These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time here is 12:19 on 27-Jun-2017.

27.06.2017
LDIF Sort Tools 10:31:37 jim
2.16.840.1.113719.1.1.4.1.545 10:15:05 jim
2.16.840.1.113719.1.1.4.1.271 10:14:28 jim
2.16.840.1.113719.1.1.5.1.6 10:13:41 jim
SYN_CI_LIST 10:12:24 jim
Case Ignore List 10:11:48 jim
RFC 5646 10:03:27 jim
RFC 4646 10:02:23 jim
RFC 4647 10:00:45 jim
RFC 3066 10:00:02 jim
Content-Language 09:58:08 jim
Accept-Language 09:55:38 jim
Ui_locales 09:46:43 jim
Authentication Context Class 09:07:59 jim
Authentication Context Class Reference 09:06:47 jim
Acr_values_supported 08:11:18 jim
Acr_values 08:10:01 jim
Acr 08:08:20 jim
Default_acr_values 08:03:39 jim
Best Practices OpenID Connect 08:01:31 jim
26.06.2017
Public Key Infrastructure Weaknesses 16:10:06 jim
Terms Of Engagement 16:09:40 jim
Personally Identifiable Information 16:07:17 jim
Privileged User Management 16:06:45 jim
Visitor Location Register 16:05:22 jim
Legal Person 16:04:34 jim
CommonAccord 16:04:22 jim
Federal Bureau of Investigation 16:03:55 jim
United States Supreme Court 15:54:12 jim
Jurisdiction 15:52:59 jim
General Data Protection Regulation 15:50:49 jim
IDSA Integration Framework 15:09:21 jim
Act (Actor) Claim 14:54:37 jim
Data Protection 14:32:38 jim
SecOps 14:31:38 jim
NetSec 14:31:03 jim
SIEM 14:30:39 jim
Enterprise Mobility Management 14:28:59 jim
Cloud Access Security Broker 14:28:01 jim
CASB 14:24:04 jim
EMM 14:23:03 jim
Data Access Governance 13:50:34 jim
Security Information and Event Management 13:47:08 jim
Glossary Of LDAP And Directory Terminology 13:43:59 jim Security Information Management Systems ==> Security Information and Event Management
ConfigurationManagement 13:39:04 jim
Service Support 13:36:08 jim
Incident Management 13:35:18 jim IncidentManagement ==> Incident Management
Release Management 13:33:07 jim
Sensitive Data 13:06:28 jim
Data Classification 13:05:39 jim
Network Security 13:03:42 jim
Privileged Access Management 13:02:07 jim
LDAP for Linux and Unix Clients 12:58:43 jim
LDAP Server Implementations 12:58:05 jim
Security Incident 12:52:25 jim
Fraud and Risk 12:47:06 jim
Security Operations 12:39:55 jim
IT Service Management 12:30:53 jim
Profile Management 12:24:06 jim
Profile 12:22:47 jim
Access Request 12:18:52 jim
Self-Service 12:18:08 jim
User Self Service 12:14:50 jim
Identity Governance 12:11:58 jim
IDSA Integration Framework/IDSA-Integration-framework.png 12:08:05 jim IDSA-Integration-framework
Identity Defined Security Alliance 11:45:23 jim
Web Blog_blogentry_260617_1 11:38:26 jim
Authorization_endpoint 10:24:50 jim
Access Token 10:13:39 jim
Authorization Code 10:08:36 jim
OAuth 2.0 Audience Information 10:04:27 jim
Access Token Types Registry 09:44:59 jim
Access Token Type 09:43:18 jim
Response_type 09:33:06 jim
Form Post Response Mode 09:17:43 jim
Response_mode 09:15:52 jim
OAuth Authorization Endpoint Response Types Registry 09:07:13 jim
Query Response Mode 09:00:35 jim
Fragment Response Mode 09:00:19 jim
Form_post 08:54:09 jim
