_140717_1 08:48:44 jim
15.07.2017
Implicit Grant 11:56:54 jim
Implicit Flow 11:56:35 jim
Meaningless But Unique Number 10:55:42 jim
By-reference 10:54:53 jim
By-value 10:50:53 jim
Request_uri 10:50:21 jim
Request_object_encryption_enc_values_supported 10:49:37 jim
Request_object_encryption_alg_values_supported 10:48:49 jim
14.07.2017
OpenID Connect Certified 20:34:00 jim
Challenged Networks 11:21:07 jim
Subtree Delete Control 10:54:02 jim
RFC 4525 10:15:59 jim
LDAP Modify-Increment Extension 10:15:15 jim
13.07.2017
IAL3 11:00:14 jim
IAL2 11:00:04 jim
IAL1 10:59:53 jim
Identity Verification Service 10:58:33 jim
Password Recovery 10:55:31 jim
Verifier 10:44:50 jim
Knowledge-Based Authentication 10:42:52 jim
Identity questions 10:35:15 jim
Authentication Method Reference Values 10:21:13 jim
KBA 10:20:02 jim
12.07.2017
Base64 19:55:48 jim
Response_type 19:31:35 jim
Authorization Code 19:25:25 jim
OpenID Connect Flows 19:07:59 jim
Hybrid Flow 19:05:11 jim
OpenAM Endpoints 18:42:56 jim
Mobile Connect 17:46:22 jim
EIDAS 17:41:37 jim
Digital Identity Acceptance Policy 17:39:53 jim
STD 3 15:26:54 jim
RFC 1267 15:11:26 jim
RFC 2821 15:09:49 jim
RFC 821 15:09:05 jim
RFC Status 15:06:47 jim
BCP 15:06:11 jim
Experimental 15:04:36 jim
Internet Draft 15:01:55 jim
ID 15:00:08 jim
STD 1 14:36:22 jim
Standards Track 14:24:28 jim
Proposed Standard 14:20:41 jim
STD 14:16:23 jim
IESG 14:13:31 jim
Internet Engineering Steering Group 14:13:13 jim The Internet Engineering Steering Group ==> Internet Engineering Steering Group
RFC Sub-series 14:11:31 jim
RFC 13:15:52 jim
RFC 5000 13:15:17 jim
RFC 1796 13:07:47 jim
HOTP 12:46:24 jim
RFC 5842 12:43:46 jim
Server Error 12:31:50 jim
Client Error 12:25:01 jim
Redirection 12:22:38 jim
HTTP 407 12:09:45 jim
Basic Authentication Scheme 12:06:03 jim
SASL 12:02:57 jim
LDAP Proxy User 11:54:59 jim
Proxy-Authorization 11:51:30 jim Proxy Authorization ==> Proxy-Authorization
Proxy-Authenticate 11:50:05 jim Proxy-Authentication ==> Proxy-Authenticate
Authentication Schemes 11:34:48 jim
PIN 11:28:15 jim
RFC 2753 11:24:52 jim
Policy Ignorant Node 11:23:49 jim
Client Authentication Methods 11:18:57 jim
Simple Authentication 11:16:38 jim
LDAP Authentication Methods 11:11:12 jim
Authorization Header 11:04:44 jim
RFC 3492 10:52:03 jim
Punycode 10:51:12 jim
Internationalized Domain Name 10:49:36 jim
Internet Corporation for Assigned Names and Numbers 10:48:09 jim
ICANN 10:47:11 jim
Email Address 10:35:57 jim
Content-Type 10:20:16 jim
MIME Type 10:09:45 jim
Media-type 10:09:17 jim
Content-Encoding 10:05:25 jim
HTTP Body 09:52:23 jim
HTTP Entity Header 09:44:21 jim
HTTP Response Header 09:39:33 jim
RFC 7235 09:31:29 jim
Private_key_jwt 09:14:22 jim
Client_secret_post 09:13:57 jim
Client_secret_basic 09:13:29 jim
11.07.2017
WikiWiki 22:21:21 jim
WikiEtiquette 22:17:59 jim
UnusedPages 22:16:27 jim
Automated Password Self Service 22:14:18 jim
