These are all of the changes made to these pages. A much shorter list is available in RecentChanges.

25.05.2017
Using dsbk on Windows 16:17:54 jim
Windows XP 16:11:20 jim
Protected Extensible Authentication Protocol 16:10:44 jim
PEAP 16:09:22 jim
CHAP 16:08:19 jim
PAP 16:07:53 jim
Password Authentication Protocol 16:07:19 jim
Challenge-Handshake Authentication Protocol 16:04:03 jim
Windows 98 15:59:44 jim
MS-CHAP 15:59:36 jim
Windows 95 15:58:55 jim
RFC 2433 15:53:16 jim
Active Directory Account Lockout 11:40:32 jim
Server Message Block 11:39:59 jim
MaxValRange 11:38:52 jim
MaxDatagramRecv 11:38:28 jim
LDAP policy in Active Directory 11:38:06 jim
History of LDAP 11:37:30 jim
NT LAN Manager 11:36:00 jim
Pass-the-hash 11:34:12 jim
Golden Ticket 11:17:51 jim
Lifetime 11:12:14 jim
AS-REQ-REP 11:10:02 jim
AS 10:29:29 jim
Kerberos Authentication Service 10:22:54 jim
Key Distribution Center 10:19:56 jim
Ticket Granting Ticket 10:19:06 jim
TGS Exchange 10:13:54 jim
Client-Server Exchange 10:09:31 jim
TGS Session Key 09:55:22 jim
KDC 09:47:41 jim
KRBTGT 09:45:52 jim
Pass-the-ticket 09:38:43 jim
TGS 09:36:38 jim
Ticket Granting Service 09:36:19 jim
Mimikatz 09:28:23 jim
Web Blog_blogentry_250517_1 08:46:09 jim
24.05.2017
XDAS Trust Management Events 15:55:17 jim
XDAS Security Events 15:44:47 jim
XDASv2 Events 15:40:32 jim
XDAS Data Item Management Events 15:39:36 jim XDAS Data-Resource Management ==> XDAS Data Item Management Events
XDAS Event 15:35:58 jim
EDirectory 9.0.3.0 (40005.12) 15:34:45 jim
XDAS Account Management 15:27:39 jim
XDAS Resource Access 15:16:47 jim
CREATE_SESSION 15:12:06 jim
DSE_NMAS_LOG_FINISH_LOGIN_STATUS 15:10:14 jim
XDAS Event Name 15:08:57 jim
CREATE_ACCOUNT 15:08:29 jim
ACCOUNT_UNLOCK 14:47:06 jim
XDAS Fields 14:46:37 jim
DSE_DELETE_VALUE 14:37:44 jim
XDAS Correlation IDs for IDM 14:33:55 jim
DSE_ADD_VALUE 14:20:58 jim
EDirectory Event Type 14:19:57 jim
NMAS_LOGIN 13:58:22 jim
NMAS -1642 13:56:38 jim
DSE_LOGIN_EX 13:12:56 jim
DSE_AUTHENTICATE 12:59:39 jim
EDirectory 9.0.2.0 (40004.44) 12:54:16 jim
AUTHENTICATE_SESSION 12:47:05 jim
Web Blog_blogentry_240517_1 11:08:20 jim
DSE_CREATE_ENTRY 10:27:28 jim
DELETE_ACCOUNT 10:24:59 jim
DSE_DELETE_ENTRY 10:24:32 jim
XDAS Initiator 09:35:02 jim
XDAS Observer 09:32:59 jim
23.05.2017
NDSTRACE Examples 17:01:01 jim
22.05.2017
Verizon Data Breach Investigations Report 15:01:47 jim
HTTP 204 12:27:47 jim
HTTP 200 12:24:51 jim
HTTP 404 12:15:19 jim
HTTP 410 12:09:40 jim
HTTP Status Code 12:01:28 jim
INVALID_RESPONSE 11:38:45 jim
EDirectory 11:28:19 jim
AMBIGUOUS_RESPONSE 11:26:48 jim
NDS Result Code 11:24:31 jim
Common Active Directory Bind Errors 11:20:30 jim
Common Edirectory Bind Errors 11:08:46 jim
LDAP Client Error And Result Codes 11:07:05 jim
LDAP Result Codes 11:05:27 jim
Functional Programming 11:00:19 jim
Result Code 10:55:21 jim
SCIM Delete Request 10:40:23 jim
Immutable 10:36:59 jim
Idempotent 10:30:18 jim
21.05.2017
Off-the-Record Messaging 21:22:21 jim
Key Verification 21:18:42 jim
Homomorphic Encryption 21:16:03 jim
Repudiation 21:03:56 jim
OTR 20:51:41 jim
Key Transparency 20:48:35 jim
Encrypt 20:46:48 jim
Public Key Cryptography 20:45:43 jim
CONIKS 20:34:36 jim
Web Blog_blogentry_210517_1 20:23:46 jim
W3C Web Crypto API 20:19:48 jim
Same Origin Policy 20:10:02 jim
Proxy Server 20:09:30 jim
Linked Data 20:07:33 jim
3D Secure 20:05:49 jim
Host Card Emulation 19:57:19 jim
Open Banking 11:26:42 jim
General Data Protection Regulation 11:16:49 jim
TPP 11:11:25 jim
Third Party Payment Service Provider 11:11:05 jim
Third-party 11:08:50 jim
ASPSP 10:47:15 jim
Acquirer 10:46:42 jim
PSP 10:45:35 jim
Payment Service Provider 10:43:46 jim
Merchant 10:39:25 jim
Account Servicing Payment Service Provider 10:35:23 jim
Financial Data 10:04:48 jim
Certificate Fingerprint 09:50:39 jim
Thumbprint 09:24:28 jim
Obtain a Certificate from Server 09:17:41 jim
20.05.2017
RFC 6234 09:41:17 jim
RFC 4634 09:40:26 jim
SHA-2 09:37:24 jim
Secure Hash Algorithm 09:36:15 jim
Certificate Fingerprint/certificate-fingerprint.png 09:29:01 jim certificate-fingerprint
Certificate 09:08:24 jim
License 09:07:24 jim
Identity Document 09:05:58 jim
Passport 09:03:09 jim
NIST Information Technology Laboratory 08:39:02 jim
ITL 08:38:35 jim
NIST.SP.500 Computer Systems Technology 08:37:23 jim
NIST Special Publication 08:36:29 jim
NIST.SP.1800 Cybersecurity Practice Guides 08:36:13 jim SP 1800 Cybersecurity Practice Guides ==> NIST.SP.1800 Cybersecurity Practice Guides
Web Blog_blogentry_030915_1 08:36:13 jim SP 1800 Cybersecurity Practice Guides ==> NIST.SP.1800 Cybersecurity Practice Guides
FIPS Based Cipher Suites 08:21:55 jim NIST.SP.57 ==> NIST.SP.800-57
NIST.SP.800-57 08:21:54 jim NIST.SP.57 ==> NIST.SP.800-57
NIST.SP.800-52 08:21:21 jim NIST.SP.52 ==> NIST.SP.800-52
Payment Card Industry Data Security Standard 08:21:21 jim NIST.SP.52 ==> NIST.SP.800-52
NIST.SP.800-132 08:18:01 jim
NIST.SP.800-157 08:12:31 jim
Credential 08:07:19 jim
Cancelable Biometrics 07:48:13 jim
Biometric Data Challenges 07:44:11 jim
19.05.2017
SHA-1 Deprecation 10:29:02 jim
JAVA LDAP SDKs 10:28:10 jim
Schema Extensions 10:25:58 jim
Interface Description Language 10:25:17 jim
PKCS12 10:24:02 jim
Common Development And Distribution License 10:20:48 jim
AbzillaPerson 10:20:13 jim
Persona 10:18:54 jim
NSS 10:18:27 jim
Network Security Services 10:18:00 jim
MozillaCertutil 10:17:23 jim
Mozilla 10:12:42 jim
Firefox 10:10:24 jim
TLS 1.3 10:09:17 jim
RSA key-exchange 10:06:54 jim
TLS Renegotiation 09:50:21 jim
TLS Compression 09:49:00 jim
TLS 1.2 09:44:18 jim
EncryptedPreMasterSecret 09:43:21 jim
Premaster Secret 09:41:41 jim
Cipher Suite 09:28:11 jim
Encryption Scheme 09:26:58 jim
Signature Primitive 09:26:43 jim
Verification Primitive 09:26:11 jim
Cryptographic Primitive 09:24:33 jim
Encryption 08:55:07 jim
Digital Signature 08:51:41 jim
PKCS 1 08:31:25 jim
18.05.2017
NetworkAddress 07:47:30 jim
Novell NetworkAddress 07:43:28 jim
NxsettingsDriver 07:41:53 jim
NTLM SSP 07:40:12 jim
CIFS 07:39:03 jim
Common Internet File System 07:33:59 jim
17.05.2017
MaxReceiveBuffer 09:16:44 jim
MaxTempTableSize 09:15:47 jim
MaxPageSize 09:15:36 jim
MaxQueryDuration 09:15:24 jim
MaxPoolThreads 09:10:37 jim
MaxNotificationPerConnection 09:06:09 jim
MaxResultSetSize 09:04:46 jim
MaxConnIdleTime 08:53:25 jim
MaxActiveQueries 08:51:48 jim
InitRecvTimeout 08:47:52 jim
ERROR_ACCOUNT_LOCKED_OUT 08:39:55 jim
Ntdsutil.exe 08:29:29 jim
MaxConnections 08:27:41 jim
MAXIMUM_LOGINS_EXCEEDED 08:23:37 jim
Intruder Detection 08:12:58 jim
ACCOUNTDISABLE 08:10:22 jim
ERROR_PASSWORD_EXPIRED 08:04:33 jim
16.05.2017
NspmAdminsDoNotExpirePassword 16:12:39 jim
Edirectory Administrative Password Changes 16:08:57 jim
PasswordExpirationTime 16:08:09 jim
Grace Logins 15:05:44 jim
Password Reset 14:42:11 jim
Password Change 14:40:08 jim
NspmConfigurationOptions 12:03:16 jim
SPM_ALLOW_SPWD_SET 12:00:03 jim
Spmdclnt 11:52:22 jim
NDSD Loadable Module 11:50:49 jim
SPM 11:48:39 jim
Secure Password Manager 11:48:11 jim
LoginGraceRemaining 10:30:36 jim
15.05.2017
Password Life Time 17:27:25 jim
13.05.2017
Set Active Directory Password From Java 15:17:38 jim
12.05.2017
Key Usage 14:25:24 jim
Certificate Extensions 14:21:39 jim
Subject Unique Identifier 14:16:34 jim
Issuer Unique Identifier 14:16:07 jim
Example Certificate 14:12:40 jim
SubjectPublicKeyInfo 14:11:37 jim
Subject Public Key Info 14:11:16 jim
Certificate Validity Period 14:09:04 jim
Distinguished Names 14:02:41 jim
2.5.4.7 13:46:53 jim
LocalityName 13:46:25 jim
OrganizationalUnitName 13:44:52 jim organizationalUnitName ==> OrganizationalUnitName
CountryName 13:43:54 jim countryName ==> CountryName
AlgorithmIdentifier 13:27:07 jim
Certificate Algorithm ID 13:26:43 jim
Certificate Serial Number 12:10:19 jim
X.509 Style Guide 12:06:41 jim
Certificate Version 12:05:00 jim
Certificate Issuer 11:48:48 jim
SerialNumber 11:30:39 jim
IDMAndOIDWithSSL 11:11:02 jim
Keytool 11:10:14 jim
Certificate Alias 11:07:55 jim
Keystore 10:55:50 jim
Trust Anchor 10:55:30 jim
Java KeyStore 10:54:01 jim
Root Certificate 10:52:33 jim
Public Key Infrastructure Weaknesses 10:46:40 jim
Certificate Authority 10:41:38 jim
Registration Authority 10:32:06 jim
Certificates and Authentication 10:15:01 jim
Toolbox 09:58:16 jim
Certificate Validation Tools 09:56:49 jim
OpenSSL Commands 09:47:40 jim
How To Crack SSL-TLS 09:42:42 jim
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 09:01:33 jim
SSLv2 08:59:41 jim
Deprecating Secure Sockets Layer Version 3.0 08:56:39 jim
SSLv3 08:55:15 jim
RFC 7568 08:54:05 jim
Transport Layer Security 08:43:38 jim
Prohibiting Secure Sockets Layer (SSL) Version 2.0 08:38:31 jim
RFC 6176 08:35:43 jim
11.05.2017
Command-line 13:37:30 jim
Create a MAD Service To Run 13:35:22 jim
LDAPs and AD 13:34:51 jim
Linux setgid and setuid 13:34:10 jim
LDIF to Bulk Load Test Users 13:33:07 jim
NAM Administration 13:32:35 jim
DXServer Commands 13:32:09 jim
DxPwdFailedAttempts 13:31:37 jim
Join AD Domain 13:30:28 jim
Kinit 13:29:59 jim
DumpEdirectoryPasswordInformationTool 13:28:48 jim
Kerberos Tools LDAP 13:28:18 jim
Using RPM 13:27:53 jim
DumpUP 13:26:28 jim
Dxcmd 13:25:49 jim
Passwd 13:25:17 jim
Unix Time 13:24:41 jim
Which LDAPSEARCH 13:23:31 jim
Force Immediate Synchronization 13:22:01 jim
Dsquery 13:21:23 jim
LDAPSEARCH 13:20:47 jim
Bash Shell Initialization Files 13:20:05 jim
Edirectory Usefull Linux Commands 13:18:36 jim
Unix Linux CommandLine Tricks 13:17:49 jim
Dump Password Information Tool-Command Line Options 13:17:05 jim
SSH CommandLine Tips 13:16:16 jim
Edirectory Instance Management 13:12:31 jim
N4u.server.configdir 13:05:26 jim
10.05.2017
Password Validator 19:08:19 jim
Credential Leaked Databases 19:07:31 jim
Credential Leakage 19:05:45 jim
Eavesdropper 18:51:03 jim
Information Leakage 18:50:16 jim
ASCII 15:26:49 jim
ISO 10646 15:23:27 jim
Code Point 15:22:10 jim
Unicode 15:20:00 jim
UCS 15:18:38 jim
Universal Coded Character Set 15:17:34 jim
Vulnerability 15:12:35 jim
Exploit 15:09:03 jim
Attack 15:06:15 jim
Passive attacker 15:03:20 jim
Attacker 15:02:39 jim
DBIR 14:39:25 jim
Verizon 14:37:18 jim
Mobile Network Operators 14:33:40 jim
Unicode Standard Annex 15 14:31:55 jim
UAX 15 14:29:05 jim
Federal Information Processing Standard 11:45:34 jim
FIPS198-1 11:42:14 jim
PBKDF2 11:36:51 jim
Unauthenticated 11:00:47 jim
NDS Connection States 10:59:44 jim
Verifier 10:33:40 jim
08.05.2017
UniqueID 17:32:21 jim
PermanentConfigParms 17:31:27 jim
Edirectory Indexes 17:30:23 jim
Password History 17:18:10 jim
Password Modification Policy 15:30:47 jim
PwdMaxLength 15:29:20 jim Password-composition Policy ==> Password Modification Policy
PwdMinLength 15:29:20 jim Password-composition Policy ==> Password Modification Policy
Draft-behera-ldap-password-policy 15:29:19 jim Password-composition Policy ==> Password Modification Policy
NspmComplexityRules 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Authentication is Broken 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Character Composition 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Maximum Length 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Minimum Length 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Policy 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Quality 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Reuse 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Modify Operation 15:11:55 jim
Modify-password 15:11:28 jim
Password Usage Policy 15:01:29 jim
NspmPasswordPolicy 14:53:15 jim
NspmMaximumLength 14:11:25 jim
PwdMaxAge 13:56:43 jim
2.16.840.1.113719.1.39.43.4.231 13:46:43 jim
2.16.840.1.113719.1.1.4.1.69 13:05:48 jim
PasswordMinimumLength 13:00:56 jim
Passwords Must Meet Complexity Requirements 12:51:08 jim
NdsLoginProperties 11:44:30 jim PasswordMinimumLength ==> Password Minimum Length
2.16.840.1.113719.1.1.6.1.33 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
2.16.840.1.113719.1.39.43.6.1 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
2.16.840.1.113719.1.64.6.1.1 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
Attribute-Names 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
InetOrgPerson 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
Implementing Universal Password 11:32:44 jim
Password Composition 11:29:46 jim
NIST.SP.800-63B 11:28:52 jim Passwords Composition ==> Password Composition
Password Considerations and Requirements 11:28:11 jim
Password Complexity 11:24:17 jim
07.05.2017
Signalling System No. 7 09:48:05 jim
SS7 hack 09:45:18 jim
Transaction Authentication Number 09:39:51 jim
CCSS7 09:36:51 jim
Common-channel signaling 09:35:58 jim
SS7 09:35:38 jim
Common Channel Signalling System 7 09:35:17 jim
Mobile TAN 09:30:26 jim
Person-to-Person Payments 09:09:54 jim
P2P 09:00:03 jim
International Mobile Equipment Identity Database 08:53:48 jim