Id_token 08:34:12 jim
Access_token 08:33:38 jim
Identity Token 08:32:32 jim
25.06.2017
RFC 7673 11:07:39 jim
Man-In-The-Middle 11:04:31 jim
TLSA 11:02:08 jim
DNS-Based Authentication of Named Entities 10:55:25 jim
DANE 10:54:47 jim
RFC 7671 10:54:25 jim
RFC 7672 10:52:17 jim
RFC 6698 10:47:15 jim
Web Blog_blogentry_250617_1 10:45:29 jim
Secure connection 10:42:49 jim
End-to-End Communications 10:33:22 jim
TLS is Broken 09:55:00 jim
HTTPS Interception Weakens TLS Security 09:54:44 jim
Form Serialization 09:44:43 jim
URI Query String Serialization 09:43:23 jim
Authorization Code Flow 09:38:35 jim
OpenID Connect Flows 09:34:45 jim
Hybrid Flow 09:34:06 jim
OpenID Connect Authorization Flow 09:28:16 jim
OpenID Connect Authentication Response 09:24:50 jim
Authentication Request 09:19:46 jim
Authorization Server Request End-User Consent-Authorization 09:18:09 jim
Authorization Server Authentication of the End-User 09:11:55 jim
Userinfo_endpoint 08:42:31 jim
Openid scope 08:23:49 jim
Ui_hint 07:38:32 jim
Authorization Request 07:37:25 jim
OAuth 2.0 Protocol Flows 07:30:01 jim
24.06.2017
Payment Services Directive 12:16:04 jim
Open Banking 12:14:38 jim
23.06.2017
Open Bank Project 22:18:59 jim
UK Open Banking 22:12:05 jim
Third Party Payment Service Provider 21:56:03 jim
Account Servicing Payment Service Provider 21:50:30 jim
UK 21:37:03 jim
GB 21:36:20 jim
United Kingdom 21:35:35 jim
CMA 21:33:37 jim
Competition and Markets Authority 21:31:26 jim
Financial API 21:28:21 jim
FAPI 21:24:54 jim
Payment Initiation Service Provider 20:51:54 jim
PIS 20:47:08 jim
Payment Initiation Service 20:42:30 jim
AIS 20:35:59 jim
PSU 20:35:30 jim
Account Information Service 20:35:14 jim
Payment Service User 20:32:39 jim
Biometric Comparison 11:16:13 jim
Biometric Authentication 11:14:54 jim
Biometric Presentation 11:11:09 jim
Biometric Enrollment 11:09:32 jim
Biometric Sample Processing 11:07:31 jim
Biometric Data Challenges 10:59:01 jim
Biometric Token 10:57:25 jim
Biometric Template 10:32:55 jim
Web Blog_blogentry_090217_1 10:31:14 jim
Vbm 10:28:36 jim
Touch ID 10:28:06 jim
Something You Are 10:27:42 jim
Rich Credential 10:27:12 jim
Inherence Factor 10:26:43 jim
Hard tokens 10:26:04 jim
Fpt 10:25:06 jim
Eyeprint ID 10:24:33 jim
Biometric data 10:23:40 jim
Biometric Sample 10:22:46 jim
Authentication Method Reference Values 10:20:15 jim
Biometric Sensor 09:56:48 jim
Biometric Identification 09:47:22 jim
Web Blog_blogentry_230617_1 09:37:38 jim
Authentication 09:36:15 jim
Identification 09:24:34 jim
Recognition 09:21:45 jim
Pattern-recognition 09:19:31 jim
22.06.2017
Presentation Attack Detection 17:33:08 jim
Presentation Attack 17:28:26 jim
Attack Effort 17:12:26 jim
PADER 17:11:14 jim
Presentation Attack Detection Error Rate 17:10:21 jim
Strength of Function for Authenticators - Biometrics 17:07:11 jim
SOFA-B 16:54:08 jim
Strength of Function for Authenticators 16:53:36 jim
SOFA 16:41:27 jim
Web Blog_blogentry_220617_1 16:34:43 jim
Sub_jwk 14:06:00 jim
