These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time here is 22:58 on 29-Mar-2017.

24.03.2017
Trustmark Scheme 12:48:11 jim
Web Blog_blogentry_170816_1 12:24:13 jim
Token Binding Protocol Negotiation 12:21:50 jim
Token Binding over HTTP 12:14:58 jim
Token Binding ID 12:14:42 jim
Sec-Token-Binding 12:14:24 jim
Token Binding Protocol 12:13:45 jim The Token Binding Protocol ==> Token Binding Protocol
Token Consumer 11:56:20 jim
Token Provider 11:55:31 jim
Web Blog_blogentry_240317_1 09:42:37 jim
General Data Protection Regulation 09:13:57 jim
20.03.2017
Certificate Validation Tools 13:42:17 jim
Badssl.com 13:39:03 jim
TLS Proxy 13:36:34 jim
HTTPS Inspection 13:28:15 jim
Authentication 13:13:06 jim
ISO 24745 13:09:14 jim
NIST.SP.800-63B 12:40:23 jim
Inherence Factor 12:36:37 jim
Presentation Attack Detection 12:35:32 jim
Presentation Attack 12:34:55 jim
PAD 12:27:26 jim
Level Of Assurance 12:22:29 jim
Authenticator Assurance Levels 12:10:25 jim
AAL 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
Federation Models 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
What is missing in OAuth 2.0 12:05:39 jim Authentication Assurance Level ==> Authenticator Assurance Levels
Biometric Token 11:50:10 jim
Biometric 11:48:36 jim
Someplace You Are 11:21:30 jim
Something You Do 11:20:12 jim
Authentication Factor 10:54:59 jim
Sensitive Authentication Data 10:35:59 jim
Cardholder Data 10:25:30 jim
Payment Card Industry Data Security Standard 10:20:52 jim
Multi-Factor Authentication 10:07:35 jim
CDE 09:59:25 jim
Cardholder Data Environment 09:58:40 jim
18.03.2017
OAuth 2.0 Token Exchange 15:16:04 jim
May_act (May Act For) Claim 15:14:57 jim
Cid (Client Identifier) Claim 15:09:25 jim
Scp (Scopes) Claim 15:06:11 jim
Act (Actor) Claim 15:02:01 jim
Authentication Double-Hop 14:50:04 jim
OAuth 2.0 12:30:17 jim
Logout Process 12:29:08 jim
Access Token 12:08:04 jim
Delegation vs Impersonation 10:09:29 jim
Web Blog_blogentry_180317_1 09:55:11 jim
Client Application 09:43:43 jim
Web Authentication 09:26:59 jim
LDAP Authentication 09:22:34 jim
Password Manager 09:15:18 jim
Password Vault 09:14:16 jim
16.03.2017
Best Practices For Unique Identifiers 15:21:03 jim
AICPA 12:41:28 jim
SSAE 16 12:41:03 jim
American Institute of Certified Public Accountants 12:40:03 jim
Statement on Standards for Attestation Engagements 12:13:08 jim
SOC 1 12:08:42 jim
15.03.2017
RFC 7301 08:36:06 jim
Application-Layer Protocol Negotiation 08:27:39 jim
ALPN 08:25:58 jim
14.03.2017
Acr_values 11:21:37 jim
Authentication Context Class Reference 11:17:42 jim
Mobile Station International Subscriber Directory Number 11:08:16 jim
International Mobile Subscriber Identity 11:03:43 jim
Essential Claim 08:50:27 jim
Voluntary Claim 08:48:54 jim
Acr 08:41:43 jim
13.03.2017
Social Login 11:34:26 jim
Social Identity Provider 11:32:52 jim
12.03.2017
GraphQL schema language 10:55:20 jim
GraphQL 10:48:53 jim
GraphQL Server 10:46:44 jim
GraphQL Client 10:33:11 jim
GraphQL/graphQL-architecutre.png 09:29:38 jim GraphQL-architecture
The Open Group 09:26:09 jim
Representational State Transfer 09:09:38 jim
Create Read Update Delete 09:06:19 jim
HTTP Method 09:05:32 jim
1990s 08:59:27 jim
Unix 08:57:58 jim
Common Vulnerabilities and Exposures 08:55:06 jim
1970s 08:52:28 jim
MacOS 08:50:03 jim
Santa Cruz Operation 08:47:57 jim
SCO 08:46:53 jim
UNIX History and More 08:44:19 jim
UNIX 08:30:25 jim
Open Software Foundation 08:29:15 jim
Distributed Computing Environment 08:27:16 jim
DCE 08:20:55 jim
Interface Description Language 08:19:10 jim
Interface Definition Language 08:18:39 jim
IDL 08:17:35 jim
Hypermedia As The Engine Of Application State 08:13:58 jim
HATEOAS 08:10:16 jim
08.03.2017
Anonymity 17:52:48 jim
Web Blog_blogentry_080317_1 17:50:02 jim