Integrated Automated Fingerprint Identification System 08:53:05 jim
United States Department of Justice 08:52:12 jim
Federal Bureau of Investigation 08:50:18 jim
CBP 08:49:35 jim
Law Enforcement Agency 08:49:04 jim Law Enforcement ==> Law Enforcement Agency
United States Customs and Border Protection 08:48:25 jim
Regulatory Agencies 08:45:26 jim
International Mobile Equipment Identity 08:37:22 jim
TAC 08:25:37 jim
IMEI Software Version 08:24:49 jim
IMEISV 08:24:08 jim
Type Allocation Code 08:21:13 jim
Home Location Register 08:00:36 jim
Central Equipment Identity Register 07:59:41 jim
IMEI DB 07:47:58 jim
CEIR 07:36:56 jim
06.05.2017
Mobile Equipment Identifier 11:13:05 jim
IMEI 11:04:02 jim
Mobile Switching Center 11:00:15 jim
Global System for Mobile Communications 10:59:25 jim
BSS 10:47:31 jim
BTS 10:47:11 jim
BSC 10:46:51 jim
Base Station Controller 10:46:34 jim
Base Transceiver Station 10:46:02 jim
Base Station Subsystem 10:39:38 jim
AuC 10:19:17 jim
Authentication Center 10:18:46 jim
Visitor Location Register 10:18:03 jim
Mobile Station 10:14:58 jim
MSC 09:43:22 jim
VLR 09:42:52 jim
General Packet Radio Service 09:38:29 jim
GPRS 09:37:02 jim
HLR 09:36:14 jim
Call Forwarding 09:35:41 jim
Call Diversion 09:35:13 jim
Mobile Station International Subscriber Directory Number 09:02:44 jim
ISDN 08:45:12 jim
Integrated Services Digital Network 08:44:39 jim
CCS 08:42:03 jim
Digital communication 08:35:36 jim
Telecommunications 08:35:12 jim
FIPs 08:17:37 jim
Privacy Considerations 08:16:52 jim
Year 1980 08:15:11 jim
Year 1945 08:14:28 jim
Year 1960 08:14:01 jim
OECD 08:13:39 jim
UN 08:12:54 jim
United Nations 08:12:37 jim
Organization for Economic Cooperation and Development 08:10:00 jim
HEW 08:06:13 jim
HHS 08:05:12 jim
United States Department of Health and Human Services 08:04:41 jim
Fair Information Practices 08:01:46 jim
SIP 07:39:29 jim
Session Initiation Protocol 07:39:13 jim
RFC 6716 07:33:38 jim
RFC 3325 07:32:35 jim
Glossary Of LDAP And Directory Terminology 07:30:25 jim
05.05.2017
ECHELON 12:03:51 jim
Surveillance in the Workplace 12:03:03 jim
Surveillance by Video 12:01:34 jim
Surveillance of Communications 12:00:03 jim
Surveillance 11:59:27 jim
National Security Agency 11:58:02 jim
Next Generation Identification 11:45:28 jim
Signals Intelligence 11:40:33 jim
SIGINT 11:38:21 jim
Web Blog_blogentry_050517_1 11:29:31 jim
Jim 11:26:49 jim
Privacy 11:16:45 jim
Universal Declaration of Human Rights 11:11:10 jim
UDHR 11:10:06 jim
Anonymity Set 10:39:23 jim
Identification 10:38:38 jim
Identity Proofing 10:33:16 jim
Level Of Assurance 10:28:21 jim
Authentication 10:23:14 jim
Consent vs Authorization 10:06:00 jim
Proximity Card 09:59:44 jim
Key Card 09:58:35 jim
Authorization 09:53:34 jim
Permission 09:51:29 jim
Privilege 09:49:16 jim
Malicious Software 09:39:45 jim
Malware 09:38:15 jim
Phishing 09:23:32 jim
RFC 7469 09:07:07 jim
Public Key Pinning Extension for HTTP 09:06:28 jim
04.05.2017
Oracle Internet Directory and DirXML Moves 12:41:22 jim
Oracle Internet Directory 12:38:01 jim
DirXML and Oracle (OID) 12:34:05 jim
Byte 12:22:50 jim
Encrypted 12:21:27 jim
DES 12:00:54 jim
Data Encryption Standard 12:00:46 jim
OID and Intruder Detection 11:47:55 jim
02.05.2017
EDirectory 9.0.2.1 (40004.44) 13:53:12 jim
EDirectory Version 13:50:02 jim
NetWare 13:30:12 jim
NDS External References 13:27:35 jim
EDirectory 8.8.5.0 (20219.15) 13:27:13 jim Edirectory 8.8.5.0 (20219.15) ==> EDirectory 8.8.5.0 (20219.15)
EDirectory 9.0.0.0 (40002.79) 13:24:01 jim EDirectory Version Information ==> EDirectory Version
Distributed Reference Links 13:23:39 jim
NDSD 13:20:34 jim
NICI 13:07:51 jim
Novell International Cryptographic Infrastructure 13:06:01 jim NICIWhichVersionIsInstalled ==> NICI Determine What Version
NICI Determine What Version 13:06:00 jim NICIWhichVersionIsInstalled ==> NICI Determine What Version
EDirectory 8.8 11:57:44 jim
Edirectory 8.8.x Anomalies 11:56:19 jim Edirectory8.8Anomalies ==> Edirectory 8.8.x Anomalies
EDirectory 8.8.3.0 (20804.05) 11:53:58 jim EDirectory 8.8 SP3 ==> EDirectory 8.8.3.0 (20804.05)
EDirectory 8.8.8.0 (20801.46) 11:47:35 jim
EdirectoryAnomalies 11:46:25 jim
EdirectoyFHSAndLSBCompliance 11:41:58 jim
IManager Server Configuration 11:40:50 jim
Data At Rest 11:40:06 jim
WIKI-Groups 11:38:18 jim
FLAIM 11:38:03 jim
Unix 11:37:11 jim
File System 11:35:36 jim
ServerHolds 10:08:40 jim
2.16.840.1.113719.1.1.4.1.96 10:02:50 jim
Tagged Name 09:56:12 jim
2.16.840.1.113719.1.1.5.1.23 09:48:48 jim
BackLink 09:47:25 jim
2.16.840.1.113719.1.1.4.1.110 09:41:37 jim
UnknownBaseClass 09:39:40 jim
NDS Unknow Entries 09:29:34 jim
01.05.2017
NDS Obituaries 12:41:27 jim
NDS Obituary State 12:37:50 jim
NDS Obituaries Type 12:35:32 jim
BACKLINK Obituary 12:33:19 jim
NDS Secondary Obituaries 12:30:45 jim
OLD RDN Obituary 12:29:25 jim
MOVED Obituary 12:27:36 jim
DEAD Obituary 12:25:08 jim
MOVED From Obituary 12:20:05 jim
MOVE Sub-Tree Obituary 12:16:49 jim
Tree_new_RDN Obituary 12:14:58 jim
PURGE ALL Obituary 12:11:35 jim
Used_By Obituary 12:08:12 jim
Tree_old_RDN Obituary 12:04:08 jim
NEW RDN Obituary 11:58:41 jim
RESTORED Obituary 11:52:57 jim
NDS Obituaries Classification 11:49:47 jim
NDS Special Case Obituaries 11:48:30 jim
NDS Informational Obituaries 11:46:48 jim
NDS Primary Obituaries 11:39:48 jim
INHIBIT_MOVE Obituary 10:55:09 jim
DS_ENTRY_NOT_PRESENT 10:48:54 jim
Simple Health Check 09:46:29 jim
Ndstrace 09:44:36 jim
Ndsrepair 09:42:37 jim
Flat Cleaner 09:40:57 jim
EDirectory Synchronization 09:40:19 jim
30.04.2017
2010s 12:13:08 jim
1980s 12:11:26 jim
2000s 12:10:39 jim
Common Vulnerabilities and Exposures 12:06:20 jim
Apache Hadoop 12:04:34 jim
Message Passing Interface 12:00:19 jim
MPI 12:00:03 jim
MapReduce 11:57:09 jim
Reduce() 11:44:22 jim
Map() 11:34:54 jim
Hadoop Distributed File System 11:11:25 jim
Ethernet 11:10:21 jim
Digital Equipment Corporation 11:07:31 jim
Apollo Computer 11:07:14 jim
DCE-RPC 11:06:26 jim
OSF 11:05:44 jim
DCE-DFS 10:52:51 jim
DFS 10:52:09 jim
Distributed File System 10:51:40 jim
Distributed Computing Environment 10:50:24 jim
HDFS 10:44:57 jim
Distributed Data Store 10:44:35 jim
Hadoop 10:35:25 jim
Computing Cluster 10:19:57 jim
Amazon Simple Storage Service 10:13:32 jim
Object storage 10:11:39 jim
Data-lake 10:06:03 jim
Big data 10:03:55 jim
Record Protocol 09:55:30 jim
BEAST 09:54:21 jim
Blockchain 09:52:29 jim
FLAIM Block Cache 09:50:15 jim
Block 09:48:49 jim Blocks ==> Block
Block Cipher 09:48:49 jim Blocks ==> Block
Inter-Planetary File System 09:48:49 jim Blocks ==> Block
S3 09:41:19 jim
Amazon Web Services 09:39:41 jim
AWS 09:38:39 jim
Amazon 09:36:47 jim
29.04.2017
Patient Data 09:58:41 jim
Electronic Health Record 09:56:22 jim
Electronic Medical Record 09:49:49 jim
Clinical Data 09:48:39 jim
Verifiable Claims 09:47:37 jim
Web Blog_blogentry_310715_1 09:39:03 jim
Blockchain Identity 09:37:32 jim
Data Pedigree 09:36:50 jim
Data Provenance 09:33:33 jim
Decentralized Identifier 09:20:24 jim
Web Blog_blogentry_290417_1 09:08:32 jim
Data Ownership 09:06:17 jim
28.04.2017
Data Breach 11:50:02 jim
Breach 11:38:35 jim
Identity Relationship Management 11:34:14 jim
Identity Relation 11:27:03 jim
Common Object Request Broker Architecture 09:11:53 jim
UML 09:06:33 jim
Object Management Group 09:06:04 jim
OMG 09:01:30 jim
People And Things Every IDM Person Should Know 08:59:35 jim
Burton Group 08:58:44 jim
Bob Blakley 08:58:24 jim
Recognition 08:51:32 jim
Maverick Research The Death of Authentication 08:49:16 jim
Web Blog_blogentry_280417_1 08:44:08 jim
Gartner 08:42:37 jim
Ian Glazer 08:31:05 jim
Access360 08:23:46 jim
IBM IDM 08:22:51 jim
The Seven Laws Of Identity 08:10:04 jim
Kim Cameron 08:07:31 jim
Microsoft Passport 08:05:36 jim
Law of Justifiable Parties 08:01:04 jim
Law of Minimal Disclosure For A Constrained Use 07:55:18 jim
Law of User Control and Consent 07:51:48 jim
IRM 07:41:05 jim
25.04.2017
Experimental 16:40:52 jim
LDAP Transactions 16:39:02 jim
2.16.840.1.113719.1.27.103.4 16:33:31 jim
EndGroupingNotice 16:32:46 jim
EDirectory LDAP Transaction 16:29:40 jim
EndGroupingResponse 16:27:21 jim
EndGroupingRequest 16:26:02 jim
CreateGroupingResponse 16:25:04 jim
CreateGroupingRequest 16:23:59 jim
2.16.840.1.113719.1.27.103.2 16:15:13 jim
2.16.840.1.113719.1.27.103.7 16:09:58 jim
GroupingControl 16:09:26 jim
CreateGroupValue 16:08:01 jim
GroupCookie 16:05:07 jim
2.16.840.1.113719.1.27.103.8 15:55:36 jim
CreateGroupType 15:54:43 jim
2.16.840.1.113719.1.27.103.1 15:51:48 jim
LDAP Grouping of Related Operations 15:39:09 jim GroupingControl ==> LDAP Grouping of Related Operations
LDAPv3 Grouping of Related Operations 15:39:09 jim GroupingControl ==> LDAP Grouping of Related Operations
Lightweight Directory Access Protocol (LDAP) Transactions 15:37:15 jim
23.04.2017
Novell Access Manager 19:40:54 jim
ULA 11:49:27 jim
Unique Local IPv6 Unicast Addresses 11:49:00 jim
RFC 4193 11:47:09 jim
Private Network 11:45:35 jim
RFC 6598 11:36:06 jim
Carrier-grade NAT 11:35:21 jim
RFC 2640 11:26:05 jim
RFC 2460 11:25:09 jim
Internet Protocol Version 6 11:24:30 jim
IPv6 11:23:23 jim
RFC 791 11:19:35 jim
IPv4 11:18:49 jim
Internet Protocol Version 4 11:18:30 jim
RFC 1918 11:09:44 jim
Network Address Translation 11:01:31 jim
NAT 10:58:00 jim
Transparent Proxy 10:57:30 jim
Proxy 10:50:18 jim
The Onion Router 10:48:15 jim
Tor 10:46:05 jim
Socket Secure 10:41:41 jim
Response 10:34:23 jim
Request 10:32:51 jim
Clients 10:28:13 jim
Server 10:27:21 jim
Protocol Server 10:26:06 jim
Protocol Client 10:20:43 jim
Web Origin 10:05:06 jim
Port 10:03:50 jim
URI Authorities 10:02:57 jim
Hostname 10:01:19 jim
IP Address 10:00:21 jim
RFC 6454 09:55:37 jim
SOP 09:50:50 jim
URI Template 09:50:04 jim
RFC 6570 09:46:25 jim
Uniform Resource Identifier 09:45:17 jim
URI Query 09:43:14 jim
URI Path 09:41:50 jim
RFC 6838 09:35:36 jim
URI Fragment Identifiers 09:34:59 jim
RFC 7320 08:53:03 jim
RFC 6874 08:52:23 jim
URI Schemes 08:44:42 jim
Web Blog_blogentry_230417_1 08:26:59 jim
HOTP 08:20:49 jim
21.04.2017
LSTM 11:41:24 jim
Feedforward Neural network 11:40:32 jim
RNN 11:38:50 jim
Artificial Neuron 11:38:30 jim
ANN 11:38:07 jim
Artificial Neural network 11:30:59 jim
Long Short Term Memory networks 11:26:45 jim
Recurrent Neural networks 11:20:42 jim
Web Blog_blogentry_210417_1 11:03:58 jim
Paradox of Knowability 09:56:10 jim
Responsible 09:19:42 jim
Trust 09:06:57 jim
19.04.2017
Graded Authentication 14:24:18 jim
Single Sign-On 13:38:05 jim
Micro Focus 13:10:06 jim
LDAP Server Implementations 13:08:29 jim
BMC Software 13:05:12 jim
BMC 13:04:38 jim
HP OpenView Select Identity 13:03:24 jim
Hewlett Packard Enterprise 12:55:55 jim
HPE 12:53:53 jim
Web Services Federation 12:52:18 jim
WS-Federation 12:47:40 jim
18.04.2017
Abstraction 12:07:16 jim
Directed Acyclic Graph 11:01:01 jim
Merkle DAG 11:00:03 jim
DAG 10:58:12 jim
Git 10:54:51 jim
Object-oriented Programming 09:53:19 jim
Object-based 09:52:50 jim
Object 09:49:56 jim Objects ==> Object
Object-oriented 09:46:01 jim
Polymorphism 09:37:27 jim
Inheritance 09:30:45 jim
Encapsulation 09:22:59 jim
OOP 08:55:50 jim
Web Blog_blogentry_180417_1 08:54:21 jim
DIT Chaining 08:48:00 jim
Chaining 08:45:56 jim
16.04.2017
JSON for Linking Data 10:04:00 jim
Advanced Key Processor 09:55:22 jim
Web Blog_blogentry_160417_1 09:53:51 jim
Active attacker 09:50:39 jim
NISTIR 7298 09:48:04 jim
Accountability 09:46:19 jim
Protected Resource 09:35:57 jim
Resource 09:35:31 jim
Access Control 09:32:34 jim
Access 09:31:46 jim
Access Authority 09:31:07 jim
Identity Attributes 09:23:26 jim
Digital Identity 09:18:51 jim
14.04.2017
Web Blog_blogentry_140417_1 09:10:52 jim
Certificate Transparency 09:07:59 jim
13.04.2017
Personally Identifiable Information 14:19:54 jim
Account Linking 14:17:04 jim
Password Statistics 14:14:03 jim
Risk 14:08:03 jim
Password Guessing Attacks 13:31:15 jim
Password Dictionary 13:31:10 jim
Best Practices Password 12:27:47 jim
Authenticator App 12:24:29 jim
MAC 10:23:25 jim
10.04.2017
Human Limitation 14:13:07 jim
Authentication Challenges 13:42:02 jim
Universal Product Code 13:38:40 jim
Barcode 13:37:51 jim
Shared Secret 13:37:19 jim
Year 1974 13:36:53 jim
UPC 13:36:31 jim
QR-code 13:29:51 jim
Quick Response Code 13:26:50 jim
Time-based One-time Password Algorithm 13:19:03 jim SharedSecret ==> Shared Secret
Mutual TLS Profiles for OAuth Clients 13:19:02 jim SharedSecret ==> Shared Secret
Pre-shared key 13:19:02 jim SharedSecret ==> Shared Secret
Web Blog_blogentry_100417_1 13:06:46 jim
Stateless 06:01:32 jim
status 05:58:24 jim
Replica convergence 05:47:29 jim
Basically Available Soft state Eventual consistency 05:46:23 jim
BASE 05:45:31 jim
Eventual consistency 05:42:01 jim
Replication 05:39:37 jim
Synchronization 05:36:13 jim DefinitionSynchronization ==> Synchronization
Changelog 05:34:48 jim
Attribute Usage Flags 05:33:48 jim
