These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time here is 16:05 on 23-Feb-2017.

21.02.2017
Authentication 17:09:42 jim
Level Of Assurance 16:52:52 jim
ISO 29115 16:49:26 jim
Common Access Card 16:37:41 jim
CAC 16:36:56 jim
Credential 16:31:41 jim
Authentication Assurance Level 16:23:28 jim
Identity Proofing 16:17:46 jim
Credential Service Provider 16:10:16 jim
Authenticator 16:06:46 jim
Claimant 16:05:30 jim
Identity Assurance Level 15:55:50 jim
Vectors of Trust 15:29:40 jim
M-04-04 Level of Assurance (LOA) 15:16:10 jim
NIST Electronic Authentication Guideline 15:15:28 jim
Identity Trust Framework 15:13:21 jim
Trust Framework 15:12:10 jim
Web Blog_blogentry_210217_1 15:03:09 jim
VoT 14:59:02 jim
AAL 14:38:09 jim
FAL 14:37:37 jim
Federation Assurance Level 14:37:19 jim
FAL 2 14:35:38 jim
FAL 3 14:34:59 jim
FAL 1 14:29:15 jim
Holder-of-Key 12:20:29 jim
Bearer 12:19:07 jim
Federation Models 11:49:07 jim
Federation 11:26:28 jim
Federation/federation.png 11:22:27 jim Federation Image
Assertion 11:19:23 jim
NIST.SP.800-63C 11:17:25 jim
NIST.SP.800-63A 11:14:13 jim
NIST.SP.800-63B 11:13:00 jim
Authenticated Protected Channel 11:09:43 jim
BCP 195 11:09:08 jim
Best Practices Password 10:49:55 jim
Identity questions 10:43:52 jim
Password Periodic Changes 10:17:15 jim
Password Dictionary 10:16:20 jim
Passwords Composition 09:59:33 jim
Password Grace Authentication 09:43:18 jim
Password Expiration 09:42:34 jim
20.02.2017
Web Blog_blogentry_200217_2 18:05:53 jim
Web Blog_blogentry_200217_2/rest-ahead.jpg 18:04:52 jim REST Ahead
Authorization 17:52:16 jim
AuthZ 17:51:52 jim
Industry 4.0 17:38:29 jim
Industry 4.0/Industry-4-framework.jpg 17:32:35 jim industry 4.0 Framework and Contributing digital technologies
Cloud computing 17:31:08 jim
OAuth 2.0 15:14:49 jim
OAuth 2.0 Use Cases 15:07:23 jim
Linux 15:02:31 jim
Unix 14:59:12 jim
Domain Logic 14:57:04 jim
Business Logic 14:51:39 jim
Smart endpoints and dumb pipes 14:50:13 jim
Microservice 14:46:38 jim
UI 14:41:13 jim
User Interface 14:40:53 jim
Application Layer 14:40:03 jim
Internet protocol suite 14:38:19 jim
DoD 14:36:59 jim
NetWare 14:23:12 jim
NIS 14:20:57 jim
Phone Line 14:18:30 jim
Secure connection 14:17:23 jim
Peer-to-peer 14:15:05 jim
Internet Protocol 14:14:44 jim
Multicast 14:13:42 jim
Wireless Access Point 14:12:15 jim
A look at the Network Cable standards 14:11:58 jim
Public Switched Telephone Network 14:10:43 jim
Network Basic Input-Output System 14:09:41 jim
Virtual Private Network 14:08:25 jim
NetworkAddress 14:07:00 jim
Mobile Network Operators 14:04:48 jim
Mobile Network 14:03:41 jim
Public Land Mobile Network 14:03:22 jim
Payment Network 14:01:18 jim
Network Cables 14:00:12 jim
Year 1994 13:55:36 jim
Intranet 13:55:14 jim
WAN 13:53:00 jim
Wide Area Network 13:52:42 jim
Local Area Network 13:49:18 jim
LAN 13:48:41 jim
Network 13:45:59 jim
Extranet 13:44:01 jim
API Provider 13:37:34 jim
Web Blog_blogentry_200217_1 13:18:42 jim
Our Approach 12:42:30 jim
Delegation vs Impersonation 10:14:26 jim
Delegation 10:01:39 jim
OAuth-Token-Exchange 09:55:14 jim
16.02.2017
Cardholder Verification Method Condition Code 13:42:57 jim
Edirectory Instance Management 13:40:56 jim
2.16.840.1.113719.1.14.100.59 13:39:09 jim 2.16.840.1.113719.1.14.100.59x ==> 2.16.840.1.113719.1.14.100.59
2.16.840.1.113719.1.14.100.17 13:35:59 jim 2.16.840.1.113719.1.14.100.17x ==> 2.16.840.1.113719.1.14.100.17
2.16.840.1.113719.1.14.100.53 13:34:33 jim 2.16.840.1.113719.1.14.100.53x ==> 2.16.840.1.113719.1.14.100.53
2.16.840.1.113719.1.14.100.39 13:00:38 jim 2.16.840.1.113719.1.14.100.39x ==> 2.16.840.1.113719.1.14.100.39
2.16.840.1.113719.1.14.100.57 12:59:13 jim 2.16.840.1.113719.1.14.100.57x ==> 2.16.840.1.113719.1.14.100.57