Updated_at 14:04:37 jim
Phone_number 14:03:27 jim
TelephoneNumber 14:02:14 jim
Phone_number_verified 14:01:09 jim
Timezone 14:00:02 jim
2.16.840.1.113719.1.1.4.1.178 13:59:41 jim
Zoneinfo 13:50:40 jim
JSON Web Token Claims 13:48:15 jim
Not After 13:44:45 jim
Not Before 13:43:57 jim
Certificate Validity Period 13:40:02 jim
Example Certificate 13:39:33 jim Validity-Not Before ==> Not Before
Timestamp 13:36:46 jim
Date Form 13:36:01 jim
DateTime 13:33:06 jim
Birthdate 13:31:30 jim
NAME 13:26:22 jim
Email_verified 13:25:32 jim
BirthDate 13:21:59 jim birthDate ==> BirthDate
Address 13:20:32 jim
PostalAddress 13:19:43 jim postalAddress ==> PostalAddress
Picture 13:15:51 jim
Name 13:14:41 jim
Gender 13:11:20 jim
Azp 13:06:31 jim
C_hash 13:02:16 jim
End-to-End Security 12:57:51 jim
User 11:41:23 jim
1.2.840.113556.1.5.9 11:40:55 jim
End-User 11:21:07 jim
End-to-end Encryption 10:54:51 jim
OAuth Dynamic Client Registration Metadata 09:38:12 jim
Grant_types_supported 09:22:51 jim
21.06.2017
Localhost 18:35:31 jim
Application_type 18:34:58 jim
JSONArray 18:30:57 jim
Jwks 18:30:31 jim
JSON Web Key Set 18:29:58 jim
Authorization_code 18:23:47 jim
Refresh_token 18:20:45 jim
Subject_type 18:20:20 jim
Pairwise Pseudonymous Identifier 18:19:07 jim
Pseudonymous 18:15:36 jim
Initiate_login_uri 18:09:17 jim
Kerberos 14:25:20 jim
Client-Server Exchange 14:21:21 jim
TGS Exchange 14:21:04 jim
AS Exchange 14:20:28 jim
Kerberos Principal 14:18:58 jim
UPN 14:13:57 jim
AS_REP 13:56:52 jim
AS_REQ 13:55:50 jim
Network Time Protocol 13:50:13 jim
NTP 13:49:08 jim
RFC 4430 13:43:43 jim
RFC 3244 13:42:51 jim
Client-To-Server Ticket 13:23:18 jim
Kerberos Service Account 13:21:42 jim
Ticket Granting Service 13:08:36 jim
Service Ticket 13:05:02 jim
TGS-REQ-REP 13:04:13 jim
AS 12:16:41 jim
Kerberos Authentication Service 12:07:40 jim
Pass-the-ticket 11:55:11 jim
Kerberos Forged Ticket 11:49:48 jim
How passwords are used in Windows 11:36:37 jim
Password-hash 11:29:25 jim
LAN Manager authentication level 11:27:39 jim
Group Policy 10:54:04 jim
KRBTGT 10:51:18 jim
Active Directory and Passwords 10:36:31 jim
NTLMv2 10:33:44 jim
Golden Ticket 10:12:35 jim
Phishing 09:14:47 jim
Punycode 09:09:35 jim
IRI 08:55:14 jim
RFC 3987 08:54:23 jim
Internationalized Resource Identifiers 08:53:38 jim
Working Group 08:51:00 jim
W3C Technical Architecture Group 08:50:27 jim
Extensible Resource Identifier 08:50:17 jim
XRI 08:40:45 jim
I-number 08:36:35 jim
Unique Identifier 08:24:02 jim
Grant Types 07:47:32 jim
20.06.2017
OAuth 2.0 21:30:42 jim
OAuth Scopes 20:57:32 jim
Dropbox 15:00:47 jim
Yubico 14:58:48 jim
IP Address 14:56:33 jim
IPAddress 14:55:41 jim
OpenID Connect Mobile Discovery Profile 14:54:31 jim
Internet Protocol Address 14:53:57 jim
DNS cache poisoning 14:53:47 jim
TCP-IP 14:53:23 jim
AppAuth 14:28:13 jim
CLI 14:21:10 jim
GitHub 14:18:28 jim
Web Blog_blogentry_200617_1 13:48:01 jim
IDPro 13:47:08 jim
IDPro/Copy of IDProFounder.png 13:46:11 jim Founding Member IDPro
Jim Willeke Resume 13:40:23 jim