CAP theorem 05:15:01 jim
Node.js 04:46:24 jim
JavaScript 04:42:49 jim
ECMAScript 04:39:06 jim
IDM The Manager Dilemma 03:47:07 jim
09.04.2017
What To Do About Passwords 14:39:12 jim
Password Authentication 14:30:19 jim
08.04.2017
Password Authentication Policy 12:34:11 jim
Password Expiration Warning 12:29:57 jim
Usability 12:08:29 jim
Heuristic Attacks 11:59:37 jim
Password Management 11:19:31 jim
Password 11:13:46 jim
Traditional Registration 11:01:34 jim
06.04.2017
Bob 12:27:39 jim
Alice 12:27:27 jim
Alice And Bob 12:26:40 jim
Wendy 12:26:01 jim
Walter 12:24:55 jim
Trent 12:24:29 jim
Victor 12:24:07 jim
Sybil 12:23:53 jim
Peggy 12:22:04 jim
Oscar 12:21:18 jim
Faythe 12:20:25 jim
Craig 12:20:02 jim
Identifier 12:18:25 jim
Personal Name 12:05:48 jim
Identified 12:04:56 jim
Unlinkability 12:01:35 jim
Legal 11:59:38 jim
Real Name 11:56:29 jim
State 11:55:23 jim
Pseudonymity 11:54:03 jim
Pseudonymous 11:53:26 jim
Official Name 11:52:39 jim
Pseudonym 11:52:01 jim
Individual 11:44:38 jim
Identifiable 11:42:42 jim
Identifiability 11:40:59 jim
Undetectability 11:35:55 jim
IOI 11:34:40 jim
Item of Interest 11:34:23 jim
PANOPTICLICK 11:32:34 jim
Fingerprinting 11:31:34 jim
Fingerprint 11:26:06 jim
Observer 11:16:15 jim
Authorized 11:13:23 jim
Intermediary 11:11:20 jim
Recipient 11:09:44 jim
Initiator 11:08:32 jim
Enabler 11:07:15 jim
Unauthorized 11:05:23 jim
RFC 4949 10:58:52 jim
RFC 6973 10:39:21 jim
NGI 10:22:09 jim
RISC 09:38:49 jim
AFIT 09:38:11 jim
Advanced Fingerprint Identification Technology 09:37:57 jim
Repository for Individuals of Special Concern 09:31:11 jim
Web Blog_blogentry_060417_1 09:18:04 jim
05.04.2017
DSBK 09:40:49 jim
Edirectory Backup Strategy 08:49:06 jim
Edirectory Disaster Recovery 08:29:40 jim
Edirectory Back-Ups And Clones 08:26:05 jim
NICI Configuration Files 08:19:06 jim
EmboxRecovery 08:15:42 jim
04.04.2017
Authentication Context Class vs Authentication Method Reference 12:14:49 jim
Authentication Method 12:06:44 jim
Authentication Context Class Values 11:58:08 jim
Authentication Context Class 11:54:44 jim
Authentication Method Reference Values 11:42:20 jim
Authentication Protocol 11:30:38 jim
Mutual Authentication 11:30:21 jim
Simple Authentication 11:29:30 jim
Internet Protocol Address Location 11:28:34 jim
Closed-Loop Authentication 11:27:27 jim
Open-Loop Authentication 11:25:07 jim
FIDO 10:40:09 jim
FIDO Authenticator 10:26:11 jim
U2F device 10:08:32 jim
FIDO Client 10:05:01 jim
FIDO Server 10:02:02 jim
FIDO Relying Party 09:42:29 jim
Authenticator 09:32:25 jim
Password-based 09:23:53 jim
Web Blog_blogentry_040417_1 09:23:02 jim
Credential Enrollment 09:04:20 jim
Identity Assurance Level 08:46:19 jim
Identity Assurance 08:41:13 jim
Authenticator Assurance Levels 08:39:38 jim
Assurance 08:38:29 jim
03.04.2017
Openid-configuration 19:51:09 jim
HTTP POST 10:03:02 jim
Payment Services Directive 09:35:16 jim
Web Blog_blogentry_030417_1 09:33:36 jim
Banks 09:33:12 jim
AISP 09:30:11 jim
PISP 09:29:53 jim
Payment Initiation Service Provider 09:29:15 jim
Account Information Service Provider 09:28:53 jim
PSD2 09:26:18 jim
Proffer 09:14:10 jim
02.04.2017
FIDO Standards 11:09:35 jim
Universal Second Factor 10:44:28 jim
Chrome 10:24:20 jim
Universal Second Factor Challenges 10:23:38 jim
Local device 10:08:30 jim
NIST Interagency Report 09:56:24 jim
NISTIR 09:54:03 jim
NIST.IR 7817 09:50:48 jim
Credential Management 09:32:19 jim
Credential Revocation 09:31:25 jim
Credential Issuance 09:22:50 jim
Credential Suspension 09:21:19 jim
Credential Reset 09:18:10 jim
GitLab 08:12:42 jim
01.04.2017
Yubikey NEO 19:17:48 jim
Yubico 19:15:36 jim
EAL 19:01:11 jim
Evaluation Assurance Level 19:00:56 jim
SAR 18:58:37 jim
Security Assurance Requirement 18:58:14 jim
SFR 18:56:14 jim
Security Functional Requirements 18:55:47 jim
CC 18:53:59 jim
Common Criteria 18:53:25 jim
Common Criteria for Information Technology Security Evaluation 18:53:03 jim
Smart Card 18:52:26 jim
Universal Authentication Framework 18:35:54 jim
Bluetooth Special Interest Group 18:30:05 jim
Personal Area Networks 18:29:21 jim
Wireless 18:26:49 jim
Bluetooth Low Energy 18:26:32 jim
BLE 18:23:16 jim
Bluetooth 18:22:29 jim
USB 18:15:47 jim
Universal Serial Bus 18:15:31 jim
FIDO protocols 18:09:25 jim
Fast IDentity Online 18:07:35 jim
PKCS 11 17:56:10 jim
Internet Protocol Suite 17:23:11 jim
Communication Layers 17:20:06 jim
OSI-Model 17:19:58 jim
RFC 1122 17:19:18 jim
Internet Layer 17:14:21 jim
Link Layer 17:12:01 jim
Transport Layer 17:09:21 jim
Application Layer 17:05:37 jim
Internet Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
TCP-IP 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
Transmission Control Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
User Datagram Protocol 17:05:17 jim Internet protocol suite ==> Internet Protocol Suite
Router 16:45:02 jim
Gateway 16:40:12 jim
CISCO Commands 16:31:27 jim
Data-link Layer 16:30:31 jim
Network Layer 16:26:11 jim
Session Layer 16:22:42 jim
Presentation Layer 16:19:03 jim
Frame 16:12:17 jim
Packet 16:04:34 jim
Bit 16:01:20 jim
Payload 15:59:06 jim
Datagram 15:55:10 jim
RFC 1594 15:48:44 jim
Cable Connections 15:44:48 jim
Physical Layer 15:44:16 jim
RFC 1928 15:10:27 jim
SOCKS 15:05:51 jim
Logs and File Locations 15:05:06 jim
United States federal government 11:18:24 jim
United States Supreme Court 11:16:42 jim
United States Judiciary 11:13:35 jim
United States House of Representatives 11:02:34 jim
United States Senate 11:02:23 jim
DOJ 11:01:12 jim
FBI 10:59:49 jim
IAFIS 10:48:02 jim
Fingerprint recognition 10:42:50 jim
Biometric 10:18:58 jim
Biometric Scanner 10:17:06 jim
Biometric Token 10:16:19 jim
Biometric Template 09:55:39 jim
ExtensibleMatch 09:00:12 jim
30.03.2017
Biometric Enrollment 17:41:30 jim
Voice recognition 17:22:40 jim
Bio-political tattooing 17:19:27 jim
United States Department of Veterans Affairs 17:18:40 jim
US-VISIT 17:16:00 jim
United States Department of Homeland Security 17:15:23 jim
DHS 17:14:24 jim
MITRE Corporation 17:13:54 jim
United States Visitor and Immigrant Status Indicator 16:44:56 jim
Retinal recognition 16:27:15 jim
Facial recognition 16:23:46 jim
Tel 16:20:53 jim
Pattern-recognition 16:14:32 jim
Iris recognition 16:13:41 jim
Fpt 16:09:00 jim
Spoofing Attack 15:55:45 jim
FNMR 15:50:50 jim
False Non-Match Rates 15:50:33 jim
FMR 15:47:28 jim
False Match Rates 15:46:29 jim
24.03.2017
Trustmark Scheme 12:48:11 jim
Web Blog_blogentry_170816_1 12:24:13 jim
Token Binding Protocol Negotiation 12:21:50 jim
Token Binding over HTTP 12:14:58 jim
Token Binding ID 12:14:42 jim
Sec-Token-Binding 12:14:24 jim
Token Binding Protocol 12:13:45 jim The Token Binding Protocol ==> Token Binding Protocol
Token Consumer 11:56:20 jim
Token Provider 11:55:31 jim
Web Blog_blogentry_240317_1 09:42:37 jim
20.03.2017
Badssl.com 13:39:03 jim
TLS Proxy 13:36:34 jim
HTTPS Inspection 13:28:15 jim
ISO 24745 13:09:14 jim
Inherence Factor 12:36:37 jim
Presentation Attack Detection 12:35:32 jim
Presentation Attack 12:34:55 jim
PAD 12:27:26 jim
AAL 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
Federation Models 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
What is missing in OAuth 2.0 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
Someplace You Are 11:21:30 jim
Something You Do 11:20:12 jim
Authentication Factor 10:54:59 jim
Sensitive Authentication Data 10:35:59 jim
Cardholder Data 10:25:30 jim
Multi-Factor Authentication 10:07:35 jim
CDE 09:59:25 jim
Cardholder Data Environment 09:58:40 jim
18.03.2017
OAuth 2.0 Token Exchange 15:16:04 jim
May_act (May Act For) Claim 15:14:57 jim
Cid (Client Identifier) Claim 15:09:25 jim
Scp (Scopes) Claim 15:06:11 jim
Act (Actor) Claim 15:02:01 jim
Authentication Double-Hop 14:50:04 jim
OAuth 2.0 12:30:17 jim
Logout Process 12:29:08 jim
Access Token 12:08:04 jim
Delegation vs Impersonation 10:09:29 jim
Web Blog_blogentry_180317_1 09:55:11 jim
Client Application 09:43:43 jim
Web Authentication 09:26:59 jim
LDAP Authentication 09:22:34 jim
Password Manager 09:15:18 jim
Password Vault 09:14:16 jim
16.03.2017
Best Practices For Unique Identifiers 15:21:03 jim
AICPA 12:41:28 jim
SSAE 16 12:41:03 jim
American Institute of Certified Public Accountants 12:40:03 jim
Statement on Standards for Attestation Engagements 12:13:08 jim
SOC 1 12:08:42 jim
15.03.2017
RFC 7301 08:36:06 jim
Application-Layer Protocol Negotiation 08:27:39 jim
ALPN 08:25:58 jim
14.03.2017
Acr_values 11:21:37 jim
Authentication Context Class Reference 11:17:42 jim
International Mobile Subscriber Identity 11:03:43 jim
Essential Claim 08:50:27 jim
Voluntary Claim 08:48:54 jim
Acr 08:41:43 jim
13.03.2017
Social Login 11:34:26 jim
Social Identity Provider 11:32:52 jim
12.03.2017
GraphQL schema language 10:55:20 jim
GraphQL 10:48:53 jim
GraphQL Server 10:46:44 jim
GraphQL Client 10:33:11 jim
GraphQL/graphQL-architecutre.png 09:29:38 jim GraphQL-architecture
The Open Group 09:26:09 jim
Representational State Transfer 09:09:38 jim
Create Read Update Delete 09:06:19 jim
HTTP Method 09:05:32 jim
1990s 08:59:27 jim
1970s 08:52:28 jim
MacOS 08:50:03 jim
Santa Cruz Operation 08:47:57 jim
SCO 08:46:53 jim
UNIX History and More 08:44:19 jim
UNIX 08:30:25 jim
Open Software Foundation 08:29:15 jim
DCE 08:20:55 jim
Interface Definition Language 08:18:39 jim
IDL 08:17:35 jim
Hypermedia As The Engine Of Application State 08:13:58 jim
HATEOAS 08:10:16 jim
08.03.2017
Anonymity 17:52:48 jim
Web Blog_blogentry_080317_1 17:50:02 jim
B003281 16:37:22 jim
Week 12:01:14 jim
Seconds 11:58:48 jim
Millisecond 11:55:07 jim
Year 11:45:28 jim
Unix Epoch 11:44:11 jim
MacOS Epoch 11:42:07 jim
Time And Epochs 11:35:28 jim
Epoch 11:32:51 jim
Tick 11:31:15 jim
AccountExpires 11:29:34 jim Ticks ==> Tick
Instruction cycle 11:29:24 jim
Year 1904 11:26:12 jim
DirXML Code Snippets 11:24:37 jim Minutes ==> Minute
Minute 11:24:37 jim Minutes ==> Minute
Hour 11:24:10 jim Hours ==> Hour
Day 11:23:44 jim Days ==> Day
Year 1582 11:19:28 jim
Nanosecond 11:19:03 jim
TimeLimit 11:14:37 jim
TimeBeforeExpiration 11:14:25 jim
SearchRequest 11:13:52 jim
SYNC PANE ENTRIES EVAL 11:13:34 jim
PwdMinDelay 11:13:18 jim
PwdMinAge 11:12:58 jim
PwdMaxIdle 11:12:41 jim
PwdMaxDelay 11:12:05 jim
PwdLockoutDuration 11:11:17 jim
PwdGraceExpiry 11:10:57 jim
PwdFailureCountInterval 11:10:22 jim
PwdExpireWarning 11:10:01 jim
LowConvergenceSyncInterval 11:09:33 jim
LdapServerIdleTimeout 11:09:16 jim
LOGIN DELAY ENABLE 11:08:59 jim
Heartbeat Synchronization 11:08:43 jim
FAILED AUTH DELAY 11:08:30 jim
Expires_in 11:08:18 jim
DxPwdFailedTime 11:07:28 jim
Cachecleanupinterval 11:07:10 jim
Cacheadjustinterval 11:06:49 jim
Cache-Control 11:06:39 jim
Account Usability Request Control 11:05:58 jim
Java Time 11:04:02 jim Milliseconds ==> Millisecond
LargeInteger 10:55:38 jim
Year 1601 10:50:24 jim
Microsoft TIME 10:49:56 jim
DateTime 10:24:44 jim
2,147,483,647 10:23:01 jim
ShadowLastChange 10:21:45 jim
NdsServerIntTable 10:20:01 jim
Shadow 10:18:50 jim
Token Introspection Endpoint 10:17:37 jim
Year 1972 10:13:47 jim
Leap seconds 10:13:14 jim
UTC 10:10:17 jim
Coordinated Universal Time 10:09:29 jim
POSIX time 09:56:21 jim
Attribute 00:58:14 jim
07.03.2017
Login_hint_token 12:53:28 jim
Binding_message 12:50:23 jim
OpenID Connect MODRNA Authentication Profile 1.0 12:49:23 jim
Internet Protocol Address 12:40:38 jim
IP-Address 12:39:28 jim
OpenID Connect Mobile Discovery Profile 12:39:07 jim
Account Chooser 12:23:57 jim
OpenID.Discovery 11:04:34 jim
UTMS 10:56:04 jim
MSISDN 10:51:10 jim
MODRNA.Discovery 10:43:07 jim
OpenID.Core 10:23:50 jim
MODRNA 10:23:24 jim
Web Blog_blogentry_070317_1 10:10:27 jim
OpenID Connect Account Porting 10:08:50 jim
Mobile Connect 10:06:48 jim
GSMA 10:06:21 jim
05.03.2017
Standards Based SSO 09:27:53 jim
03.03.2017
API Planing 08:57:43 jim
LeftMenu 08:48:21 jim
OAuth 2.0 Use Cases 08:46:19 jim
Public API 08:10:10 jim
Partner API 08:09:53 jim
Internal API 08:09:33 jim
API Consumer 08:05:40 jim
API Provider 08:05:00 jim
02.03.2017
TLS Full Handshake 16:26:28 jim
TLS Full Handshake/tls13-hs-ecdhe.png 16:12:43 jim Improved Handshakes in TLS version 1.3
0-RTT Handshakes 16:10:35 jim
Ephemeral Key 15:53:13 jim
TLS Session Resumption 15:38:10 jim
Pre-Shared Key 15:32:23 jim
Transport Layer Security (TLS) Renegotiation Indication Extension 14:35:04 jim
RFC 5869 14:07:41 jim
HMAC-based Extract-and-Expand Key Derivation Function 14:07:02 jim
HKDF 14:05:04 jim
RFC 3874 14:03:57 jim
SHA-224 14:03:10 jim
EdDSA 14:01:06 jim
Ed25519 14:00:32 jim
Edwards-curve Digital Signature Algorithm 13:59:42 jim
Data Loss Prevention 12:57:27 jim
DLP 12:52:05 jim
Azure 12:48:27 jim
Data Classification 12:45:03 jim
01.03.2017
Web Blog_blogentry_010317_1 16:45:02 jim
Identity and Access Management 13:14:40 jim
Identity State 13:14:16 jim
24.02.2017
Cryptographic Collision 11:03:19 jim