APASS 22:13:07 jim
UndefinedPages 22:10:58 jim
CopyrightNotice 21:49:12 jim
ApprovalRequiredForUserProfiles 21:42:07 jim
ApprovalRequiredForPageChanges 21:41:25 jim
A Configuration Profile Schema for Lightweight Directory Access Protocol (LDAP)-Based Agents 21:23:33 jim
Production Implementation 17:04:19 jim
PageVersionTag 16:59:56 jim
Prototyping 16:54:47 jim
Sketching 16:52:45 jim
API Planing 16:51:02 jim
NspmDistributionPassword 16:08:27 jim
Hardware Virtualization 15:49:08 jim
Paravirtualization 15:48:26 jim
Hypervisor 15:48:03 jim
Full Virtualization 15:46:37 jim
NMAS 15:22:00 jim
LCM 15:13:52 jim
Universal Password 15:07:40 jim
SPM_ALLOW_SPWD_SET 14:08:42 jim
NspmConfigurationOptions 14:07:44 jim
UniversalPasswordSecretBits 14:03:09 jim
DevOps 13:49:25 jim
Continuous Development 13:44:31 jim
Continuous Delivery 13:42:33 jim
Dr. Axel SchnellbÃGel 11:42:00 jim
Authentication Context Class Reference 10:33:22 jim
Acr_values_supported 10:17:54 jim
Request_object_signing_alg_values_supported 10:00:22 jim
Concise Binary Object Representation 09:58:28 jim
JSON Web Tokens 09:54:24 jim
Javascript Object Signing and Encryption 09:52:25 jim
JSON Object 09:50:34 jim
OpenID Connect Claims 09:45:03 jim
JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants 09:11:57 jim
Authentication Context Class Values 09:09:02 jim
Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants 09:03:29 jim
Acr 08:53:18 jim
Financial API 02:08:58 jim
UMA 2.0 01:55:07 jim
UMAFedAuthz 01:51:58 jim
Federated Authorization for UMA 2.0 01:51:37 jim
UMA 2.0 Grant for OAuth 2.0 Authorization 01:51:20 jim
UMAGrant 01:34:19 jim
Web Blog_blogentry_110717_1 01:28:32 jim
Runtime Application Self-Protection 00:59:07 jim
RASP 00:58:24 jim
10.07.2017
Constrained Application Protocol 16:28:10 jim
05.07.2017
Collective Attribute 12:08:24 jim
CollectiveAttributeSubentry 12:05:46 jim
LDAP Entry Collection 12:00:39 jim
CollectiveExclusions 11:52:38 jim
CollectiveAttributeSubentries 11:51:01 jim
COLLECTIVE Flag 11:31:34 jim
RFC 3671 11:30:58 jim
LDAP Subentry 11:29:49 jim
USAGE 11:16:51 jim
EDirectory Extended LDAP Flags 11:14:03 jim
X-NDS_ACL_TEMPLATES 11:00:47 jim
ACL (eDirectory Attribute) 10:43:27 jim
SINGLE-VALUE 10:26:56 jim
X-NDS_BOTH_MANAGED 10:22:52 jim
X-NDS_FILTERED_OPERATIONAL 10:18:15 jim
X-NDS_ENCRYPTED_SYNC 10:15:27 jim
X-NDS_NON_REMOVABLE 10:13:06 jim
X-NDS_NONREMOVABLE 08:42:46 jim
Obituary 08:40:23 jim
NDS Obituaries 08:35:54 jim
2.16.840.1.113719.1.1.4.1.114 08:33:56 jim
Distributed File System 08:23:02 jim
Data warehouse 08:16:26 jim
ETL 08:15:24 jim Extract, Transform, Load ==> Extract Transform Load
Disk partition 08:09:57 jim
File System 08:09:13 jim
Structured data 08:05:33 jim
Unstructured data 08:03:14 jim
04.07.2017
Social Web 10:46:42 jim
Social Websites 10:46:02 jim
Instagram 10:45:24 jim
LinkedIn 10:44:05 jim
Facebook 10:39:04 jim