Password Statistics 16:50:03 jim
B003281 16:37:22 jim
Week 12:01:14 jim
Seconds 11:58:48 jim
Millisecond 11:55:07 jim
Year 11:45:28 jim
Unix Epoch 11:44:11 jim
MacOS Epoch 11:42:07 jim
Time And Epochs 11:35:28 jim
Epoch 11:32:51 jim
Tick 11:31:15 jim
AccountExpires 11:29:34 jim Ticks ==> Tick
Instruction cycle 11:29:24 jim
Year 1904 11:26:12 jim
DirXML Code Snippets 11:24:37 jim Minutes ==> Minute
Minute 11:24:37 jim Minutes ==> Minute
Hour 11:24:10 jim Hours ==> Hour
Day 11:23:44 jim Days ==> Day
Year 1582 11:19:28 jim
Nanosecond 11:19:03 jim
Unix Time 11:15:08 jim
TimeLimit 11:14:37 jim
TimeBeforeExpiration 11:14:25 jim
Time-based One-time Password Algorithm 11:14:06 jim
SearchRequest 11:13:52 jim
SYNC PANE ENTRIES EVAL 11:13:34 jim
PwdMinDelay 11:13:18 jim
PwdMinAge 11:12:58 jim
PwdMaxIdle 11:12:41 jim
PwdMaxDelay 11:12:05 jim
PwdMaxAge 11:11:42 jim
PwdLockoutDuration 11:11:17 jim
PwdGraceExpiry 11:10:57 jim
PwdFailureCountInterval 11:10:22 jim
PwdExpireWarning 11:10:01 jim
LowConvergenceSyncInterval 11:09:33 jim
LdapServerIdleTimeout 11:09:16 jim
LOGIN DELAY ENABLE 11:08:59 jim
Heartbeat Synchronization 11:08:43 jim
FAILED AUTH DELAY 11:08:30 jim
Expires_in 11:08:18 jim
DxPwdFailedTime 11:07:28 jim
Cachecleanupinterval 11:07:10 jim
Cacheadjustinterval 11:06:49 jim
Cache-Control 11:06:39 jim
Account Usability Request Control 11:05:58 jim
Java Time 11:04:02 jim Milliseconds ==> Millisecond
LargeInteger 10:55:38 jim
Year 1601 10:50:24 jim
Microsoft TIME 10:49:56 jim
DateTime 10:24:44 jim
2,147,483,647 10:23:01 jim
ShadowLastChange 10:21:45 jim
NdsServerIntTable 10:20:01 jim
Shadow 10:18:50 jim
Token Introspection Endpoint 10:17:37 jim
Year 1972 10:13:47 jim
Leap seconds 10:13:14 jim
UTC 10:10:17 jim
Coordinated Universal Time 10:09:29 jim
POSIX time 09:56:21 jim
Digital Identity 01:13:39 jim
Identity Attributes 00:59:54 jim
Attribute 00:58:14 jim
07.03.2017
Login_hint_token 12:53:28 jim
Binding_message 12:50:23 jim
OpenID Connect MODRNA Authentication Profile 1.0 12:49:23 jim
NetworkAddress 12:42:11 jim
Internet Protocol Address 12:40:38 jim
IP-Address 12:39:28 jim
OpenID Connect Mobile Discovery Profile 12:39:07 jim
Account Chooser 12:23:57 jim
OpenID.Discovery 11:04:34 jim
UTMS 10:56:04 jim
MSISDN 10:51:10 jim
MODRNA.Discovery 10:43:07 jim
OpenID.Core 10:23:50 jim
MODRNA 10:23:24 jim
Web Blog_blogentry_070317_1 10:10:27 jim
OpenID Connect Account Porting 10:08:50 jim
Mobile Connect 10:06:48 jim
GSMA 10:06:21 jim
05.03.2017
Standards Based SSO 09:27:53 jim
03.03.2017
API Planing 08:57:43 jim
LeftMenu 08:48:21 jim
OAuth 2.0 Use Cases 08:46:19 jim
Public API 08:10:10 jim
Partner API 08:09:53 jim
Internal API 08:09:33 jim
API Consumer 08:05:40 jim
API Provider 08:05:00 jim
02.03.2017
TLS Full Handshake 16:26:28 jim
TLS Full Handshake/tls13-hs-ecdhe.png 16:12:43 jim Improved Handshakes in TLS version 1.3
0-RTT Handshakes 16:10:35 jim
Ephemeral Key 15:53:13 jim
TLS 1.3 15:40:54 jim
TLS Session Resumption 15:38:10 jim
Pre-Shared Key 15:32:23 jim
TLS Renegotiation 14:35:30 jim
Transport Layer Security (TLS) Renegotiation Indication Extension 14:35:04 jim
RFC 5869 14:07:41 jim
HMAC-based Extract-and-Expand Key Derivation Function 14:07:02 jim
HKDF 14:05:04 jim
RFC 3874 14:03:57 jim
SHA-224 14:03:10 jim
EdDSA 14:01:06 jim
Ed25519 14:00:32 jim
Edwards-curve Digital Signature Algorithm 13:59:42 jim
Transport Layer Security 13:44:15 jim
Data Loss Prevention 12:57:27 jim
DLP 12:52:05 jim
Azure 12:48:27 jim
Data Classification 12:45:03 jim
01.03.2017
Web Blog_blogentry_010317_1 16:45:02 jim
Identity and Access Management 13:14:40 jim
Identity State 13:14:16 jim

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-2) was last changed on 26-Jul-2014 09:01 by 71.0.193.131