Collision Resistance 11:00:12 jim
SHAttered 10:58:28 jim
Cryptographic Collision/Collision-illustrated.png 10:51:49 jim SHA-1 collision
SHA-1 10:40:08 jim
AEAD_CHACHA20_POLY1305 10:39:00 jim
CHACHA20-POLY1305 10:37:13 jim
Authenticated Encryption with Associated Data (AEAD) Parameters 10:36:04 jim
Authenticated Encryption with Associated Data 10:35:04 jim
RFC 7539 10:28:30 jim
Poly1305 10:24:17 jim
ChaCha20 10:22:56 jim
ChaCha 10:21:10 jim
CBC-MAC 10:18:12 jim
CCM 10:17:01 jim
RFC-5288 10:11:13 jim
AES-GCM 10:10:19 jim
State Cipher 10:00:40 jim
Stream Cipher 09:59:58 jim
Pseudorandom 09:58:07 jim
Salsa20 09:47:35 jim
Web Blog_blogentry_240217_1 09:44:00 jim
HMAC-SHA2 09:41:08 jim
HMAC-SHA1 09:39:45 jim
HMAC-MD5 09:39:20 jim
Keyed-Hash Message Authentication Code 09:36:38 jim
RFC 3174 09:15:28 jim
21.02.2017
ISO 29115 16:49:26 jim
Common Access Card 16:37:41 jim
CAC 16:36:56 jim
Credential Service Provider 16:10:16 jim
Claimant 16:05:30 jim
Vectors of Trust 15:29:40 jim
M-04-04 Level of Assurance (LOA) 15:16:10 jim
NIST Electronic Authentication Guideline 15:15:28 jim
Identity Trust Framework 15:13:21 jim
Trust Framework 15:12:10 jim
Web Blog_blogentry_210217_1 15:03:09 jim
VoT 14:59:02 jim
FAL 14:37:37 jim
Federation Assurance Level 14:37:19 jim
FAL 2 14:35:38 jim
FAL 3 14:34:59 jim
FAL 1 14:29:15 jim
Holder-of-Key 12:20:29 jim
Bearer 12:19:07 jim
Federation 11:26:28 jim
Federation/federation.png 11:22:27 jim Federation Image
Assertion 11:19:23 jim
NIST.SP.800-63C 11:17:25 jim
NIST.SP.800-63A 11:14:13 jim
Authenticated Protected Channel 11:09:43 jim
BCP 195 11:09:08 jim
Identity questions 10:43:52 jim
Password Periodic Changes 10:17:15 jim
Password Grace Authentication 09:43:18 jim
Password Expiration 09:42:34 jim
20.02.2017
Web Blog_blogentry_200217_2 18:05:53 jim
Web Blog_blogentry_200217_2/rest-ahead.jpg 18:04:52 jim REST Ahead
AuthZ 17:51:52 jim
Industry 4.0 17:38:29 jim
Industry 4.0/Industry-4-framework.jpg 17:32:35 jim industry 4.0 Framework and Contributing digital technologies
Cloud computing 17:31:08 jim
Linux 15:02:31 jim
Domain Logic 14:57:04 jim
Business Logic 14:51:39 jim
Smart endpoints and dumb pipes 14:50:13 jim
Microservice 14:46:38 jim
UI 14:41:13 jim
User Interface 14:40:53 jim
DoD 14:36:59 jim
NIS 14:20:57 jim
Phone Line 14:18:30 jim
Secure connection 14:17:23 jim
Peer-to-peer 14:15:05 jim
Multicast 14:13:42 jim
Wireless Access Point 14:12:15 jim
A look at the Network Cable standards 14:11:58 jim
Public Switched Telephone Network 14:10:43 jim
Network Basic Input-Output System 14:09:41 jim
Virtual Private Network 14:08:25 jim
Mobile Network 14:03:41 jim
Public Land Mobile Network 14:03:22 jim
Payment Network 14:01:18 jim
Network Cables 14:00:12 jim
Year 1994 13:55:36 jim
Intranet 13:55:14 jim
WAN 13:53:00 jim
Wide Area Network 13:52:42 jim
Local Area Network 13:49:18 jim
LAN 13:48:41 jim
Network 13:45:59 jim
Extranet 13:44:01 jim
Web Blog_blogentry_200217_1 13:18:42 jim
Our Approach 12:42:30 jim
Delegation 10:01:39 jim
OAuth-Token-Exchange 09:55:14 jim
16.02.2017
Cardholder Verification Method Condition Code 13:42:57 jim
2.16.840.1.113719.1.14.100.59 13:39:09 jim 2.16.840.1.113719.1.14.100.59x ==> 2.16.840.1.113719.1.14.100.59
2.16.840.1.113719.1.14.100.17 13:35:59 jim 2.16.840.1.113719.1.14.100.17x ==> 2.16.840.1.113719.1.14.100.17
2.16.840.1.113719.1.14.100.53 13:34:33 jim 2.16.840.1.113719.1.14.100.53x ==> 2.16.840.1.113719.1.14.100.53
2.16.840.1.113719.1.14.100.39 13:00:38 jim 2.16.840.1.113719.1.14.100.39x ==> 2.16.840.1.113719.1.14.100.39
2.16.840.1.113719.1.14.100.57 12:59:13 jim 2.16.840.1.113719.1.14.100.57x ==> 2.16.840.1.113719.1.14.100.57
2.16.840.1.113719.1.14.100.15 12:58:29 jim 2.16.840.1.113719.1.14.100.15x ==> 2.16.840.1.113719.1.14.100.15
2.16.840.1.113719.1.14.100.55 12:56:56 jim 2.16.840.1.113719.1.14.100.55x ==> 2.16.840.1.113719.1.14.100.55
WikiRPCInterface 12:54:31 jim
UTF-8 12:51:06 jim
1.3.6.1.4.1.1466.115.121.1.15 12:48:09 jim
2.5.5.12 12:46:14 jim
ServicePrincipalName 12:43:25 jim
ServiceDNSName 12:40:41 jim
ServiceConnectionPoint 12:33:19 jim
Service Connection Points 12:25:12 jim
SCP 12:23:02 jim
TRUSTED_FOR_DELEGATION 11:28:12 jim
Kerberos Delegation 11:27:03 jim Microsoft Active Directory Delegation ==> Kerberos Delegation
12.02.2017
United States Social Security Administration 11:44:04 jim
Social Security Number 11:39:33 jim
IAM Project Intangibles 11:35:44 jim
IAM Charter 10:59:23 jim
11.02.2017
SEC 21:05:26 jim
United States Securities and Exchange Commission 21:04:56 jim
Financial Industry Regulatory Authority Inc 21:01:36 jim
FinCEN 21:00:02 jim
Year 1789 20:59:27 jim
United States Department of the Treasury 20:59:09 jim
Financial Crimes Enforcement Network 20:55:51 jim
Bank Secrecy Act 20:53:14 jim
Customer Identification Program 20:49:51 jim
KYC 20:31:50 jim
Know Your Customer 20:30:50 jim
AML 20:29:05 jim
CIP 20:28:28 jim
USA PATRIOT Act 20:24:31 jim
Anti-Money Laundering 20:19:30 jim
Year 1970 20:18:08 jim
10.02.2017
Federal Identity, Credential, and Access Management 11:28:31 jim
Web Blog_blogentry_100217_1 09:41:30 jim
IAM Six Stages 09:17:58 jim
API Adoption 08:55:28 jim
09.02.2017
IDM and the Organization Dilemma 14:25:54 jim
Why IDM Makes Sense For Eveyone 14:21:43 jim IDMTheOrganizationsDilemma ==> IDM and the Organization Dilemma
FTTx 13:33:50 jim
Local Exchange 13:33:18 jim
Long Distance Provider 13:32:52 jim
Telecommunications Network Chain 13:27:14 jim
Last Mile Loop 13:13:29 jim Local Loop ==> Local Exchange
E.164 13:01:29 jim
Land Line 12:55:42 jim
Phone Number Portability 12:53:11 jim LandLine ==> Land Line
Phone Number 12:35:37 jim
Social Engineering Attacker 12:21:32 jim
Web Blog_blogentry_090217_1 12:04:56 jim
31.01.2017
Unfortunate event 15:37:12 jim
Disclosure-Alteration-Destruction 15:34:15 jim
Trudy 15:06:31 jim
Mallet 15:05:55 jim
Mallory 15:02:49 jim
Elliptic Curve Diffie-Hellman Ephemeral 10:32:34 jim
Supported Groups Registry 10:31:46 jim
RFC 4492 10:21:39 jim
Diffie-Hellman Ephemeral 10:14:56 jim
RFC 7919 10:11:25 jim
ServerKeyExchange 09:58:34 jim
How SSL-TLS Works 09:57:59 jim
DHE 09:57:21 jim
29.01.2017
RFC 4918 21:12:42 jim
27.01.2017
Provenance 12:54:19 jim
25.01.2017
MAY 13:32:40 jim
MUST 13:32:29 jim
REQUIRED 13:32:05 jim
SHOULD NOT 13:31:47 jim
SHOULD 13:31:14 jim
SHALL 13:30:44 jim
RECOMMENDED 13:30:29 jim
NOT RECOMMENDED 13:30:16 jim
SHALL NOT 13:29:58 jim
MUST NOT 13:29:40 jim
Site Certificate 13:28:25 jim
Certificate Chain 13:24:24 jim
Intermediate Certificate 13:07:07 jim
Monitoring Edirectory Synchronization 10:39:51 jim
Maximum Ring Delta 10:02:53 jim
PartitionStatus 10:01:03 jim
Legal Person 09:39:24 jim
Entity 09:30:22 jim
24.01.2017
Access Control Models 12:06:14 jim
DAC 12:06:02 jim
23.01.2017
Web Blog_blogentry_230117_1 17:09:53 jim
Year 2018 12:09:11 jim
Custodian 12:08:33 jim
RFC 2314 11:54:49 jim
RFC 2986 11:52:20 jim
PKCS10 11:51:39 jim
Certification Request Syntax 11:51:22 jim Certification Request Standard ==> Certification Request Syntax
Automatic Certificate Management Environment 11:48:44 jim
Organization Validated Certificate 11:37:57 jim
Domain Validated Certificate 11:36:29 jim
Certificate Level Of Assurance 11:32:49 jim
Certificate Validation 11:31:11 jim
Certificate Validation Levels 11:30:37 jim
Extended Validation Certificate 11:26:13 jim
Extended Validation Certificate/ev21.jpg 11:23:48 jim EV Display
20.01.2017
Discovery Mechanism 10:35:48 jim
Web Service Security Specifications 10:34:17 jim
Web Service Definition Language 10:32:42 jim
Year 1967 10:31:46 jim
ODJFS 10:29:05 jim
PAM on AIX 10:28:38 jim
OASIS 10:25:51 jim
Organization for the Advancement of Structured Information Standards 10:25:28 jim
SAML 10:21:42 jim
IBM 10:19:02 jim
WS-Security Tokens 10:17:16 jim
Web Services Inspection Language 10:16:40 jim
Web Services Dynamic Discovery 10:16:12 jim
BPEL 10:14:50 jim
WS-BPEL 10:14:21 jim
Business Process Execution Language 10:13:48 jim
ServiceMix 10:11:13 jim
WS-Specifications 10:08:05 jim
Web Services Security 10:02:43 jim
Web Service 09:59:41 jim
WSIL 09:54:47 jim
WS-Inspection 09:54:16 jim
WS-Discovery 09:48:46 jim
Web Services Description Language 09:38:16 jim
WSDL 09:36:40 jim
Universal Description, Discovery, and Integration 09:34:18 jim
UDDI 09:32:42 jim
OpenID.Registration 09:24:21 jim
OAuth 2.0 Discovery 09:21:12 jim
19.01.2017
Groups Are Bad 08:44:52 jim
13.01.2017
Security Considerations 11:39:22 jim
Server-Side Login throttling schemes 11:37:42 jim
PwdLockout 11:24:28 jim
Password Validity Policy 11:12:56 jim
AD Determining Password Expiration 10:56:28 jim
Password Maximum Age 10:48:43 jim
12.01.2017
IdMA 11:51:45 jim
IAM 11:49:22 jim
IDMA Too Many Names 11:49:06 jim
IDAM 11:42:46 jim
Identity Management 11:38:02 jim
Subject Alternative Name 10:01:22 jim
DNS cache poisoning 09:55:59 jim
SubjectAltName 09:39:03 jim
Certificate Subject 09:37:15 jim
10.01.2017
NSA Suite B Cryptography 11:19:12 jim
FIPS 140 11:17:57 jim
Digital Signature Algorithm 11:06:37 jim
Public Key Algorithm 11:03:05 jim
Certificate Signature Algorithm 11:01:59 jim
Algorithm 11:01:15 jim
Luhn Algorithm 10:59:53 jim
Suite B 10:52:17 jim
RFC 6460 10:51:44 jim
Web Blog_blogentry_100117_1 10:42:31 jim
NSA 10:39:42 jim
SHA-3 10:39:18 jim
United States Constitution 09:31:34 jim
US 09:30:36 jim
United States of America 09:30:03 jim
Federal Communications Commission 09:21:28 jim
United States Federal Agency 09:21:04 jim
United States Congress 09:20:15 jim
United States Department of Defense 09:12:54 jim
For Official Use Only 09:09:43 jim
NOFORN 09:07:10 jim
Sensitive But Unclassified 09:03:28 jim
SBU 09:02:58 jim
FVEY 09:00:41 jim
08.01.2017
Identity Lifecycle Management 10:57:04 jim
LDAP Proxy User 10:27:50 jim
HTTP Response 10:20:48 jim
Oracle Unified Directory 10:19:30 jim
HTTP-Server 10:18:09 jim
Proxy-Based WAM 10:15:43 jim
WEB Access Management 10:11:37 jim
07.01.2017
Monetization 12:30:59 jim
API-Gateway 12:24:53 jim
OAuth Scope Example 11:51:21 jim
Application 11:49:04 jim
Software Development Kit 11:47:32 jim
Application Programing Interface 11:45:33 jim
Logjam 11:25:35 jim
Diffie-Hellman key-exchange 11:23:17 jim
Kerberos SSP 11:21:51 jim
Data In Transit 11:20:58 jim
Internet Protocol Security 10:50:33 jim
IPsec 10:48:02 jim
DNSSEC 10:39:58 jim
Domain Name System Security Extensions 10:39:39 jim
Over-the-Air Rekeying 10:36:17 jim
OTAR 10:35:58 jim
PCI Data Security Standard v3.2 09:58:21 jim
PCI Data Security Standard v3.1 09:51:30 jim
TLS Cipher Suite Registry 09:32:30 jim
PCT 09:29:39 jim
Known Cipher Suites 09:25:27 jim
05.01.2017
Thing Explainer 18:06:36 jim
TechBits 12:36:39 jim
LDAP Programing 12:36:18 jim SetupPerlNetLDAPS ==> Setup Perl Net LDAPS
Perl LDAP Samples 12:36:18 jim SetupPerlNetLDAPS ==> Setup Perl Net LDAPS
Setup Perl Net LDAPS 12:36:18 jim SetupPerlNetLDAPS ==> Setup Perl Net LDAPS
SLP For Linux And Solaris 12:34:41 jim
UnixLinux 12:31:15 jim UnixLinuxCommandTricks ==> Unix Linux CommandLine Tricks
Disaster Recovery 12:30:02 jim EdirectoryBackUpsAndClones ==> Edirectory Back-Ups And Clones
Installing And Configuring Edirectory 12:29:40 jim SnmpAndEdirectory ==> Snmp And Edirectory
Snmp And Edirectory 12:29:40 jim SnmpAndEdirectory ==> Snmp And Edirectory
DefinitionIdentityOracle 12:27:23 jim PeopleAndThingsEveryIDMPersonShouldKnow ==> People And Things Every IDM Person Should Know
Sovereign-source Identity 12:27:23 jim PeopleAndThingsEveryIDMPersonShouldKnow ==> People And Things Every IDM Person Should Know
ZOOMIT Corporation 12:27:23 jim PeopleAndThingsEveryIDMPersonShouldKnow ==> People And Things Every IDM Person Should Know
MicrosoftLdapApi 12:24:36 jim
LDAP Schema 12:23:06 jim SchemaModifications ==> Schema Modifications
Schema Modifications 12:23:06 jim SchemaModifications ==> Schema Modifications
PreInstall Check List 12:22:17 jim
IDM 12:18:58 jim
Directory Information Tree Structure 12:17:10 jim
CacheCtl 12:08:50 jim
Cache miss 12:06:06 jim
Cache hit 12:05:25 jim
NSCD 12:04:39 jim
SSSD 12:02:41 jim
Page Cache 12:00:47 jim
FLAIM Cache 12:00:24 jim
Dirty cache 12:00:06 jim
Event Cache 11:59:51 jim
Cache 11:58:27 jim
WEB Agents WAM 11:38:16 jim
SCIM 11:24:32 jim
04.01.2017
Hypertext Transfer Protocol 10:01:05 jim
Hypertext Transfer Protocol (HTTP 1.1) Conditional Requests 09:59:30 jim
HTTPS 09:56:09 jim
Hyperlinks 09:54:51 jim
HTML 09:50:46 jim
CSS 09:48:54 jim
Cascading Style Sheets 09:48:17 jim
Hypertext Markup Language 09:45:16 jim
Hypertext 09:42:35 jim
Website 09:39:10 jim
Secure WEB Page Information 09:36:23 jim
BREACH (security exploit) 09:27:45 jim
03.01.2017
Information security 14:31:27 jim
Risk Management 14:30:30 jim
Cybersecurity 14:28:48 jim
Class-Break 14:23:23 jim
Web Blog_blogentry_030117_1 14:20:10 jim
Neo-Security Stack 10:59:00 jim
Subject 10:47:48 jim
Web Blog_blogentry_020117_1 10:43:16 jim
Device 10:24:10 jim
Partners 10:21:59 jim