2.16.840.1.113719.1.14.100.15 12:58:29 jim 2.16.840.1.113719.1.14.100.15x ==> 2.16.840.1.113719.1.14.100.15
2.16.840.1.113719.1.14.100.55 12:56:56 jim 2.16.840.1.113719.1.14.100.55x ==> 2.16.840.1.113719.1.14.100.55
WikiRPCInterface 12:54:31 jim
UTF-8 12:51:06 jim
Unicode 12:49:22 jim
1.3.6.1.4.1.1466.115.121.1.15 12:48:09 jim
2.5.5.12 12:46:14 jim
ServicePrincipalName 12:43:25 jim
ServiceDNSName 12:40:41 jim
ServiceConnectionPoint 12:33:19 jim
Service Connection Points 12:25:12 jim
SCP 12:23:02 jim
TRUSTED_FOR_DELEGATION 11:28:12 jim
Kerberos Delegation 11:27:03 jim Microsoft Active Directory Delegation ==> Kerberos Delegation
12.02.2017
United States Social Security Administration 11:44:04 jim
Social Security Number 11:39:33 jim
IAM Project Intangibles 11:35:44 jim
IAM Charter 10:59:23 jim
11.02.2017
SEC 21:05:26 jim
United States Securities and Exchange Commission 21:04:56 jim
Financial Industry Regulatory Authority Inc 21:01:36 jim
FinCEN 21:00:02 jim
Year 1789 20:59:27 jim
United States Department of the Treasury 20:59:09 jim
Financial Crimes Enforcement Network 20:55:51 jim
Bank Secrecy Act 20:53:14 jim
Customer Identification Program 20:49:51 jim
KYC 20:31:50 jim
Know Your Customer 20:30:50 jim
AML 20:29:05 jim
CIP 20:28:28 jim
USA PATRIOT Act 20:24:31 jim
Anti-Money Laundering 20:19:30 jim
Year 1970 20:18:08 jim
10.02.2017
Federal Identity, Credential, and Access Management 11:28:31 jim
Social Login 11:18:13 jim
Password Authentication 11:01:35 jim
Traditional Registration 10:49:59 jim
Web Blog_blogentry_100217_1 09:41:30 jim
Identity Document 09:33:49 jim
IAM Six Stages 09:17:58 jim
API Adoption 08:55:28 jim
09.02.2017
IDM and the Organization Dilemma 14:25:54 jim
Why IDM Makes Sense For Eveyone 14:21:43 jim IDMTheOrganizationsDilemma ==> IDM and the Organization Dilemma
FTTx 13:33:50 jim
Local Exchange 13:33:18 jim
Long Distance Provider 13:32:52 jim
Telecommunications Network Chain 13:27:14 jim
Last Mile Loop 13:13:29 jim Local Loop ==> Local Exchange
E.164 13:01:29 jim
Land Line 12:55:42 jim
Phone Number Portability 12:53:11 jim LandLine ==> Land Line
Phone Number 12:35:37 jim
Social Engineering Attacker 12:21:32 jim
SS7 hack 12:19:49 jim
Web Blog_blogentry_090217_1 12:04:56 jim
02.02.2017
HTTP Method 12:37:14 jim
Create Read Update Delete 12:26:44 jim
31.01.2017
Attacker 16:30:14 jim
Passive attacker 16:29:24 jim
Active attacker 16:28:04 jim
Data Classification 15:50:51 jim
Unfortunate event 15:37:12 jim
Disclosure-Alteration-Destruction 15:34:15 jim
Alice And Bob 15:11:06 jim
Trudy 15:06:31 jim
Mallet 15:05:55 jim
Mallory 15:02:49 jim
Elliptic Curve Diffie-Hellman Ephemeral 10:32:34 jim
Supported Groups Registry 10:31:46 jim
RFC 4492 10:21:39 jim
Diffie-Hellman Ephemeral 10:14:56 jim
RFC 7919 10:11:25 jim
ServerKeyExchange 09:58:34 jim
How SSL-TLS Works 09:57:59 jim
DHE 09:57:21 jim
29.01.2017
RFC 4918 21:12:42 jim
Jim 12:39:15 jim
28.01.2017
Obtain a Certificate from Server 10:02:45 jim
27.01.2017
Provenance 12:54:19 jim
Data Provenance 12:42:30 jim
25.01.2017
MAY 13:32:40 jim
MUST 13:32:29 jim
REQUIRED 13:32:05 jim
SHOULD NOT 13:31:47 jim
SHOULD 13:31:14 jim
SHALL 13:30:44 jim
RECOMMENDED 13:30:29 jim
NOT RECOMMENDED 13:30:16 jim
SHALL NOT 13:29:58 jim
MUST NOT 13:29:40 jim
Site Certificate 13:28:25 jim
Certificate Chain 13:24:24 jim
Certificate 13:08:47 jim
Intermediate Certificate 13:07:07 jim
Trust Anchor 13:01:20 jim
Monitoring Edirectory Synchronization 10:39:51 jim
EDirectory Synchronization 10:33:14 jim
Maximum Ring Delta 10:02:53 jim
PartitionStatus 10:01:03 jim
Legal Person 09:39:24 jim
Entity 09:30:22 jim

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-2) was last changed on 26-Jul-2014 09:01 by 71.0.193.131