LocalEntryID 10:34:35 jim
Year 1950 09:40:42 jim
Human 09:40:15 jim
Turing test 09:39:00 jim
Artificial Conversational Entity 09:38:13 jim
Cortana 09:36:14 jim
Alexa 09:35:57 jim
Google Assistant 09:35:43 jim
Siri 09:35:27 jim
Chatbots 09:34:54 jim
Chatterbox 09:34:43 jim
Talkbot 09:34:31 jim
ChatterBot 09:33:45 jim
Local device 09:16:51 jim
Privileged Account 09:15:34 jim
Domain Administrative Accounts 09:08:47 jim
Emergency Accounts 09:01:54 jim
Local Administrative Accounts 09:01:11 jim
Service Account 09:00:42 jim
The Laws of Relationships 08:54:35 jim
Identity Relation 08:27:22 jim
19.06.2017
Advanced Persistent Threat 16:18:17 jim
Application Accounts 16:14:50 jim
Wendy 15:50:52 jim
Whistleblower 15:42:52 jim
Trent 15:39:05 jim
Sybil 15:38:43 jim
Oscar 15:38:06 jim
Craig 15:34:37 jim
Eve 15:33:31 jim
Mallory 15:31:40 jim
Bad Actor 15:30:10 jim
Web Blog_blogentry_190617_1 15:27:21 jim
SystemFlags 14:13:15 jim
PAS 14:06:52 jim
1.2.840.113556.1.3.14 14:05:53 jim
1.2.840.113556.1.3.11 14:05:14 jim
AttributeSchema 14:03:43 jim
Partial Attribute Set 13:57:52 jim
CrossRef 13:55:13 jim
LDAP Query Examples for AD 13:20:00 jim
LDAP SearchFilters 13:07:43 jim
LDAP Query Basic Examples 13:04:47 jim
JMX 12:53:13 jim
Unindexed Search 12:52:28 jim
Java Management Extensions 12:49:50 jim
Access Log 12:46:55 jim
Audit Log 12:45:47 jim
LDAPs and AD 12:13:04 jim
Secure MIME 12:08:31 jim
Cryptographic Message Syntax 12:08:07 jim SMIME ==> Secure MIME
Digital Certificate Formats 12:08:07 jim SMIME ==> Secure MIME
RFC 5911 12:08:07 jim SMIME ==> Secure MIME
Public-Key Cryptography Standards 12:07:44 jim
RFC 5652 11:49:18 jim
PKCS 6 11:47:45 jim
PKCS 9 11:46:22 jim
PKCS 8 11:43:03 jim
RFC 2985 11:39:43 jim
RFC 5958 11:37:21 jim
Asymmetric Key Packages 11:36:51 jim
Digitally Signed 11:21:20 jim
Online Certificate Status Protocol 11:15:44 jim
SlpuasaConfiguration 09:54:04 jim
Electronic Data Interchange 09:52:34 jim
EDI 09:52:14 jim
EDIPartyName 09:50:17 jim
OtherName 09:46:13 jim
X400Address 09:45:32 jim
UniformResourceIdentifier 09:44:56 jim
RegisteredID 09:44:20 jim
EMailAddress 09:41:48 jim eMailAddress ==> EMailAddress
Rfc822Name 09:40:48 jim
Draft-ietf-pkix-generalname-00 09:38:55 jim
DirectoryName 09:38:18 jim
GeneralName 09:22:04 jim
RFC 6818 09:10:47 jim
RFC 5280 09:09:39 jim
RFC 3280 09:08:16 jim
RFC 2459 09:06:42 jim
Certificate Validation 08:50:11 jim
DNSName 08:48:15 jim
Extended Validation Certificate 08:42:44 jim
EV-CERTS 08:42:04 jim
Certificate Subject 08:03:22 jim
18.06.2017
Automatic Certificate Management Environment 10:56:10 jim
Lets encrypt 10:49:35 jim
CAPK 10:45:10 jim
Certificate Authority 10:44:41 jim
Registration Authority 10:39:17 jim
Certificate Request Message Format 10:38:05 jim
DNS Certification Authority Authorization 10:36:15 jim
Domain Authorization Document 10:34:17 jim
Certificate Request Process 10:33:18 jim
RFC 2511 10:26:26 jim
RFC 2510 10:25:34 jim
Certificate Management Protocol 10:24:37 jim
Web Blog_blogentry_180617_1 10:23:43 jim