Internet of Things 10:17:33 jim
Employee 10:14:53 jim
Business to Employee 10:13:51 jim
B2E 10:12:54 jim
Business to Business 10:12:28 jim
B2B 10:10:26 jim
Business to Consumer 10:02:32 jim
B2C 10:00:48 jim
What Is IDM 09:59:42 jim
CIM 09:17:52 jim
Common Information Model 09:17:28 jim
RFC 3060 09:13:19 jim
Directory Enabled Networks 09:09:11 jim
DEN 09:07:23 jim
International Electrotechnical Commission 08:59:53 jim
IEC 08:57:43 jim
InterNational Committee for Information Technology Standards 08:55:28 jim
INCITS 08:52:08 jim
NIST RBAC 08:49:15 jim
02.01.2017
NIST RBAC What is Missing 10:44:51 jim
ISO 10181-3 10:38:59 jim
RFC 3198 10:30:24 jim
01.01.2017
NDS Thread Pool 16:42:02 jim
DHost 16:37:54 jim
Event System 16:37:29 jim
Connection Table 16:30:38 jim
N4u.server.idle-threads 16:19:10 jim
Ndsconfig Parameters 16:11:49 jim
NDS Threads 16:09:13 jim
N4u.server.active-interval 16:08:24 jim
NDSD Threads And Processes 15:48:16 jim
Ran Across Today 11:29:35 jim
RAT 11:28:40 jim
Web Blog_blogentry_010117_1 11:01:48 jim
Releasability 10:45:19 jim
Disclosure 10:44:32 jim
Company Confidential 10:43:58 jim
CUI 10:40:16 jim
Controlled Unclassified Information 10:39:57 jim
United States 10:19:03 jim
FOUO 10:14:20 jim
Unclassified 10:12:07 jim
AAA 09:47:34 jim
Accounting 09:46:44 jim
Authentication Authorization and Accounting 09:44:36 jim
30.12.2016
Lsss 19:16:30 jim
DClient 19:09:54 jim
Graded Authentication Management Service 18:53:34 jim
Gams 18:49:37 jim
Imon 18:48:48 jim
Nldap 18:48:01 jim
Ssldp 18:47:11 jim
Ssncp 18:46:21 jim
Sss 18:45:36 jim
Statuslg 18:44:08 jim
Security Domain Infrastructure 11:55:59 jim
W0 Servers 11:51:24 jim
Niciext 11:44:46 jim
KAP 11:35:12 jim
Key Access Partition 11:34:43 jim
SDI Key 11:32:24 jim
SASDFM 11:23:48 jim
Ncpengine 11:16:50 jim
Novell Certificate Server 11:14:46 jim
Novell Modular Authentication Service 11:11:55 jim
SDI 11:05:35 jim
NICISDI 11:05:12 jim
HTTPServerObject 11:03:53 jim
NCP 10:55:55 jim
NetWare Core Protocol 10:55:27 jim
Ndsmodules.conf 09:50:33 jim
Loadable Module 09:44:45 jim
29.12.2016
Blockcachepercent 17:30:22 jim
FLAIM checkpoint 17:17:16 jim
Lowdirtycache 17:13:33 jim
Maxdirtycache 17:11:57 jim
_ndsdb.ini 17:06:48 jim
Preallocatecache 17:06:29 jim
Hard cache limit 17:02:22 jim
Dynamic Cache Mode 16:57:46 jim
Static Cache Mode 16:48:50 jim
EDirectory Performance Tuning 16:35:13 jim
TransitiveVector 15:58:30 jim
NDS Authentication 15:57:10 jim
ConfigFilesHosts.nds 15:54:18 jim
NICITreeKeyProvider 15:50:00 jim
Ndsconfig 15:45:00 jim
N4u.base.tree-name 15:44:30 jim
NDS Tree-name 15:44:24 jim
Files In Dib Directory 15:39:53 jim
Https.server.cached-server-dn 15:37:47 jim
Https.server.cached-cert-dn 15:37:44 jim
Http.server.module-base 15:37:39 jim
Https.server.interfaces 15:37:36 jim
Http.server.interfaces 15:37:31 jim
Http.server.auth-req-tls 15:37:28 jim
Http.server.tls-port 15:37:24 jim
Http.server.clear-port 15:37:04 jim
Http.server.bind-restrictions 15:36:57 jim
Http.server.session-exp-seconds 15:36:45 jim
Http.server.threads-per-processor 15:36:42 jim
Http.server.trace-level 15:36:39 jim
Http.server.keep-timeout-seconds 15:36:14 jim
Http.server.request_timeout-seconds 15:36:04 jim
Http.server.request-io-buffer-size 15:35:55 jim
N4u.ldap.lburp.transize 15:35:30 jim
N4u.nds.server-context 15:35:22 jim
N4u.nds.bindery-context 15:35:07 jim
N4u.nds.synchronization-restrictions 15:34:58 jim
N4u.nds.server-guid 15:34:47 jim
N4u.nds.preferred-server 15:34:27 jim
N4u.nds.dibdir 15:33:48 jim
N4u.nds.server-name 15:29:41 jim
N4u.nds.dofsync 15:27:41 jim
N4u.nds.server-state-up-threshold 15:26:20 jim
N4u.nds.flatcleaning-interval 15:26:08 jim
N4u.nds.drl-interval 15:25:38 jim
N4u.nds.purger-interval 15:22:01 jim
N4u.nds.janitor-interval 15:21:04 jim
N4u.nds.inactivity-synchronization-interval 15:19:35 jim
N4u.server.log-levels 15:19:13 jim
N4u.nds.advertise-life-time 15:17:42 jim
N4u.server.signature-level 15:16:48 jim
N4u.server.xdas-conf 15:16:11 jim
N4u.server.log-file 15:14:45 jim
N4u.server.sid-caching 15:14:28 jim
N4u.server.libdir 15:14:10 jim
N4u.server.vardir 15:06:58 jim
N4u.server.mask-port-number 15:06:44 jim
N4u.server.thread-stack-size 15:03:24 jim
N4u.server.log-file-size 15:03:06 jim
N4u.server.start-threads 15:02:54 jim
N4u.server.max-threads 15:01:10 jim
N4u.server.max-interfaces 15:01:02 jim
N4u.server.max-openfiles 15:00:50 jim
N4u.server.udp-port 15:00:41 jim
N4u.base.slp.max-wait 15:00:28 jim
N4u.base.dclient.use-udp 15:00:05 jim
N4u.server.tcp-port 14:59:57 jim
Service Location Protocol 14:51:19 jim
SLP 14:51:00 jim
Nds.conf 14:40:34 jim
EDirectory DIB 14:08:46 jim
DIB 14:08:21 jim
Roll-Forward Log 13:38:18 jim
Rfldirectory 13:27:46 jim
Logstreamfiles 13:25:18 jim
Stream File 13:23:10 jim
Rflkeepfiles 13:19:26 jim
Disablemovetoattrcontainer 13:14:56 jim
Preventing eDirectory from Auto Adding Indexes 13:13:54 jim
Cpinterval 13:13:16 jim
EdirectoryLoginUpdate 12:54:43 jim
Memory 12:48:22 jim
2.16.840.1.113719.1.1.4.1.52 12:45:55 jim
Random Access Memory 12:45:31 jim
RAM 12:41:15 jim
FLAIM Entry Cache 11:58:45 jim
RFL 10:24:50 jim
28.12.2016
Swap Space 21:26:24 jim
Virtual Memory 21:24:09 jim
Scrum 12:24:30 jim
Kanban 12:06:30 jim
Lean 12:03:55 jim
TPS 12:02:28 jim
Toyota Production System 12:02:08 jim
Backlog 11:47:46 jim
Agile 11:44:37 jim
Agile Principles 11:42:02 jim
Agile Manifesto 11:36:36 jim
Scrum Master 11:30:41 jim
Iteration Backlog 11:22:43 jim
Velocity 11:21:33 jim
Story Point 11:19:50 jim
Fibonacci 11:17:56 jim
User Story 11:10:20 jim
Product Owner 11:02:47 jim
Release Planning 10:58:27 jim
Stakeholders 10:57:16 jim
22.12.2016
DevOps 14:56:14 jim
Web Blog_blogentry_221216_1 14:20:49 jim
Service 13:59:36 jim
Service-oriented Architecture 13:55:28 jim
ESB 13:52:16 jim
Enterprise Service Bus 13:51:47 jim
Enterprise Integration Patterns 13:49:02 jim
Enterprise Application Integration 13:48:15 jim
MOM 13:43:29 jim
Message-oriented Middleware 13:43:12 jim
EIP 13:37:38 jim
EAI 13:33:06 jim
Software Architecture Model 13:25:57 jim
Factory 13:20:58 jim
Bounded Context 13:19:13 jim
Repository 13:18:14 jim
Value Object 13:15:26 jim
Domain-Driven Design 12:27:14 jim
Domain Event 12:25:22 jim
Domain 12:25:04 jim
Aggregate 12:01:29 jim
21.12.2016
LOA 4 15:27:24 jim
LOA 3 15:21:34 jim
LOA 2 15:16:38 jim
LOA 1 15:08:24 jim
Anonymous Identity 14:56:32 jim
Social Identity 14:52:51 jim
Government Identity 14:47:46 jim
Organizational Identity 14:38:34 jim
Schema 14:27:37 jim
Taxonomy 14:24:52 jim
Ontology 14:23:35 jim
Digital Context 14:20:39 jim
User Provisioning 13:41:47 jim
System for Cross-domain Identity Management 13:41:22 jim
Resource Provisioning 13:40:27 jim
Enrollment 13:31:44 jim
Identity Lifecycle Management/identityLifecycle.png 13:22:09 jim identityLifecycle
Trust Model 13:10:22 jim
Password Anti-Pattern 13:08:12 jim
NIST.SP.800-63 13:05:31 jim
LOA 12:57:32 jim
IAL 12:55:49 jim
Legitimacy of Social Login 11:57:50 jim
IDM Related Compliance Items 11:56:03 jim
Square 11:54:37 jim
ACH 11:53:14 jim
Routing Transit Number 11:51:37 jim
Istar Upgrade 11:49:43 jim
Gramm-Leach-Bliley Act 11:49:33 jim
Card Security Code 11:48:53 jim
Regulatory Risk 11:47:47 jim
Retail 11:47:44 jim
ProjectsWeHaveBeenInvolved 11:45:51 jim
Decentralized Autonomous Organization 11:43:23 jim
Authorization Request Cryptogram 11:42:59 jim
Petroleum 11:40:53 jim
Housing 11:40:10 jim
Agriculture 11:39:52 jim
Energy 11:39:40 jim
Transportation 11:39:29 jim
Industry Specific 11:39:14 jim
Airlines 11:38:11 jim
Major Industry Identifier 11:37:59 jim
Stellar Consensus Protocol 11:35:50 jim
Sarbanes-Oxley Act 11:35:06 jim
SWIFT code 11:30:14 jim
Society for Worldwide Interbank Financial Telecommunication 11:29:34 jim
Financial Institution 11:28:48 jim
MIC 11:26:48 jim
Identification Code 11:26:20 jim
ISO 10383 11:26:08 jim
Market Identifier Code 11:24:47 jim
Bank Identifier Code 11:21:22 jim
RSA SecurID 11:15:45 jim
Two-factor authentication 11:12:28 jim
ABA RTN 11:08:48 jim
UPIC 11:05:41 jim
Universal Payment Identification Code 11:05:11 jim
Issuer Identification Number 11:02:43 jim
Bank International Code 11:00:38 jim
Business Identifier Code 11:00:29 jim
BIC 10:59:59 jim
Payment Card Industry 10:55:33 jim
RFC 3615 10:53:44 jim
Web of Trust 10:52:26 jim
ISO 13616 10:49:14 jim
ISO 9362 10:45:47 jim
IBAN 10:44:58 jim
International Bank Account Number 10:44:31 jim
SWIFT 10:26:10 jim
Claim 09:23:16 jim
Legal Fictions 08:58:56 jim
20.12.2016
Terse RDF Triple Language 16:14:49 jim
Turtle 16:13:49 jim
Friend Of A Friend 14:58:21 jim
FOAF 14:57:12 jim
LDAP Data Interchange Format 11:24:03 jim
SAFE-INIT-UTF8-CHAR 11:22:35 jim
SAFE-UTF8-CHAR 11:22:17 jim
SAFE-INIT-CHAR 11:22:02 jim
SAFE-CHAR 11:21:36 jim
Best Practices For LDAP Naming Attributes 11:17:36 jim
RFC 2849 11:16:26 jim
JavaCodeSetSimplePassword 11:03:56 jim
Verify Time is Synchronized 11:02:47 jim
NTP 11:01:12 jim Sntp ==> SNTP
Time sync 11:01:12 jim Sntp ==> SNTP
SNTP 11:01:11 jim Sntp ==> SNTP
Base64 10:58:56 jim
Packed Encoding Rules 10:57:02 jim
Canonical Encoding Rules 10:55:25 jim
Distinguished Encoding Rules 10:53:56 jim
ASN.1 10:52:19 jim
Abstract Syntax Notation One 10:51:53 jim
Encoding 10:48:50 jim
Decoding 10:46:23 jim
Basic Encoding Rules 10:43:30 jim
MyMysqlCheatSheet 10:35:48 jim
NUL 10:34:33 jim
NULL 10:34:13 jim
Null 10:33:36 jim
SCIM Attributes 10:31:52 jim
NamingContext 10:31:30 jim
DSA-Specific Entry 10:30:58 jim
19.12.2016
PWFILTER Windows Events 13:41:54 jim
API Management 11:08:22 jim
API Registry 10:55:09 jim
16.12.2016
LDAP Extensions and Controls Listing 09:25:47 jim
LDAPControlsList 09:24:10 jim Definition -- LDAP No-Op Control ==> LDAP No-Op Control
SupportedControl 09:24:10 jim Definition -- LDAP No-Op Control ==> LDAP No-Op Control
LDAP No-Op Control 09:24:09 jim Definition -- LDAP No-Op Control ==> LDAP No-Op Control
RFC 3909 09:23:17 jim
Who Am I Extended Operation 09:11:27 jim
RFC 4647 09:07:12 jim
RFC 3866 09:05:56 jim
10.12.2016
MAD Naming Attributes 10:39:24 jim
Ambiguous Name Resolution 10:38:52 jim
SIDHistory 10:38:18 jim
SPN 10:31:57 jim
NBNS 10:20:44 jim
Year 1983 10:11:24 jim
NetBIOS 10:05:09 jim
NetBIOS Name Service 10:02:08 jim
Windows Internet Name Service 10:00:43 jim
WINS 09:59:22 jim
NetBIOS domain name 09:57:43 jim
MS-WPO 09:57:31 jim
MS-DRSR 09:46:43 jim
MS-DTYP 09:45:34 jim
2.16.840.1.113730.3.1.241 09:42:29 jim
1.2.840.113556.1.2.13 09:41:16 jim
DisplayName 09:40:29 jim
09.12.2016
Max-Pwd-Age Attribute 09:59:47 jim
Pwd-Last-Set attribute 09:55:02 jim
EDirectory Password Expiration 09:00:03 jim
Password Recovery 08:49:35 jim
Password MUST Change 08:45:21 jim
PwdMustChange 08:35:04 jim
Sprint 08:28:16 jim
On-Demand Password Synchronization 08:27:21 jim
Example - Active Directory Change Password JNDI 08:18:36 jim
Passwords Using LDIF 08:16:57 jim
Setting and Changing Microsoft Active Directory Passwords 08:12:25 jim
Active Directory and Passwords 08:10:47 jim
08.12.2016
Iteration Demo and Review 17:33:47 jim
Iteration 17:27:37 jim
Iteration Planning 17:17:50 jim
Capacity 17:17:05 jim
Daily Stand-up 16:38:37 jim Delivery team ==> Delivery Team
Delivery Team 16:38:37 jim Delivery team ==> Delivery Team
Definition of Done 16:38:23 jim Product owner ==> Product Owner
Release 16:28:40 jim
Use cases 15:16:54 jim
Business value 15:00:26 jim
ICE 09:30:47 jim
Import Conversion Export 09:30:29 jim
Redhat Configuration 09:25:07 jim
How To Get Lab Builds 09:22:42 jim
LUMiscTricks 09:18:15 jim UsingRPM ==> Using RPM
MigratingFromNISToLDAP 09:16:43 jim UsingIDMToReplaceNIS ==> Using DirXML To Replace NIS
IDMAndUnixLinux 09:16:42 jim UsingIDMToReplaceNIS ==> Using DirXML To Replace NIS
Using DirXML To Replace NIS 09:16:42 jim UsingIDMToReplaceNIS ==> Using DirXML To Replace NIS
Jim Willeke Resume 09:12:31 jim IstarUpgrade ==> Istar Upgrade
Our Clients 09:12:31 jim IstarUpgrade ==> Istar Upgrade
Test-Tabs 09:12:31 jim IstarUpgrade ==> Istar Upgrade
06.12.2016
Security Account Manager 17:31:58 jim
Active Directory Groups 16:14:09 jim
GroupType 16:06:12 jim
05.12.2016
KPI 07:00:00 jim
Key Performance Indicator 06:59:39 jim
Web Blog_blogentry_051216_1 06:49:49 jim
01.12.2016
ID 13:30:23 jim
DID descriptor objects 13:24:35 jim
DDO 13:24:05 jim
DID 13:19:25 jim
Uniform Resource Name 13:07:59 jim
URIs, URLs, and URNs 13:03:05 jim
URL 12:58:23 jim
Administrative Identity 12:56:02 jim
Identity Management Architecture 12:46:27 jim
Web Blog_blogentry_250816_1 12:45:38 jim IdentityAndAccessManagement ==> Identity and Access Management
Password Management Methodologies 12:45:37 jim IdentityAndAccessManagement ==> Identity and Access Management
Web Blog_blogentry_011216_1 12:32:11 jim
28.11.2016
SCIM Password Management Extension 20:04:50 jim
NspmPasswordPolicyDN 19:17:40 jim
SCIM Password Management 17:23:36 jim
24.11.2016
Magnetic Secure Transmission 17:31:37 jim