Social Identity 10:38:07 jim
Single Sign-On Scenarios 10:37:09 jim
Life Management Platform 10:35:29 jim Social Networks ==> Social Websites
External Metrics 10:35:28 jim Social Networks ==> Social Websites
JF2 09:58:41 jim
JF2 Post Serialization Format 09:58:15 jim
Web Blog_blogentry_040717_1 09:53:54 jim
HTML5 09:46:54 jim
Microdata 09:42:32 jim
Microformats 09:41:27 jim
Micropub 09:39:40 jim
Service Provider 08:58:33 jim
Consumer of services 08:54:58 jim
03.07.2017
SynchronizedUpTo 12:40:41 jim
Naming Attributes 12:28:31 jim
FLAG_ATTR_IS_RDN 12:27:53 jim
FLAG_SCHEMA_BASE_OBJECT 12:26:13 jim
Bad-Pwd-Count 12:24:05 jim
BadPwdCount 12:16:59 jim
FLAG_ATTR_NOT_REPLICATED 12:13:48 jim
SystemFlags 12:11:49 jim
X-NDS_NEVER_SYNC 12:08:24 jim
Non-replicated 12:07:17 jim
Active Directory Locked Accounts 12:04:24 jim
GSS-SPNEGO 11:46:50 jim
NDS Authentication 11:44:17 jim
Novell Directory Services 11:40:18 jim
Multiple-channel Authentication 11:03:04 jim
Channel 10:40:25 jim
Protocol Stack 10:38:45 jim
Protocol Suite 10:34:43 jim
JSON Web Signature and Encryption Header Parameters Registry 09:56:01 jim
JOSE Header Parameter 09:54:06 jim
Client Secret 09:37:18 jim
Error 09:26:59 jim
Success 09:25:53 jim
LDAP Client Error And Result Codes 09:21:19 jim
EDirectory and NDS Client Error Codes 09:18:07 jim
DIR-XML-Error-Variables 09:16:39 jim
LDAP Error Codes 09:13:49 jim
LDAP_LOCAL_ERROR 09:13:24 jim
DirXML Error 09:10:26 jim
Server_error 09:07:34 jim
Authy 08:52:30 jim
OATH 08:49:57 jim
Initiative for Open Authentication 08:49:35 jim
Time-based One-time Password Algorithm 08:47:24 jim OATH ==> Initiative for Open Authentication
HMAC-based One-Time Password Algorithm 08:47:23 jim OATH ==> Initiative for Open Authentication
Google Authenticator 08:35:21 jim
App 08:29:02 jim
Browser-view 08:07:44 jim
30.06.2017
Nested Groups 10:34:48 jim
Negative Permission 10:32:28 jim
Permission 10:31:51 jim
Positive Permission 10:30:31 jim
Access Request 09:49:53 jim
Access 09:48:06 jim
Privilege Management Infrastructure 08:19:11 jim
Access Authority 08:10:39 jim
Physical Access Control 07:57:50 jim
Logical Access Control 07:56:49 jim
29.06.2017
NIST.SP.800-192 15:43:03 jim
Cyclic Inheritance 15:10:38 jim
Groups Are Bad 15:07:03 jim
NIST.SP.800 Computer Security 14:49:00 jim
28.06.2017
API-Gateway/OAuth_diagrams-04-768x1065.png 16:46:57 jim OAuth_diagrams-04-768x1065
EXtensible Access Control Markup Language 16:40:44 jim
Password Minimum Length 15:45:45 jim
NspmComplexityRules 15:43:37 jim
Password Quality 15:41:48 jim
Password Modification Policy 15:35:40 jim
Password Validity Policy 15:35:20 jim
Heuristic Attacks 15:19:53 jim
Credential Leaked Databases 14:52:58 jim
Credential Leakage 14:50:36 jim
Derived Credential 14:36:40 jim
Compromised Credential 14:33:17 jim
Privacy Paradox 13:19:34 jim
World Privacy Forum 12:25:15 jim
X.690 11:58:37 jim
UnicodePwd 11:55:55 jim