Certificate Issuer 10:02:47 jim
CAA 09:58:31 jim
DNS Resource Records 09:50:01 jim
Expiration Date 09:49:47 jim
RFC 6844 09:35:14 jim
Certification Authority Browser Forum 09:30:41 jim
CARAT 09:24:19 jim
Fully Qualified Domain Name 09:17:33 jim
FQDN 09:15:13 jim
Well-known 08:56:39 jim
17.06.2017
Authenticator Assurance Levels 12:12:25 jim
Client_secret_post 12:10:27 jim
Client_secret_basic 12:10:08 jim
OAuth Token Endpoint Authentication Methods 12:09:30 jim
RFC 2617 12:05:00 jim
Authorization Header 12:03:36 jim HTTP Basic Authentication ==> Basic Authentication Scheme
Basic Authentication Scheme 12:03:36 jim HTTP Basic Authentication ==> Basic Authentication Scheme
Private_key_jwt 11:44:38 jim
Token_endpoint_auth_method 11:40:51 jim
Id_token_signed_response_alg 11:33:14 jim
Id_token_encrypted_response_alg 11:32:17 jim
Request_object_signing_alg 11:29:42 jim
Request_object_encryption_alg 11:26:42 jim
Web Blog_blogentry_170617_1 11:07:23 jim
Gluu Server 10:34:21 jim
Gluu-Asimba 10:32:38 jim
OxShibboleth 10:29:16 jim
OxAuth 10:26:24 jim
Gluu LDAP 10:19:34 jim
OxTrust 10:18:03 jim
OXD 10:17:10 jim
JWK-Thumbprint 09:21:25 jim
Javascript Object Signing and Encryption 09:17:20 jim
JSON Object Signing and Encryption 09:15:43 jim
RFC 7520 09:14:37 jim
JOSE-Cookbook 09:12:44 jim
RFC 7638 09:09:40 jim
Crypto Forum Research Group 08:59:10 jim
Internet Research Task Force 08:58:20 jim
IRTF 08:57:16 jim
CFRG 08:55:34 jim
Base 64 Encoding with URL and Filename Safe Alphabet 08:52:34 jim
Base64url 08:48:28 jim
RFC 8037 08:46:50 jim
JSON Web Signature 08:44:44 jim
Curve25519 08:27:43 jim
Ed448 08:26:28 jim
Ed25519 08:25:41 jim
Elliptic Curve Diffie-Hellman Ephemeral 08:20:36 jim
Curve448 08:10:43 jim
X448 08:06:35 jim
RFC 7748 08:04:30 jim
X25519 08:03:17 jim
ECDH 07:59:02 jim
Elliptic Curve Diffie-Hellman 07:58:16 jim Elliptic Curve DiffieHellman ==> Elliptic Curve Diffie-Hellman
Authentication Method Reference 07:39:46 jim
RFC 8176 07:23:13 jim
16.06.2017
RFC 8032 11:43:07 jim
Edwards-curve Digital Signature Algorithm 11:42:15 jim
ARIA 11:38:37 jim
Camellia 11:36:18 jim
TLS 1.3 11:33:00 jim
Bob 11:23:29 jim
Alice 11:22:56 jim
Diffie-Hellman or RSA 11:21:41 jim
Random 11:00:27 jim
Digital Signature 10:41:09 jim
RSA Cryptography 10:35:57 jim
Key-Exchange 10:28:02 jim
Diffie-Hellman key-exchange 10:23:15 jim
15.06.2017
CONTROL-SA 20:27:30 jim
IdentityIQ 20:26:07 jim
BMC Software 20:19:34 jim Control-SA ==> CONTROL-SA
At_hash 14:59:54 jim
OpenID Connect Federation 14:51:41 jim
Web Blog_blogentry_150617_1 14:44:18 jim
OpenID Connect Client 14:42:51 jim
OpenID Connect ImplementerS Guides 13:26:26 jim
14.06.2017
HTTP HEAD 11:37:45 jim
13.06.2017
UnderstandingSchemaInOpenDS 16:41:40 jim
DIT Structure Rule 16:39:50 jim UnderstandingDITStructureRules ==> Understanding DIT Structure Rules
Understanding DIT Content Rules 16:39:50 jim UnderstandingDITStructureRules ==> Understanding DIT Structure Rules
Understanding DIT Structure Rules 16:39:49 jim UnderstandingDITStructureRules ==> Understanding DIT Structure Rules