EMVCo Tokenization 17:25:08 jim
MST 17:19:51 jim
Samsung Pay 17:15:50 jim
23.11.2016
SCIM Create Request 20:44:18 jim
ISO 8601 20:33:04 jim
SCIM meta.version 19:57:14 jim
SCIM meta.lastModified 19:56:27 jim
SCIM meta.created 19:56:05 jim
SCIM meta.location 19:42:16 jim
SCIM Common Attribute 19:38:19 jim
SCIM meta.ResourceType 19:32:59 jim
SCIM meta 19:25:31 jim
HTTP 201 19:14:36 jim
SCIM Resource Operations 19:11:33 jim
CheckVersionTag 19:05:28 jim
SCIM id 18:09:14 jim
WS-Trust 14:11:45 jim
WS-Security 14:09:58 jim
Single Sign-On Scenarios 14:00:55 jim
Cloud Services Model 12:42:27 jim
Credential Mapping 12:38:53 jim
SAML Protocols 12:18:35 jim
Cloud Access Security Broker 12:16:05 jim
Web Blog_blogentry_231116_1 11:59:26 jim Cloud Access Security Brokers ==> Cloud Access Security Broker
22.11.2016
SCIM externalId 15:42:55 jim
RFC 20 15:01:21 jim
Display Parameter 14:58:02 jim
Consent Dialog 14:43:49 jim
Implicit Scopes 14:42:35 jim
Privileged Scope 14:37:13 jim
OAuth Scopes 14:35:40 jim
Web Blog_blogentry_210916_1 13:49:20 jim
Authorization Policy 13:01:03 jim
Negative Permission 12:59:51 jim
Positive Permission 12:59:28 jim
Authorization_endpoint 12:44:39 jim
21.11.2016
API Development 19:29:48 jim
Building an API 14:41:56 jim
API Auditing Monitoring Metrics Logging 14:31:44 jim
API Service Delivery 14:23:02 jim API Metrics ==> API Auditing Monitoring Metrics Logging
Application Metrics 14:23:02 jim API Metrics ==> API Auditing Monitoring Metrics Logging
Complex Event Processing 14:23:02 jim API Metrics ==> API Auditing Monitoring Metrics Logging
Continuity Management 13:39:29 jim
Service Delivery 13:37:09 jim
IT Service Management 13:36:01 jim
IT 13:35:18 jim
Information Technology 13:35:02 jim
ITSM 13:33:00 jim
IT Infrastructure Library 13:31:07 jim
ITTL 13:26:46 jim
Contingency Planning 13:21:56 jim
Capacity Management 13:10:26 jim
SLA 13:07:17 jim SLAs ==> SLA
Service-Level Agreement 13:06:50 jim
Service Level Management 13:05:54 jim Service Level Agreement ==> Service-Level Agreement
BPM 12:35:01 jim
Business Process Management 12:34:44 jim
18.11.2016
File Transfer Protocol 14:57:25 jim
FTP 14:57:06 jim
Structured Query Language 14:56:34 jim
SQL 14:56:12 jim
API Brokering 14:55:44 jim
Service Modeling Language 14:55:10 jim
SML 14:50:29 jim
SmartMessage Language 14:47:50 jim
Metrics 14:26:22 jim
17.11.2016
Web Blog_blogentry_171116_1 11:55:07 jim
14.11.2016
2.16.840.1.113719.1.1.4.1.197 16:42:23 jim
OAuth 2.0 NOT an Authentication protocol 01:55:03 jim
08.11.2016
Diffie-Hellman Key-Exchange 14:46:47 jim
Key-Exchange 14:42:54 jim
Session Key 14:29:37 jim
TLS PRF 14:23:52 jim
Subject Certificate 14:06:15 jim
Identity Certificate 13:53:13 jim
Certificate_list 13:48:50 jim
Web Blog_blogentry_081116_1 13:30:44 jim
Trusted Certificate 12:36:04 jim
RA 12:27:42 jim
28.10.2016
Salt 12:03:27 jim
Rainbow Tables 11:59:49 jim
Nounce or Salt 11:58:29 jim
Nonce 11:54:53 jim
Web Blog_blogentry_281016_1 11:54:12 jim
Rich Credential 11:53:15 jim
18.10.2016
Tomcat And LDAP 01:55:40 jim
16.10.2016
Amr_values 12:24:08 jim
Authentication Method Reference 12:23:03 jim
Complex Attribute 12:10:44 jim
SCIM Data Types 11:40:39 jim
SCIM Resource Example 11:32:00 jim
SCIM Replace Request 11:28:25 jim
13.10.2016
OpenWhisk 19:35:30 jim
Functions as a Service 16:54:23 jim
Webtask 14:19:34 jim
AWS Lambda 13:45:01 jim
Event-triggered 13:44:36 jim
FaaS 13:39:02 jim
Serverless Architectures 12:51:53 jim
Web Blog_blogentry_131016_1 12:40:19 jim
04.10.2016
Active Directory Tools/aduc.jpg 17:12:13 Bimpster
Active Directory Tools 17:11:18 Bimpster
03.10.2016
LoginMaximumSimultaneous 12:12:38 jim
LoginActivationTime 11:37:19 jim
29.09.2016
Authentication Failures 13:34:55 jim
Account Restrictions 13:33:40 jim
MyStartPage 13:30:17 jim
LDAP_INVALID_CREDENTIALS 13:29:46 jim
NetworkAddressRestriction 13:04:27 jim
LDAP_NO_SUCH_OBJECT 13:02:17 jim
28.09.2016
Internet Message Access Protocol 13:55:11 jim
IMAP 13:52:38 jim
Application Layer Security 13:49:48 jim
World Wide Web 13:48:39 jim
WEB 13:47:18 jim
Web 13:46:54 jim
Schannel SSP 13:44:19 jim
Security 13:37:05 jim
Blowfish 12:08:01 jim
Password Storage Scheme 12:06:23 jim
InfoSec 12:02:13 jim
Information Rights Management 12:00:29 jim Data Security ==> Information security
OAuth 2.0 JWT Authorization Request 11:33:13 jim
Authorization Request 11:15:46 jim
Request Object 11:15:02 jim
26.09.2016
Sub 00:01:33 jim
25.09.2016
Identity Token 23:40:17 jim
The Next Big Thing 13:13:06 jim
Life Management Platform 13:12:35 jim
Directory Partition Hierarchy 13:06:47 jim
Directory Partition Hierarchy/mad-directory-tree-hierarchy.png 13:04:14 jim mad-directory-tree-hierarchy
Root Domain Directory Partition 12:58:38 jim
Forest Root Domain 12:55:27 jim
Directory Partition Subtrees 12:36:02 jim
Domain Directory Partition 12:32:45 jim
Schema Directory Partition 12:32:33 jim
Configuration Directory Partition 12:32:22 jim
Internal Cross-References 12:14:51 jim
Simple Mail Transfer Protocol 12:08:47 jim
RFC 5321 12:08:00 jim
MailboxRelatedObject 12:07:24 jim
LDAPWiki Images 11:55:46 jim
LDAPWiki Images/ldapwiki-logo.png 11:54:22 jim ldapwiki-logo
LDAPWiki Images/ldapwiki.com-code.png 11:52:24 jim ldapwiki.com-bar-code
LDAP Connection Maintenance 11:49:54 jim
DXServer Password Commands and Operational Attributes 11:42:54 jim
23.09.2016
Identity Sovereignty 18:13:09 jim
Sovereignty 18:08:17 jim
Namespace 17:30:55 jim
Constitutional Order 17:30:36 jim
Legitimacy 17:29:19 jim
Philip Bobbit 17:24:24 jim
Health Care Organization 14:05:20 jim
Health Care Provider 14:04:27 jim
Financial Organization 14:00:29 jim
Social Networks 13:54:56 jim
Federated Identity 13:53:04 jim
Digital Subject 13:51:33 jim
Identity Correlation 13:41:50 jim
LDAP URL 11:57:41 jim
Test Page 11:52:53 jim
Regexp 11:47:55 jim
Regular expression 11:47:36 jim
Regular Expression Syntax 11:44:14 jim
Opportunities 11:41:32 jim
22.09.2016
XDAS Event Identifier 19:47:01 jim XADS Event Identifier ==> XDAS Event Identifier
XDAS Authentications 19:14:08 jim
NovellS PeopleSoft Driver 17:30:06 jim
21.09.2016
Auth_time 18:06:17 jim
DirXML-PasswordSyncStatus 12:50:11 jim
20.09.2016
Internet Assigned Numbers Authority (IANA) Considerations for the Lightweight Directory Access Protocol (LDAP) 12:55:17 jim
LDAP ping 12:54:51 jim
BaseObject 12:52:19 jim
Apache Web Server and LDAP 12:51:47 jim
LDAP Searches 12:51:15 jim LDAPSearchScopes ==> LDAP Search Scopes
SingleLevel 12:51:15 jim LDAPSearchScopes ==> LDAP Search Scopes
SubordinateSubtree 12:51:15 jim LDAPSearchScopes ==> LDAP Search Scopes
WholeSubtree 12:51:15 jim LDAPSearchScopes ==> LDAP Search Scopes
LDAP 12:51:14 jim LDAPSearchScopes ==> LDAP Search Scopes
LDAP Search Scopes 12:51:14 jim LDAPSearchScopes ==> LDAP Search Scopes
SubordinateSubtree/subordinateSubtree-scope.png 12:47:37 jim subordinateSubtree-scope
Draft-sermersheim-ldap-subordinate-scope 12:41:15 jim
WholeSubtree/wholeSubtree-scope.png 12:17:26 jim wholeSubtree-scope
SingleLevel/singleLevel-scope.png 12:11:51 jim singleLevel-scope
BaseObject/baseObject-scope.png 12:05:12 jim baseObject-scope
Subentries 11:56:10 jim
RFC 3672 11:51:07 jim
PwdPolicySubEntry 11:42:49 jim
RFC 3062 11:31:00 jim
DONT_EXPIRE_PASSWORD 11:12:48 jim
User-Account-Control Attribute Values 11:03:30 jim
User-Account-Control Attribute 10:49:37 jim
16.09.2016
How SSL-TLS Works/tls-handshake.png 13:02:49 jim tls-full-handshake
ObjectClass 12:22:01 jim
DIT Structure Rule 12:19:22 jim
DIT Content Rule 12:18:53 jim
Thinking of LDAP 12:13:55 jim
Structural ObjectClass 12:13:32 jim
Schema Checking 12:12:31 jim
ABSTRACT 12:09:56 jim
AttributeType Description 12:05:18 jim
AttributeTypes 11:59:46 jim
Attribute Type Description 11:56:53 jim
LDAP Entry 11:31:15 jim
Distinguished Value 11:28:16 jim
RFC 4510 11:16:04 jim
Attribute Options 11:13:26 jim
LDAP Model of User Information 11:01:24 jim
LDAP Directory Information Models 10:55:15 jim
RFC 4512 10:46:29 jim
RFC 4518 10:42:11 jim
15.09.2016
Designer 15:27:36 jim
14.09.2016
RESTful API Modeling Language 13:27:57 jim
13.09.2016
String Representation of Distinguished Names 11:34:40 jim
RFC 4517 11:33:22 jim
DistinguishedNameMatch 11:32:30 jim
Distinguished Name Case Sensitivity 11:16:21 jim
LDAP Protocol Exchanges 11:13:19 jim
1.3.6.1.4.1.1466.115.121.1.12 11:08:12 jim
DN Syntax 11:07:22 jim
DistinguishedName 11:02:35 jim
AVA 10:12:17 jim
11.09.2016
Soft tokens 13:23:33 jim
Hard tokens 13:22:49 jim
Token 13:21:21 jim
Web Blog_blogentry_100916_1 13:06:50 jim
RFC 4211 13:05:12 jim
Software-secured key 12:32:36 jim
Private Key 12:31:05 jim
Plaintext 12:30:19 jim
Secret-key 12:26:57 jim
Hardware-secured key 12:24:24 jim
Vbm 12:14:49 jim
Swk 12:14:01 jim
Kba 12:13:22 jim
Hwk 12:12:26 jim
Geo 12:11:37 jim
Pairwise Pseudonymous Identifier 11:09:16 jim
Web Blog_blogentry_160615_1 11:04:20 jim
Web Blog_blogentry_140615_1 11:04:04 jim
Response_type 11:03:14 jim
OAuth Error 11:02:02 jim
OAuth 2.0 Endpoints 11:01:12 jim
OAuth 2.0 Client Registration 11:00:46 jim
Implicit Flow 10:59:25 jim
Authorization Response 10:58:51 jim
OAuth Parameters Registry 10:57:50 jim
RFC 5226 10:56:45 jim
Access Token Request 10:51:58 jim
Juridical Person 10:50:06 jim Juridical Persons ==> Juridical Person
10.09.2016
OpenID Connect 13:57:07 jim Redirect URI ==> Redirect_uri
Authorization Code Flow 13:57:06 jim Redirect URI ==> Redirect_uri
Redirect_uri 13:57:06 jim Redirect URI ==> Redirect_uri
Response_mode 13:56:06 jim
OAuth 2.0 Multiple Response Type Encoding Practices 13:51:06 jim
Collision-Resistant Name 13:43:46 jim
Nested JWT 13:39:12 jim
JWT Claims Set 13:35:37 jim
JWT Claim Value 13:33:36 jim Claim Value ==> JWT Claim Value
JSON Web Token Claims 13:28:16 jim
OAuth Client 13:12:57 jim
OpenID Connect Provider 13:09:13 jim
Authentication Request 13:07:21 jim
Natural Person 12:48:26 jim
PPID 12:37:48 jim
09.09.2016
Respect Trust Framework 13:24:44 jim
ILM 12:35:09 jim
Information Lifecycle Management 12:34:34 jim
Data 11:56:58 jim
Data In Process 11:53:12 jim
TLS 11:42:43 jim
07.09.2016
Password Strength 18:25:08 jim
06.09.2016
Technology-Enabled Relationship Management 10:05:18 jim
05.09.2016
Java Authentication and Authorization Service 18:50:26 jim
Security Strength Factor 09:26:49 jim
SSF 09:13:31 jim
Bruce Schneier 09:12:23 jim
Citation needed 09:10:23 jim
Web Blog_blogentry_050916_1 09:00:25 jim
03.09.2016
Lean Product Development 12:45:41 jim
Customer 12:41:53 jim
User 12:38:55 jim
Product Management 11:52:26 jim
User Experience 11:38:19 jim
29.08.2016
Web Blog_blogentry_290816_1 12:53:04 jim
Stellar Network 12:03:53 jim
Stellar Ledger 11:58:02 jim
ID Key 11:53:31 jim
JLINC 11:43:40 jim
Web Blog_blogentry_280816_1 11:21:32 jim
Two Generals Problem 10:56:14 jim
Byzantine Generals Problem 10:55:48 jim
28.08.2016
Identity Chains 14:13:26 jim
RSA 13:35:53 jim
Group Signatures 13:34:59 jim
Ring Signature 13:30:36 jim
Blockchain ID 13:17:04 jim
Qiy Foundation 12:06:38 jim
Qiy Trust Framework 12:00:00 jim
27.08.2016
One-Time password 23:26:19 jim
CAPTCHA 23:04:03 jim
Web Blog_blogentry_270816_1 14:04:48 jim
United States Department of Commerce 14:01:25 jim
NIST.SP.800 Computer Security 13:54:26 jim SP 800 Computer Security ==> NIST.SP.800 Computer Security
United States Executive Branch 13:53:06 jim
POTUS 13:52:41 jim
President of the United States of America 13:52:23 jim
United States Federal Executive Department 13:42:27 jim
United States Cabinet Department 13:41:53 jim
IRS 13:06:54 jim
Internal Revenue Service 13:06:26 jim
FAA 13:05:50 jim
Federal Aviation Administration 13:05:28 jim
Not-for-profit Entity 13:04:48 jim
Federally Funded Research and Development Centers 13:01:27 jim
FFRDC 12:59:59 jim
MITRE 12:54:15 jim
CVE 12:47:10 jim
26.08.2016
Interval Syntax 19:11:17 jim
Lockouttime 19:07:51 jim
2.5.5.16 19:03:02 jim
Integer8 19:02:00 jim
Health Insurance Portability and Accountability Act 13:01:42 jim
Standard compliance 12:54:35 jim
Standard 12:52:25 jim
United States Federal Standard 12:51:37 jim
Trust Framework Provider 12:48:47 jim
Contract 12:39:21 jim
Health Information Technology for Economic and Clinical Health 12:37:06 jim
NIST 12:32:42 jim
National Institute of Standards and Technology 12:32:00 jim
Federal Information Security and Management Act 12:30:11 jim
Childrens Health Insurance Program 12:26:04 jim
IEEE 12:24:11 jim
Year 1963 12:22:55 jim
Institute of Electrical and Electronics Engineers 12:22:35 jim
ANSI 12:20:13 jim
American National Standards Institute 12:19:52 jim
United States Federal Law 12:12:48 jim
Year 2002 12:08:23 jim
ICAM 11:59:38 jim
Identity, Credential, and Access Management 11:59:23 jim IDENTITY, CREDENTIAL, & ACCESS MANAGEMENT ==> Identity, Credential, and Access Management
Web Blog_blogentry_260815_1 11:59:23 jim IDENTITY, CREDENTIAL, & ACCESS MANAGEMENT ==> Identity, Credential, and Access Management