One-Time Pad 10:48:38 jim
Web Blog_blogentry_280617_1 10:42:19 jim
OTP 10:16:13 jim
Information-theoretic Secure 10:03:29 jim
Side-channel attacks 09:48:09 jim
Computational Hardness Assumption 09:40:32 jim
Information Leakage 09:27:58 jim
27.06.2017
2.16.840.1.113719.1.1.4.1.545 10:15:05 jim
2.16.840.1.113719.1.1.4.1.271 10:14:28 jim
2.16.840.1.113719.1.1.5.1.6 10:13:41 jim
SYN_CI_LIST 10:12:24 jim
Case Ignore List 10:11:48 jim
RFC 4646 10:02:23 jim
RFC 4647 10:00:45 jim
RFC 3066 10:00:02 jim
Content-Language 09:58:08 jim
Accept-Language 09:55:38 jim
Ui_locales 09:46:43 jim
Acr_values 08:10:01 jim
Default_acr_values 08:03:39 jim
26.06.2017
Terms Of Engagement 16:09:40 jim
Privileged User Management 16:06:45 jim
Visitor Location Register 16:05:22 jim
Legal Person 16:04:34 jim
CommonAccord 16:04:22 jim
Federal Bureau of Investigation 16:03:55 jim
United States Supreme Court 15:54:12 jim
Act (Actor) Claim 14:54:37 jim
SecOps 14:31:38 jim
NetSec 14:31:03 jim
SIEM 14:30:39 jim
Enterprise Mobility Management 14:28:59 jim
Cloud Access Security Broker 14:28:01 jim
CASB 14:24:04 jim
EMM 14:23:03 jim
ConfigurationManagement 13:39:04 jim
Service Support 13:36:08 jim
Incident Management 13:35:18 jim IncidentManagement ==> Incident Management
Release Management 13:33:07 jim
LDAP for Linux and Unix Clients 12:58:43 jim
Fraud and Risk 12:47:06 jim
Security Operations 12:39:55 jim
IT Service Management 12:30:53 jim
Profile Management 12:24:06 jim
Profile 12:22:47 jim
Self-Service 12:18:08 jim
User Self Service 12:14:50 jim
IDSA Integration Framework/IDSA-Integration-framework.png 12:08:05 jim IDSA-Integration-framework
Identity Defined Security Alliance 11:45:23 jim
Web Blog_blogentry_260617_1 11:38:26 jim
Authorization_endpoint 10:24:50 jim
OAuth 2.0 Audience Information 10:04:27 jim
Access Token Types Registry 09:44:59 jim
Access Token Type 09:43:18 jim
OAuth Authorization Endpoint Response Types Registry 09:07:13 jim
Query Response Mode 09:00:35 jim
Form_post 08:54:09 jim
Id_token 08:34:12 jim
Access_token 08:33:38 jim
25.06.2017
RFC 7673 11:07:39 jim
TLSA 11:02:08 jim
DNS-Based Authentication of Named Entities 10:55:25 jim
DANE 10:54:47 jim
RFC 7671 10:54:25 jim
RFC 6698 10:47:15 jim
Web Blog_blogentry_250617_1 10:45:29 jim
End-to-End Communications 10:33:22 jim
Form Serialization 09:44:43 jim
URI Query String Serialization 09:43:23 jim
OpenID Connect Authorization Flow 09:28:16 jim
OpenID Connect Authentication Response 09:24:50 jim
Authentication Request 09:19:46 jim
Authorization Server Request End-User Consent-Authorization 09:18:09 jim
Authorization Server Authentication of the End-User 09:11:55 jim
Ui_hint 07:38:32 jim
24.06.2017
Payment Services Directive 12:16:04 jim
23.06.2017
Open Bank Project 22:18:59 jim
UK Open Banking 22:12:05 jim
Third Party Payment Service Provider 21:56:03 jim
UK 21:37:03 jim
GB 21:36:20 jim