DIT Content Rule 16:37:31 jim
Understanding Name Forms 16:37:07 jim UnderstandingDITContentRules ==> Understanding DIT Content Rules
RFC 3377 16:34:49 jim
RFC 4523 16:32:44 jim
RFC 2252 16:31:47 jim
LDAPSyntaxes 16:26:52 jim
DN-Binary 16:06:48 jim
2.5.5.7 16:05:31 jim
LDAP_MATCHING_RULE_DN_WITH_DATA 16:00:57 jim
MsDS-HasInstantiatedNCs 15:54:07 jim
1.2.840.113556.1.4.2253 15:49:35 jim
Active Directory Group Related Searches 15:20:43 jim
Active Directory Computer Related LDAP Query 12:40:24 jim
Active Directory User Related Searches 12:37:17 jim
2.5.4.6 12:13:30 jim
CountryName 12:12:46 jim
Country 12:09:50 jim
C 12:08:50 jim
Mobile Country Code 11:52:13 jim
TLD 11:50:55 jim
Top-Level Domain 11:50:29 jim
ISO 3166 11:48:42 jim
DNS Domain 11:47:50 jim
Domain 11:47:35 jim
ISO 639 11:41:29 jim
Locale 11:34:01 jim
Language-Tag 11:23:05 jim
Language Code 11:21:52 jim
2.16.840.1.113719.1.1.4.1.300 11:17:38 jim
2.16.840.1.113719.1.1.4.1.34 11:17:00 jim
LanguageId 11:14:18 jim
Language 11:02:40 jim
ISO 3166-1 alpha-3 10:36:37 jim
ISO 3166-1 numeric 10:35:28 jim
E.212 10:15:59 jim
Country Code 10:11:13 jim
Country String 10:10:20 jim
ISO 3166-1 alpha-2 10:09:54 jim
Distinguished Names 09:51:50 jim ISO 3166 ==> ISO 3166-1 alpha-2
Casual Name 09:35:57 jim
Pseudonym 09:31:31 jim
Real Name 09:30:40 jim
Personal Name 09:30:27 jim
Official Name 09:29:02 jim
Last Name 09:28:13 jim
First Name 09:26:13 jim
FullName 09:24:07 jim
Internet Email Address 09:12:38 jim
Email 09:11:13 jim
OpenID Connect Claims 09:10:08 jim
Electronic Mail 09:08:18 jim
Email Address 09:05:58 jim
Mail 09:01:39 jim
Issuer 08:37:49 jim
Aud 08:31:06 jim
Sub 08:29:55 jim
Enc 08:29:25 jim
StringOrURI 08:26:36 jim
Iss 08:24:11 jim
JSON Web Tokens 08:22:35 jim
12.06.2017
Center for Internet Security 09:16:40 jim
Web Blog_blogentry_120617_1 08:53:27 jim
NIST CSF 08:52:06 jim
NIST Cybersecurity Framework 08:51:50 jim
11.06.2017
September 11 attacks 09:23:35 jim
United States Intelligence Community 09:20:55 jim
Confidentiality 09:20:14 jim
Secret 09:19:30 jim
Releasability 09:15:33 jim
Top-secret 09:14:44 jim
Intelligence Assessment 09:05:14 jim
Surveillance of Communications 09:04:36 jim
Intelligence Agencies 09:01:15 jim
DNI 08:58:11 jim
United States Director of National Intelligence 08:57:47 jim
Foreign Intelligence Surveillance Court 08:37:16 jim
Foreign Intelligence Surveillance Act 08:29:30 jim
FISA 08:22:51 jim
Upstream Surveillance 08:22:21 jim
Surveillance 08:16:16 jim
09.06.2017
IDM The Solution 10:39:31 jim OurDeliverables ==> Our Deliverables
Our Deliverables 10:39:30 jim OurDeliverables ==> Our Deliverables
Requirements Assessment 10:38:47 jim RequirementsAssessment ==> Requirements Assessment
Why IDM Makes Sense For Eveyone 10:38:25 jim
IDM The User Dilemma 10:36:06 jim
IDM The Application Developers Dilemma 10:32:51 jim
IDM for Small and Medium Business 10:25:16 jim IDMForSmallMediumBusiness ==> IDM for Small and Medium Business
Openid-configuration 10:11:01 jim