Web Blog_blogentry_260816_1 11:50:30 jim
Federal Privacy Act 11:49:28 jim
Contract of Adhesion 11:37:51 jim
25.08.2016
API Economy 16:52:50 jim
Loosely coupled 16:12:53 jim
OperationalAttribute 03:40:13 jim
CreateTimestamp 03:38:38 jim createTimestamp ==> CreateTimestamp
DSAOperation 03:28:55 jim
RFC 3673 03:27:14 jim
24.08.2016
Account Inactivity 12:28:24 jim
Disable-accounts-after-inactivity 12:28:06 jim
ShadowInactive 12:17:38 jim
Account Expiration 12:11:40 jim
23.08.2016
LDAP Query Basic Examples 22:50:51 jim
RFC 6101 22:47:31 jim
Connection ID 22:44:23 jim
Anonymous Cipher Suite 22:40:42 jim
Replay attack 22:39:16 jim
Distributed Denial-of-Service 22:38:13 jim
Denial-of-Service 22:37:49 jim
DDoS 22:34:15 jim
DoS 22:26:43 jim
Account Lockout 22:26:24 jim
1.3.6.1.4.1.42.2.27.8.1.2 14:32:34 jim
Password Minimum Age 14:21:05 jim
Challenge-response Authentication Mechanism 13:38:21 jim
SMTP 13:35:28 jim
CRAM 13:34:36 jim
CRAM-MD5 13:33:23 jim
RFC 3647 13:32:10 jim
RFC 2195 13:19:43 jim
DIGEST-MD5 13:05:39 jim
RFC 6331 13:03:32 jim
RFC 2831 13:01:45 jim
Password Administrator 13:00:28 jim
Password Policy Administrator 13:00:13 jim
Internet Draft 12:42:37 jim
Public Key Infrastructure 12:26:54 jim
Certificate Policy 12:25:11 jim
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework 12:23:41 jim
22.08.2016
CA Directory 16:54:52 jim
Online Certificate Status Protocol 14:06:44 jim
21.08.2016
Reputation 13:52:31 jim
Reputation System 13:48:56 jim
WOT 13:27:15 jim
WebID 13:23:44 jim
RDFA-CORE 13:22:37 jim
Web Blog_blogentry_210816_1 12:22:06 jim
20.08.2016
Parameter 13:22:38 jim Parameters ==> Parameter
Web Blog_blogentry_200816_1 13:22:38 jim Parameters ==> Parameter
RFC 7797 13:21:46 jim
RFC 7519 13:18:44 jim
SET 12:50:17 jim
Security Event Token 12:48:56 jim
Transport-layer Security Mechanism 12:36:52 jim
Kerberos 12:35:22 jim
By-reference 12:34:59 jim
Trust Anchor Management Requirements 11:57:29 jim
Trust Anchor Store 11:45:41 jim
Apple 11:45:14 jim
KeyChain 11:44:22 jim
Client Send Certificate 11:13:00 jim
TLS-Finished 11:08:40 jim
ChangeCipherSpec 11:08:04 jim
CertificateVerify 11:07:44 jim
ClientKeyExchange 11:06:55 jim
ServerHelloDone 11:06:18 jim
CertificateRequest 11:05:57 jim
ServerHello 11:05:22 jim
ClientHello 11:05:05 jim
ServerCertificate 11:04:34 jim
RFC 5055 11:00:45 jim
JKS 10:58:25 jim
RFC 3447 10:35:53 jim
RFC 2347 10:35:20 jim
RFC 2313 10:34:02 jim
Verifying Certificate Signatures 10:32:13 jim
19.08.2016
Certificate Chain/certificate-chain-two.png 13:48:37 jim More details
NumericDate 13:34:41 jim
RFC 3339 13:33:55 jim Timestamps ==> Timestamp
Timestamp 13:33:55 jim Timestamps ==> Timestamp
Time 13:33:38 jim
Date 13:33:23 jim
Java Dates Timezones And Calendars 13:31:38 jim
Exp 13:23:03 jim
DxPwdMustChange 13:14:04 jim
Administrative Password Reset 13:04:42 jim Administrative Reset ==> Administrative Password Reset
SCIM Schemas Attribute 12:54:35 jim
ERROR_PASSWORD_MUST_CHANGE 12:53:19 jim
Security Identifier 12:43:30 jim
Security Token 12:41:01 jim
OAuth 2.0 Threat Model and Security Configurations 12:34:46 jim
RFC 2119 12:15:45 jim
OPTIONAL 12:11:55 jim
18.08.2016
Eyeprint ID 11:16:52 jim
17.08.2016
Entitlement parameter value 14:06:20 jim
Entitlement 13:56:06 jim
NASD 12:19:50 jim
SRO 12:18:38 jim
Self-regulatory Organization 12:18:16 jim
FINRA 12:16:43 jim
RFC 5705 11:33:01 jim
TPM 11:30:14 jim
Trusted Platform Module 11:29:56 jim
16.08.2016
Operational Risk 16:36:50 jim
SCIM Group 15:01:24 jim
Web Blog_blogentry_251015_1 01:46:41 jim
15.08.2016
HMAC-based One-Time Password Algorithm 18:14:41 jim
Web Blog_blogentry_150816_1 17:54:03 jim
Short Message Service 17:34:51 jim
Fraud 16:32:52 jim
Multiple-channel Authentication 16:16:01 jim
MCA 16:14:29 jim Mca ==> MCA
Mobile Network Code 15:55:50 jim
HNI 15:43:02 jim
PLMN 15:31:31 jim
PSTN 15:30:44 jim
Home Network Identity 15:29:07 jim
Mobile Subscriber Identification Number 14:46:10 jim
MSIN 14:42:43 jim
ICCID 14:41:38 jim Integrated Circuit Card IDentifier ==> Integrated Circuit Card Identifier
Integrated Circuit Card Identifier 14:41:37 jim Integrated Circuit Card IDentifier ==> Integrated Circuit Card Identifier
Mobile Country Code 14:40:43 jim
Code Division Multiple Access 14:39:38 jim
CDMA 14:39:15 jim
MNC 14:37:50 jim
MCC 14:04:06 jim
Universal Mobile Telecommunications System 13:42:20 jim
Universal Subscriber Identification Module 13:41:22 jim
USIM 13:39:57 jim
UICC 13:37:50 jim
Universal Integrated Circuit Card 13:37:28 jim
RIL 13:21:07 jim
Radio Interface Layer 13:20:50 jim
UMTS 13:15:16 jim
GSM 13:12:34 jim
Subscriber Identification Module 13:10:46 jim
IMSI 12:55:42 jim
MNO 12:55:02 jim
SIM 12:41:26 jim
14.08.2016
Confidentiality 13:02:40 jim
Confidential 13:01:28 jim
NT LAN Manager Vulnerabilities 12:28:23 jim
Data anonymization 12:15:50 jim
De-anonymization 12:07:22 jim
11.08.2016
Policy Based Management System 13:12:08 jim
Distributed Management Task Force 13:02:56 jim
DMTF 13:00:00 jim
Trustee 12:31:36 jim
ACL (eDirectory Attribute) 12:29:49 jim
Object ACL 12:29:06 jim
Access Control List 12:19:10 jim
Access Control Entry 12:18:33 jim
Trustor 12:15:42 jim
Evidence 11:59:47 jim
Trusted Execution Environment 11:51:53 jim
Humor 11:51:41 jim
By-value 11:36:01 jim
Passed by reference 11:31:32 jim
Request_object_encryption_alg_values_supported 11:23:34 jim Passed by value ==> By-value
Request_object_encryption_enc_values_supported 11:23:34 jim Passed by value ==> By-value
Request_uri 11:23:34 jim Passed by value ==> By-value
Secure Enclave 11:21:41 jim
Secure Element 11:19:54 jim
CAPK 11:13:24 jim
RFC 5280 10:38:00 jim
10.08.2016
OAuth state parameter 18:11:16 jim
RAML 17:54:11 jim
API Portal 17:46:14 jim
Continuous Improvement 17:39:44 jim
HTTP 16:23:26 jim
Server-side 16:06:00 jim
Client-side 16:03:29 jim
SessionData 16:02:56 jim
Stateful 15:50:32 jim
HTTP Request 15:35:31 jim
Web Storage 15:30:00 jim
Cookie 15:25:23 jim
Browser 15:22:22 jim
Informed Consent 15:21:21 jim
Tracking Cookie 15:08:11 jim
Remember Me 14:31:50 jim
Rapid-Fire Login Attempts 14:31:25 jim
ADSIedit 14:05:43 jim
Enable UserPassword in Microsoft Active Directory 14:04:40 jim
Anti-pattern 14:02:22 jim
Secret Questions 13:58:46 jim
Open Web Application Security Project 13:51:48 jim
OWASP 13:48:04 jim
Brute-Force 13:47:02 jim
ReCAPTCHA 13:17:28 jim
Active Directory Service Interfaces 12:21:41 jim
Electronic Mail 12:16:20 jim
Email 12:15:52 jim
Internet Message Format 12:14:51 jim
RFC 2822 12:12:11 jim
Security Event Log 12:04:51 jim
System Access Control List 12:04:34 jim
RFC 822 12:03:56 jim
UserPrincipalName 11:59:47 jim
DN Escape Values 11:58:29 jim
ADSI 11:55:53 jim
Access Control Entry Type 11:51:28 jim
SACL 11:49:43 jim
DACL 11:49:06 jim
Discretionary Access Control List 11:39:05 jim
09.08.2016
ACE 17:44:04 jim Access Control Entries ==> Access Control Entry
Discretionary Access Control 17:40:04 jim
RDN 16:35:43 jim
Relative Distinguished Name 16:35:02 jim
DN 16:31:19 jim
FDN 16:23:52 jim
Member Attribute 16:21:18 jim
Distributed Ledger Technology 14:25:16 jim
Transparency 14:13:51 jim
Non-Repudiation 14:13:32 jim
Auditing 14:12:06 jim
Integrity 14:11:06 jim
Governance 14:07:56 jim
Accountable 13:58:17 jim
Hyperledger Project 13:47:44 jim
CommonAccord 13:37:53 jim
Twitter Feed 13:36:52 jim
Client-server 12:41:42 jim
Session 12:34:08 jim
SessionStorage 12:16:14 jim
Token Storage 12:15:43 jim
Auth0 12:10:02 jim
Web Blog_blogentry_090816_1 11:50:01 jim
Tokenization 11:42:18 jim
08.08.2016
Web Blog_blogentry_080816_1 23:10:00 jim
SAS 70 23:03:54 jim
SOC 3 23:03:23 jim
SOC 2 23:01:47 jim
SSAE 22:45:02 jim
Service Organization Controls 22:42:37 jim
SOX 22:37:01 jim
Privilege Management Infrastructure 22:11:14 jim
Privilege Management 21:53:57 jim
SoAs 20:05:52 jim
Sources of Authority 20:05:37 jim
AA 20:03:40 jim
Attribute Authority 20:03:24 jim
AC 20:01:53 jim
RFC 5755 20:01:29 jim
Attribute Certificate 20:00:34 jim
PMI 19:20:12 jim
X.509 19:12:50 jim
Validity-Not Before 19:10:53 jim
Validity-Not After 19:10:36 jim
OAuth 2.0 Dynamic Client Registration Management Protocol 19:03:56 jim
Token_endpoint 18:56:17 jim
Token-exchange 18:55:51 jim
Resource Owner Password Credentials Grant 18:55:07 jim
OAuth 2.0 Dynamic Client Registration Protocol 18:52:11 jim
ACDC Grant type 15:27:22 jim
Client_id 15:25:45 jim Client ID ==> Client_id
CSRF Token 15:15:07 jim
Cross-site request forgery 15:14:11 jim
XSS 14:53:11 jim
Cross-site scripting 14:52:51 jim
XSRF 14:46:28 jim
CSRF 14:46:17 jim
Grant_type 14:40:09 jim
Authorization Code 14:31:41 jim
07.08.2016
EntryUUID 21:47:10 jim
Lightweight Directory Access Protocol (LDAP) entryUUID Operational Attribute 21:46:45 jim
RFC 4530 21:44:13 jim
RFC-4517 21:36:53 jim
RFC-4520 21:36:07 jim
LDAPSyntaxes 21:34:44 jim
Object Class Description 21:29:59 jim
Numeric String 21:29:24 jim
Name Form Description 21:28:42 jim
Matching Rule Use Description 21:28:08 jim
Matching Rule Description 21:27:44 jim
Enhanced Guide 21:27:23 jim
DIT Structure Rule Description 21:27:12 jim
DIT Content Rule Description 21:26:35 jim
CaseExactSubstringsMatch 21:22:25 jim
CaseExactOrderingMatch 21:22:03 jim
SYNTAX 21:21:00 jim Telephone Number ==> Telephone Number LDAP Syntax
Telephone Number LDAP Syntax 21:21:00 jim Telephone Number ==> Telephone Number LDAP Syntax
CaseExactMatch 21:20:49 jim
2.5.4.20 21:14:37 jim
TelephoneNumber 21:13:17 jim
06.08.2016
DUAConfigProfileProfileAttributes 13:23:33 jim
PreferredServerList 13:22:51 jim
A Configuration Profile Schema for Lightweight Directory Access Protocol (LDAP)-Based Agents 12:45:18 jim
DUAConfigProfile 12:44:47 jim
RFC 4876 12:41:06 jim
LabeledUri 12:39:06 jim
RFC 2079 12:33:12 jim
RFC 1779 12:30:50 jim
RFC 6151 12:30:07 jim
Cryptography 12:28:21 jim Message Digest ==> Message-Digest
MD4 12:28:21 jim Message Digest ==> Message-Digest
MD5 12:28:21 jim Message Digest ==> Message-Digest
Message-Digest 12:28:21 jim Message Digest ==> Message-Digest
RFC 1321 12:28:21 jim Message Digest ==> Message-Digest
SHA384 12:28:21 jim Message Digest ==> Message-Digest
SHA512 12:28:21 jim Message Digest ==> Message-Digest
Year 1956 12:23:01 jim
Year 1947 12:22:37 jim
Year 1865 12:22:16 jim
TSB 12:21:33 jim
Telecommunication Standardization Bureau 12:21:12 jim
International Telegraph and Telephone Consultative Committee 12:19:04 jim
CCITT 12:17:47 jim
X.400 12:15:06 jim
International Telegraph Union 12:13:06 jim
International Telecommunication Union 12:12:34 jim
ITU Telecommunication Standardization Sector 12:11:59 jim
ITU-T 12:08:55 jim
RFC 4524 12:07:59 jim
Year 1977 12:07:05 jim
OSI 12:06:37 jim
ISO 12:05:59 jim
International Organization for Standardization 12:05:21 jim
Open Systems Interconnection 12:02:53 jim
Cooperation for Open Systems Interconnection Networking in Europe 12:00:48 jim
COSINE 11:57:02 jim
The COSINE and Internet X.500 Schema 11:53:28 jim
Inter-Process Communication 11:49:56 jim
Using LDAP over IPC Mechanisms 11:46:42 jim
Draft-chu-ldap-ldapi-00 11:46:37 jim
IPC 11:43:21 jim
LDAPI 11:42:31 jim
RFC 1274 11:37:23 jim
LDAP Server Standards and Specifications 11:35:35 jim
05.08.2016
Server Authentication Module 12:52:44 jim
SAM 12:46:25 jim
Java 12:43:20 jim
J2EE 12:43:01 jim
Java Platform, Enterprise Edition 12:42:22 jim
Java EE 12:40:46 jim
JASPIC 12:39:50 jim
Java Authentication Service Provider Interface for Containers 12:39:27 jim
Web Blog_blogentry_050816_1 12:33:50 jim
04.08.2016
Patch Cable 16:35:33 jim
Patch Cable/modular_plugs_wiring configuration.pdf 16:34:15 jim Wiring Configurations for Modular Plugs
PC Hardware Cables 16:22:32 jim
SID 15:04:36 jim
Microsoft Active Directory 14:56:06 jim
Microsoft Response Codes 14:11:19 jim
RFC 6649 13:51:02 jim
Best Current Practice 13:50:13 jim
RFC 3406 13:49:32 jim
Merkle Tree 13:41:23 jim
B-tree file system 13:40:09 jim
Btrfs 13:39:16 jim
Tahoe Least-Authority File Store 13:38:18 jim
Tahoe-LAFS 13:37:37 jim
IPFS 13:20:37 jim InterPlanetary File System ==> Inter-Planetary File System
Web Blog_blogentry_070316_1 13:20:37 jim InterPlanetary File System ==> Inter-Planetary File System
WILL_NOT_PERFORM 12:39:08 jim
HTML Colour Names 12:38:44 jim
LDIF eDirectory Indexes 12:37:38 jim
SystemFlags 12:36:25 jim
Ldapsearch Networkaddress 12:35:55 jim
ERROR_PASSWORD_RESTRICTION 12:32:17 jim
PASSWD_NOTREQD 12:31:50 jim
2.16.840.1.113719.1.203.4.33 12:29:54 jim
Hexadecimal 12:29:12 jim
Base 16 12:27:06 jim
Hex 12:26:48 jim
HEX 12:22:05 jim
ATTRIBUTE ALREADY EXISTS (-615) 12:21:38 jim
03.08.2016
Microsoft Active Directory Anomalies 12:40:56 jim
JSON Web Tokens 12:39:26 jim
Custom URI scheme 12:38:02 jim
SQL Calls From Driver (Publisher Channel) 12:37:10 jim
Unique Value Finder with Driver 12:36:53 jim
OID 12:36:24 jim
SCIM Attribute Extensions to Resources 12:35:56 jim
SAML Assertions 12:35:00 jim