United Kingdom 21:35:35 jim
CMA 21:33:37 jim
Competition and Markets Authority 21:31:26 jim
FAPI 21:24:54 jim
PIS 20:47:08 jim
Payment Initiation Service 20:42:30 jim
AIS 20:35:59 jim
PSU 20:35:30 jim
Account Information Service 20:35:14 jim
Biometric Comparison 11:16:13 jim
Biometric Authentication 11:14:54 jim
Biometric Presentation 11:11:09 jim
Biometric Enrollment 11:09:32 jim
Biometric Sample Processing 11:07:31 jim
Biometric Data Challenges 10:59:01 jim
Biometric Token 10:57:25 jim
Biometric Template 10:32:55 jim
Web Blog_blogentry_090217_1 10:31:14 jim
Vbm 10:28:36 jim
Touch ID 10:28:06 jim
Something You Are 10:27:42 jim
Rich Credential 10:27:12 jim
Inherence Factor 10:26:43 jim
Hard tokens 10:26:04 jim
Fpt 10:25:06 jim
Eyeprint ID 10:24:33 jim
Biometric Sample 10:22:46 jim
Biometric Sensor 09:56:48 jim
Biometric Identification 09:47:22 jim
Web Blog_blogentry_230617_1 09:37:38 jim
Recognition 09:21:45 jim
22.06.2017
PADER 17:11:14 jim
Presentation Attack Detection Error Rate 17:10:21 jim
SOFA-B 16:54:08 jim
SOFA 16:41:27 jim
Web Blog_blogentry_220617_1 16:34:43 jim
Sub_jwk 14:06:00 jim
Updated_at 14:04:37 jim
Phone_number 14:03:27 jim
TelephoneNumber 14:02:14 jim
Phone_number_verified 14:01:09 jim
Timezone 14:00:02 jim
2.16.840.1.113719.1.1.4.1.178 13:59:41 jim
Zoneinfo 13:50:40 jim
JSON Web Token Claims 13:48:15 jim
Not After 13:44:45 jim
Not Before 13:43:57 jim
Certificate Validity Period 13:40:02 jim
Example Certificate 13:39:33 jim Validity-Not Before ==> Not Before
Timestamp 13:36:46 jim
Date Form 13:36:01 jim
Birthdate 13:31:30 jim
Email_verified 13:25:32 jim
BirthDate 13:21:59 jim birthDate ==> BirthDate
Address 13:20:32 jim
PostalAddress 13:19:43 jim postalAddress ==> PostalAddress
Picture 13:15:51 jim
Name 13:14:41 jim
C_hash 13:02:16 jim
End-to-End Security 12:57:51 jim
User 11:41:23 jim
1.2.840.113556.1.5.9 11:40:55 jim
End-User 11:21:07 jim
End-to-end Encryption 10:54:51 jim
Grant_types_supported 09:22:51 jim
21.06.2017
Application_type 18:34:58 jim
JSONArray 18:30:57 jim
Authorization_code 18:23:47 jim
Refresh_token 18:20:45 jim
Subject_type 18:20:20 jim
Pairwise Pseudonymous Identifier 18:19:07 jim
Pseudonymous 18:15:36 jim
Initiate_login_uri 18:09:17 jim
Client-Server Exchange 14:21:21 jim
TGS Exchange 14:21:04 jim
AS Exchange 14:20:28 jim
Kerberos Principal 14:18:58 jim
UPN 14:13:57 jim
AS_REP 13:56:52 jim
AS_REQ 13:55:50 jim
Network Time Protocol 13:50:13 jim
NTP 13:49:08 jim
RFC 4430 13:43:43 jim
RFC 3244 13:42:51 jim
Client-To-Server Ticket 13:23:18 jim
Kerberos Service Account 13:21:42 jim
Ticket Granting Service 13:08:36 jim
Service Ticket 13:05:02 jim
TGS-REQ-REP 13:04:13 jim
AS 12:16:41 jim
Kerberos Authentication Service 12:07:40 jim
Pass-the-ticket 11:55:11 jim
Kerberos Forged Ticket 11:49:48 jim
Password-hash 11:29:25 jim
KRBTGT 10:51:18 jim
NTLMv2 10:33:44 jim
Phishing 09:14:47 jim
IRI 08:55:14 jim
RFC 3987