Master Secret 09:16:47 jim
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 09:15:43 jim
Galois-Counter Mode 09:12:15 jim
BEAST 09:08:57 jim
Lucky 13 09:07:03 jim
Cipher Block Chaining 08:54:00 jim
Initialization Vector 08:51:11 jim
Ephemeral Key 08:50:42 jim
IV 08:48:48 jim
Shared Secret 08:46:54 jim
08.06.2017
EncryptedExtensions 17:01:50 jim
TLS Full Handshake 16:56:20 jim
ClientKeyExchange 16:52:37 jim
ServerKeyExchange 16:52:14 jim
Change_cipher_spec 16:46:09 jim
How SSL-TLS Works 16:40:09 jim
CertificateVerify 16:39:03 jim
TLS Handshake Message 16:36:35 jim
TLS Alert Messages 16:35:50 jim
Record Protocol 16:35:30 jim
Application_data 16:35:05 jim
TLS ContentType 16:34:36 jim
Password Policy 15:26:04 jim
GroupType 13:32:14 jim
07.06.2017
Relying Party 15:05:53 jim
RFC 3749 14:07:05 jim
Unexpected_message 13:58:30 jim
Illegal_parameter 13:57:11 jim
Decode_error 13:56:04 jim
HelloRetryRequest 13:52:00 jim
Pre_shared_key 13:50:35 jim
Key_share 13:49:13 jim
Supported_versions 13:43:48 jim
ServerHello 13:35:42 jim
ClientHello 12:50:25 jim
Cipher_suites 12:39:39 jim
TLSv1.3 11:54:08 jim
OpenSSL 11:53:49 jim
1-RTT Handshakes 11:47:12 jim
HTTP Strict Transport Security 11:41:46 jim
RFC 6797 11:35:15 jim
Network Security Services 11:22:40 jim
Mozilla 11:21:27 jim
0-RTT Handshakes 11:13:52 jim
Logjam 11:10:11 jim
FREAK 11:07:04 jim
Export-grade 11:00:06 jim
RSA_EXPORT 10:58:45 jim Export Ciphers ==> Export-grade
United States Cryptography Export-Import Laws 10:58:45 jim Export Ciphers ==> Export-grade
Legal 10:39:37 jim
We are NOT Lawyers 10:38:47 jim
Standard Disclaimer 10:34:14 jim
BIS 10:29:56 jim
United States Bureau of Industry and Security 10:26:10 jim
T-Mobile 10:08:29 jim
A look at the Network Cable standards 10:03:28 jim
Softcard 10:01:06 jim
Open Identity Exchange 09:56:54 jim
AT&T 09:54:08 jim
Smart endpoints and dumb pipes 09:52:36 jim
The Open Group 09:52:06 jim
Santa Cruz Operation 09:51:45 jim
Pass-the-hash 09:51:25 jim
MacOS 09:51:00 jim
Linux 09:50:26 jim
FLAIM 09:49:43 jim
Unix 09:49:12 jim
History 09:47:52 jim
UNIX History and More 09:47:41 jim
SCO 09:43:59 jim
Darl McBride 09:42:19 jim
Caldera Systems 09:40:57 jim
06.06.2017
Which Jane Doe 17:25:22 jim
Delegation vs Impersonation 17:23:16 jim
Digital Identity Acceptance Policy 17:22:36 jim
DIAP 17:15:59 jim
Common Edirectory Bind Errors 12:05:28 jim
DEC 12:04:53 jim
31.05.2017
Subject Alternative Name 13:44:49 jim
SAN 13:19:54 jim
30.05.2017
Credential Stuffing 11:26:51 jim
Web Blog_blogentry_300517_1 11:23:05 jim
29.05.2017
JWK 10:13:52 jim
JSON Web Encryption 10:03:50 jim
JSON Web Signature and Encryption Algorithms 09:57:35 jim
JWK Set 09:55:37 jim
Alg 09:53:39 jim
Typ 09:49:03 jim
HS256 09:46:16 jim
HS512 09:45:29 jim
JSON Web Algorithms 09:43:23 jim
RFC 7518 09:40:28 jim
Client Secret 09:39:35 jim
OAuth 2.0 NOT an Authentication protocol 09:21:55 jim

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-2) was last changed on 26-Jul-2014 09:01 by 71.0.193.131