MAD LDAP Client 12:33:11 jim
Schema Mapping Policy 12:31:41 jim
DirXML Calling Custom Java Functions 12:30:48 jim
Identity Vault namespace 12:29:41 jim
SAML Attribute Statement 12:28:32 jim
Public Claim Names 12:27:59 jim
An IETF URN Sub-Namespace for OAuth 12:27:28 jim
DirXML Script namespace definitions 12:26:14 jim
Namespace Identifier 12:24:31 jim
Application namespace 12:23:17 jim
XML namespace 12:21:22 jim
NID 12:09:29 jim
URC 12:01:34 jim
Uniform Resource Characteristics 12:01:19 jim
Backus Normal Form 12:00:43 jim
BNF 11:58:16 jim
World Wide Web Consortium 11:56:50 jim
W3C 11:56:28 jim
RDF 11:54:37 jim
Resource Description Framework 11:54:17 jim
RFC 6648 11:49:10 jim
RFC 1737 11:48:16 jim
RFC 2141 11:47:20 jim
RFC 3986 11:39:16 jim
URN 11:35:13 jim
RFC 1738 11:29:33 jim
Uniform Resource Locator 11:25:42 jim Uniform Resource Locator (URL) ==> Uniform Resource Locator
02.08.2016
Private data 11:34:57 jim
National Security 11:20:18 jim
Consent_required 11:10:17 jim
Consent Receipts 11:09:23 jim
Data Privacy 10:49:41 jim
Sourced 10:42:20 jim
Derived 10:40:20 jim
Self-Asserted 10:38:36 jim
Authoritative 10:37:13 jim
authoritative 10:35:07 jim
Authoritative Entity 10:32:28 jim
Data Currency 10:18:12 jim
Data Accuracy 08:45:28 jim
Metadata 08:34:02 jim
APS 08:00:30 jim
Attribute Provider Statement 08:00:03 jim
Relying Party 07:58:22 jim
CSP 07:54:27 jim
Web Blog_blogentry_020816_1 07:50:58 jim
31.07.2016
Web Blog_blogentry_310716_1 13:53:10 jim
Self-Sovereign Identity 13:46:58 jim
Domain of OneS Own 13:08:31 jim
Domain of OneS Own/Sovereign-source Identity.png 13:07:29 jim Sovereign-source Identity
Domain of OneS Own/Traditional Identity Store.png 13:07:06 jim Traditional Data Store
Bob/bob.png 13:03:24 jim Bob
Alice/alice.png 13:02:25 jim Alice
DoOO 12:25:14 jim
Database Management System 12:05:56 jim
DBMS 12:04:25 jim
Database 12:03:09 jim
Data Store 11:57:57 jim
Year 2012 11:47:33 jim
Cryptographic Hash Function 11:36:57 jim
Ralph Merkle 11:31:11 jim
Diffie-Hellman 11:27:54 jim
Year 1979 11:25:21 jim
Leaf 11:24:43 jim
Non-leaf 11:23:23 jim
DAO 10:38:36 jim
Permissioned Systems 10:29:46 jim
Unpermissioned System 10:22:56 jim
DLT 10:06:30 jim
Smart contracts 09:31:42 jim
Blockchain 2.0 09:26:45 jim
30.07.2016
X.501 22:41:56 jim
NAME 22:25:22 jim
Numericoid 22:24:25 jim
Name Form 22:23:23 jim
Cardholder Name 22:02:32 jim
Extended Flags 21:56:59 jim
DESC 21:54:11 jim
ActiveDirectorySchemaChanges 21:37:04 jim
MatchingRule 21:27:11 jim
LDAP_UNDEFINED_TYPE 21:24:01 jim LDAPSchema ==> LDAP Schema
Netlogon attribute 21:24:01 jim LDAPSchema ==> LDAP Schema
Apple Directory 21:24:00 jim LDAPSchema ==> LDAP Schema
UnderstandingSchemaInOpenDS 21:14:51 jim
UnderstandingDITStructureRules 21:09:46 jim
UnderstandingMatchingRuleUses 21:00:38 jim
Certificate Management Protocol 20:56:43 jim
Guide LDAPSyntax 20:55:25 jim Guide ==> Guide LDAPSyntax
VendorName 20:51:41 jim
SslEnableMutualAuthentication 20:51:31 jim
SeeAlso 20:50:53 jim
SambaLMPassword 20:50:42 jim
SamAccountName 20:50:14 jim
Reference 20:50:01 jim
Owner 20:49:33 jim
ModifyTimestamp 20:47:46 jim
MacAddress 20:47:33 jim
LoginDisabled 20:47:10 jim
GidNumber 20:46:47 jim
Gender 20:46:29 jim
DirXML-NTAccountName 20:45:43 jim
AltServer 20:45:03 jim
GivenName 20:44:35 jim
OBSOLETE flag 20:43:58 jim
Obsolete 20:39:20 jim
OBSOLETE 20:39:04 jim
Deprecated 20:36:11 jim
LDAPS 20:31:27 jim
RFC 6962 10:42:33 jim
27.07.2016
Biometric data 18:35:31 jim
Behavioral Characteristics 18:06:52 jim
Physiological Characteristics 17:56:28 jim
Microsoft Developer Network 17:33:45 jim
MSDN 17:32:53 jim
PIN 17:30:24 jim
Personal Identification Number 17:28:57 jim
TimBL 15:36:20 jim
Tim Berners-Lee 15:36:02 jim
WWW 15:34:02 jim
University of Michigan 15:32:40 jim
Year 1988 15:27:07 jim
Directory Access Protocol 15:26:24 jim
DAP 15:24:56 jim
Directory Service 15:23:57 jim
Request For Comment 15:22:47 jim
Which Jane Doe 14:40:14 jim
SDK 13:57:34 jim
GLBA 13:49:51 jim Gramm-Leach-Bliley ==> Gramm-Leach-Bliley Act
Personal Information Protection and Electronic Documents Act 13:45:50 jim
PIPEDA 13:43:38 jim
Homeland Security Presidential Directive 12 13:39:27 jim
HSPD-12 13:37:56 jim
FIPS 201 13:36:44 jim
FIPS 13:34:43 jim
Public data 13:27:11 jim
Family Educational Rights and Privacy Act 12:51:11 jim
FERPA 12:49:11 jim
RFC 4370 12:26:15 jim
Best Practices for LDAP Security 12:25:07 jim
ISO 27000 12:23:34 jim
26.07.2016
SizeLimit 18:26:15 jim
OpenID Connect Profile for SCIM Services 14:50:21 jim
Web Blog_blogentry_260716_1 14:43:22 jim
Enterprise Cloud Subscriber 14:41:08 jim
Community of Interest 14:38:30 jim
Joiner 14:36:05 jim
Human Resource Management 14:35:45 jim
Human Resource Asset 14:35:29 jim
Cloud Service User 14:33:21 jim
JML 14:26:16 jim
Human Resources 14:25:50 jim
HR 14:24:47 jim
HRM 14:22:03 jim
Leavers 13:48:42 jim
Movers 13:48:28 jim
SCIM Use Cases 12:44:18 jim
Custom Authentication Class 12:36:30 jim
Identity Injection Process 12:34:37 jim
User Store 12:32:25 jim
NAM Different Login Methods or Pages 12:32:05 jim
Identity Data Store 12:30:19 jim
JIT 12:02:48 jim
ECS 11:58:48 jim
CSU 11:56:09 jim
Cloud Service Provider 11:53:21 jim
COI 11:49:59 jim
SCIM 2.0 11:44:18 jim
24.07.2016
ControlValue 13:13:16 jim
Criticality 13:12:36 jim
ControlType 13:11:30 jim
1.3.6.1.1.21.4 13:07:35 jim
Aborted Transaction Notice 13:07:05 jim
End Transaction Response 13:05:59 jim
End Transaction Request 13:01:29 jim
1.3.6.1.1.21.2 12:58:07 jim
Transaction Specification Control 12:57:02 jim
RequestName 12:53:28 jim
RequestValue 12:52:48 jim
Extended Request 12:51:06 jim
Start Transaction Request 12:50:16 jim
Start Transaction Response 12:49:35 jim
ResponseValue 12:49:08 jim
ResponseName 12:48:41 jim
Extended Response 12:47:52 jim
1.3.6.1.1.21.1 12:43:31 jim
RFC 5805 12:37:11 jim
Atomicity 12:31:26 jim
ACID 12:30:05 jim
Durability 12:26:35 jim
Isolation 12:24:28 jim
Consistency 12:22:51 jim
Modify Request 12:19:34 jim
Atomic 12:18:27 jim
Modify Response 12:10:36 jim
Directory Information Tree 12:01:50 jim
Directory Information Base 12:01:02 jim
23.07.2016
Kurt Zeilenga 12:40:38 jim
Isode Limited 12:37:45 jim
Instant messaging 12:36:00 jim
Availability 12:33:52 jim
Presence 12:31:09 jim
Extensible Messaging and Presence Protocol 12:30:18 jim
XMPP 12:28:24 jim
Constrained Application Protocol 12:24:17 jim
O 12:13:47 jim
2.5.6.14 12:12:41 jim
OrganizationalUnit 12:12:00 jim
Ou 12:10:26 jim
Personal Entity 11:47:44 jim
TBD 11:35:16 jim
Main 11:28:47 jim
About 11:25:17 jim
22.07.2016
TelephoneNumberMatch 14:41:12 jim
2.5.4.17 14:39:59 jim
PostalCode 14:39:10 jim
Dmd 14:34:06 jim
DmdName 14:26:57 jim dmdName ==> DmdName
EQUALITY 13:51:55 jim
IntegerMatch 13:47:12 jim
APPROXIMATE 13:36:18 jim
SCIM Schema 13:29:49 jim
Publisher Event Log 13:26:16 jim
Resource Access Control Facility 13:21:53 jim
OpenID Connect Claims 13:20:31 jim
SCIM Sorting 13:19:06 jim
CaseIgnoreSubstringsMatch 13:09:17 jim
CaseIgnoreMatch 13:08:50 jim
BooleanMatch 13:03:18 jim
Case-insensitive 12:57:16 jim
Case-sensitive 12:56:59 jim
Case Sensitivity 12:50:28 jim
SOAPDSMLDriver 12:49:00 jim
Multipurpose Internet Mail Extensions 12:46:32 jim
RFC 6532 12:46:27 jim
RFC 5335 12:45:49 jim
RFC 2231 12:45:02 jim
RFC 2184 12:44:16 jim
RFC 2045 12:42:15 jim
MIME 12:39:36 jim
RFC 5322 12:37:13 jim
RFC 7230 12:30:28 jim
Well-known 12:27:22 jim
RFC 5785 12:25:52 jim
RFC 2817 12:24:33 jim
HTTP Over TLS 12:21:12 jim
RFC 2818 12:18:26 jim
RFC 6125 12:15:57 jim
RFC 4945 12:14:30 jim
JWK Set 12:13:22 jim
LDAPPasswordsFor8.7.3.x 12:06:07 jim
LDAP Query Advanced Examples 12:03:53 jim
LDAP filters Syntax and Choices 12:03:46 jim
JDBC-Driver-Status-Column 12:00:28 jim
Ndsenvlocal 11:56:59 jim
JWT ID 11:56:30 jim
Jti 11:56:14 jim
Iss 11:54:50 jim
Amr 11:54:19 jim
Aud 11:53:48 jim
NDSD_TRY_NMASLOGIN_FIRST 11:53:13 jim
SFSafariViewController 05:14:08 jim
OAuth 2.0 for Native Apps 05:13:11 jim
Chrome Custom Tabs 05:01:27 jim
21.07.2016
CIA 17:00:37 jim
Cryptography Objectives 16:59:22 jim
JWT Data Exchange 16:46:26 jim
JWT Authentication 16:30:24 jim
Authentication cookie 16:14:02 jim
LocalStorage 16:10:53 jim
20.07.2016
Claims Data 15:26:06 jim
Health Data Set 15:16:55 jim
Personal Health Record 14:57:11 jim
18.07.2016
EDirectory Privileges 14:39:07 jim
17.07.2016
1.3.6.1.1.1.1.22 13:28:40 jim
A-GPS 13:20:23 jim
Assisted GPS 13:20:06 jim
Global Positioning System 13:18:06 jim
MAC Address 13:13:03 jim
Media Access Control Address 13:12:48 jim
Wi-Fi Positioning System 13:09:02 jim
WPS 13:07:01 jim
Wireless Network 13:06:19 jim
Geolocation 12:52:06 jim
GLONASS 12:46:55 jim
GPS 12:45:43 jim
IPA 12:28:08 jim
16.07.2016
Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos 12:19:55 jim
15.07.2016
ISO 7812 13:13:46 jim
IIN 13:11:13 jim
Bank Card Number 13:10:50 jim
MII 13:10:24 jim
PCI DSS 12:53:16 jim
PCI 12:43:17 jim
Payment Card 12:38:54 jim
Payment Card/payment-card-front.jpg 12:36:42 jim Payment Card
PCI DATA 12:25:14 jim
Payment Card Industry Security Standards Council 12:22:31 jim
PCI SSC 12:19:42 jim
Real Risk 12:19:06 jim
RFC 3494 12:00:30 jim
RFC 1778 11:59:21 jim
RFC 1484 11:55:37 jim
14.07.2016
Year 2003 13:33:15 jim
LDAPv2 13:32:57 jim
Lightweight Directory Access Protocol version 2 (LDAPv2) to Historic Status 13:32:23 jim
Bind Authentication Method 13:25:58 jim
RFC 4513 13:15:09 jim
Bind Request 13:04:02 jim
LDAP ModifyRequest Operations 12:59:30 jim
Replace Modification-type 12:55:15 jim
LDAP Modify-Increment Extension 12:53:45 jim
Delete Modification-type 12:52:15 jim
ChangeType 12:51:54 jim
Add Modification-type 12:51:10 jim
1.3.6.1.4.1.1466.115.121.1.41 12:42:41 jim
LDAP Message 12:39:17 jim
LDAP Protocol Mechanisms 12:35:44 jim
ModifyDNRequest 12:24:02 jim
LDIF Example 12:07:05 jim LDIF Examples ==> LDIF Example
NewSuperior 11:55:10 jim
NewRDN 11:54:17 jim
DeleteOldRDN 11:51:24 jim
2.16.840.1.113730.3.1.35 11:48:53 jim
ChangeLogEntry 11:44:32 jim
2.16.840.1.113730.3.2.1 11:43:29 jim
Changes 11:42:50 jim
ChangeNumber 11:32:25 jim
TargetDN 11:27:46 jim
Modrdn 11:05:32 jim Deleteoldrdn ==> DeleteOldRDN
Definition of an Object Class to Hold LDAP Change Records 11:01:00 jim
Draft-good-ldap-changelog 10:57:50 jim
A Schema for Logging the LDAP Protocol 10:45:17 jim
Draft-chu-ldap-logschema-00.txt 10:43:00 jim
Web Blog_blogentry_140716_1 10:34:23 jim
Lightweight Directory Access Protocol (LDAP) Content Synchronization Operation 10:32:53 jim
RFC 4533 10:30:43 jim
13.07.2016
JNDI Utilities Class 18:06:10 jim
Basic JNDI Search with Administration Account 18:05:44 jim
Common JNDI LDAP Methods 18:05:18 jim
Using LDAPS With JNDI 18:04:43 jim
JNDIApis 18:04:05 jim
JNDI Examples 18:02:12 jim
Java Naming and Directory Interface 18:00:15 jim
12.07.2016
Internet 15:54:36 jim
Arpanet 15:54:23 jim
Year 2011 15:51:23 jim
Year 2010 15:51:19 jim
Year 2007 15:51:15 jim
Year 2006 15:50:51 jim
Year 2004 15:50:47 jim
Year 2000 15:50:42 jim
Year 1999 15:50:37 jim
Year 1997 15:50:33 jim
Year 1996 15:50:29 jim
Year 1993 15:49:59 jim
Year 1992 15:49:54 jim
Year 1991 15:49:50 jim
Year 1990 15:49:21 jim
Year 1989 15:49:17 jim
Year 1986 15:49:13 jim
Year 1984 15:48:44 jim
Year 1982 15:48:39 jim
Year 1973 15:48:35 jim
Year 1969 15:48:29 jim
Year 2014 15:37:40 jim
Year 2013 15:37:35 jim
Year 2009 15:37:30 jim
Year 2008 15:37:22 jim
Year 2005 15:37:08 jim
Year 2001 15:36:56 jim
Year 1998 15:36:43 jim
Year 1883 15:36:35 jim
Year 1981 15:36:26 jim
Year 1976 15:36:14 jim
Year 2016 15:31:00 jim
Year 2017 15:30:25 jim
Year 1995 15:29:30 jim
Year 2015 15:29:10 jim
EU 15:14:08 jim
Regulation 15:13:29 jim
European Union 15:05:39 jim
System Metrics 14:51:30 jim
Business Metrics 14:42:08 jim
External Metrics 14:40:48 jim
Internal Metrics 14:37:37 jim
Notification 14:32:02 jim
Alerting 14:31:21 jim
Anomaly Detection 14:29:57 jim
Dashboard 14:28:22 jim
CEP 14:19:41 jim
Metric Analysis 14:14:22 jim
EventMonitoring 13:56:21 jim
MonitoringDesign 13:53:35 jim
LDAP Monitor 13:52:32 jim
LDAP Metrics 13:48:49 jim
LDAP Monitoring Overview 13:48:24 jim StatisticsGathering ==> LDAP Metrics
LDAPMonitorLogging 13:48:24 jim StatisticsGathering ==> LDAP Metrics
Monitoring 13:35:19 jim
10.07.2016
Student data 13:28:13 jim
Date Form 13:24:36 jim
Expiration Date 13:23:29 jim
Last Name 13:22:05 jim
First Name 13:21:29 jim
PAN 13:14:32 jim
Primary Account Number 13:14:14 jim
Customer data 13:04:43 jim
Employee data 12:56:20 jim
Protected Health Information 12:40:07 jim
Personal data 12:37:53 jim
Compliance 12:29:10 jim Standard Compliance ==> Standard compliance
Regulatory compliance 12:20:27 jim
Web Blog_blogentry_100716_1 12:02:11 jim
Risk-Based Authentication 11:56:53 jim
UEBA 11:51:33 jim
User and Entity Behavior Analytics 11:51:10 jim
Adaptive Risk 11:47:00 jim
Context Based Access Control 11:45:54 jim
Adaptive Policy-based Access Management 11:30:27 jim
09.07.2016
Grant Types