jspωiki
RecentChanges

These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time that I use is 17:25 on 2018-04-26.

Category#

JSPWiki-2.10.3

26.04.2018
Token68 14:37:08 jim
Hexadecimal 14:33:49 jim
Base16 14:33:31 jim Base 16 ==> Base16
Web Blog_blogentry_260418_1 14:30:22 jim
23.04.2018
Intruder Detection 21:01:22 jim
Account Restrictions 21:00:30 jim
Windows Logon 20:59:36 jim
Managed Service Account 20:58:27 jim
Security Account Manager 20:53:26 jim
Account Expiration 20:51:23 jim
Computer account 20:50:41 jim
Account Inactivity 20:49:53 jim
Kerberos Service Account 20:48:16 jim
Application Accounts 16:00:08 jim
Emergency Accounts 15:57:11 jim
Service Account 15:55:18 jim
Local Administrative Accounts 15:54:42 jim
Protocol Vulnerability 15:37:59 jim
Implementation Vulnerability 15:37:45 jim
Vulnerability 15:35:15 jim
Web Blog_blogentry_230418_1 15:24:06 jim
Malicious Software 15:22:24 jim
Thread 15:18:14 jim
Buffer overflow 15:15:34 jim
SQL Injection 15:10:38 jim
Phishing 15:05:50 jim
Credential Reuse 15:02:07 jim
Password Generator 14:58:47 jim
SQLi 14:48:02 jim
Page Fault 14:20:08 jim
Swap Space 14:18:18 jim
Virtual Memory 14:05:35 jim
International System of Units 08:33:49 jim
ISO 80000 08:14:17 jim
Byte 08:13:23 jim
SI 08:08:04 jim
Time 07:57:39 jim
ISQ 07:53:33 jim
Seconds 07:52:57 jim
International System of Quantities 07:50:31 jim
21.04.2018
Kibibyte 11:55:33 jim
Terminology for Constrained-Node Networks 11:52:32 jim
KiB 11:50:19 jim
Device Flow 08:28:51 jim
Zero Trust 08:04:35 jim
20.04.2018
DevOps 08:17:08 jim
Increment 08:14:32 jim
Release Management 08:13:43 jim
Release 08:11:28 jim
Continuous Development 08:08:30 jim
AAL2 07:53:17 jim
AAL1 07:53:13 jim
AAL3 07:52:51 jim
Impersonation-resistant 07:51:29 jim
Authenticator 07:51:21 jim
Web Blog_blogentry_190418_1 07:43:09 jim
Identity Provider (IDP) 07:40:59 jim
Attribute references 07:39:34 jim
Authentication intent 07:35:36 jim
19.04.2018
Risk-Based Authentication 18:45:27 jim
Authentication Context Class vs Authentication Method Reference 18:14:17 jim
Non-interactive 18:07:29 jim
Interactive 18:01:44 jim
Windows Logon Types 17:45:43 jim
Windows Event Log 17:41:56 jim
Windows Security Log Event 17:40:31 jim
Windows Security Event Log 17:39:54 jim Security Event Log ==> Windows Security Event Log
System Access Control List 17:37:30 jim
Microsoft Active Directory Anomalies 17:34:39 jim
Create a MAD Service To Run 17:32:54 jim
Windows registry 17:31:46 jim
Service Control Manager 17:31:37 jim
SCM 17:19:09 jim
Active Directory Account Lockout 17:14:42 jim
18.04.2018
ipProtocolNumber 17:58:27 jim
1.3.6.1.1.1.2.3 17:54:35 jim
IpServiceProtocol 17:54:00 jim
IpService 17:50:53 jim
1.3.6.1.1.1.1.15 17:47:01 jim
IpServicePort 17:46:08 jim ipServicePort ==> IpServicePort
NisNetgroupTriple 17:42:35 jim
NisNetgroup 17:39:41 jim
MemberNisNetgroup 17:36:12 jim
PosixGroup 17:22:13 jim
MemberUid 17:18:42 jim
ShadowInactive 17:12:12 jim
ShadowLastChange 17:11:32 jim
ShadowAccount 17:08:51 jim
ShadowFlag 17:06:06 jim
1.3.6.1.4.1.42.2.27.8.1.28 17:04:02 jim
ShadowExpire 17:03:43 jim
1.3.6.1.1.1.1.9 17:00:37 jim
2.5.13.15 16:57:05 jim
IntegerOrderingMatch 16:56:47 jim
ShadowWarning 16:54:09 jim
ShadowMax 16:48:18 jim
1.3.6.1.1.1.1.7 16:46:46 jim
ShadowMin 16:45:44 jim
1.3.6.1.1.1.1.6 16:44:39 jim
shadowLastChange 16:40:56 jim
LoginShell 16:38:02 jim
IA5String 16:33:51 jim
1.3.6.1.4.1.1466.115.121.1.26 16:33:27 jim
HomeDirectory 16:32:22 jim
CaseExactIA5Match 16:30:04 jim
Gecos 16:23:59 jim
GidNumber 16:18:58 jim
UidNumber 16:14:26 jim
automountMapName 14:24:27 jim
NisDomainObject 14:18:19 jim
1.3.6.1.1.1.2.15 14:17:07 jim
NisDomain 14:15:36 jim
SchemaRFC2307Bis 14:07:10 jim
Draft-howard-rfc2307bis 14:05:56 jim
2.5.13.13 13:27:18 jim
1.3.6.1.4.1.1466.101.120.6 13:26:43 jim
1.3.6.1.1.11.1.1 13:25:31 jim
2.5.4.50 13:25:03 jim
2.5.13.20 13:24:33 jim
1.3.6.1.4.1.4203.1.3.5 13:24:09 jim
1.3.6.1.4.1.1466.101.120.7 13:23:46 jim
1.3.6.1.4.1.1466.101.120.13 13:23:31 jim
2.5.23.4 13:23:10 jim
2.5.4.65 13:22:32 jim
1.3.6.1.4.1.11.1.3.1.1.2 13:22:00 jim
2.5.4.41 13:20:55 jim
2.5.21.8 13:20:25 jim
2.5.21.4 13:20:04 jim
2.5.13.14 13:19:29 jim
0.9.2342.19200300.100.1.9 13:18:54 jim
2.5.21.10 13:18:27 jim
2.5.13.28 13:17:59 jim
2.5.13.27 13:17:38 jim
1.2.840.113549.1.9.1 13:16:42 jim
EmailAddress 13:15:55 jim
1.3.6.1.4.1.11.1.3.1.2.5 13:10:26 jim
DITContentRules 13:08:13 jim DitContentRules ==> DITContentRules
Understanding DIT Content Rules 13:08:00 jim
Subschema 13:07:29 jim
OperationalAttribute 13:06:57 jim
ObjectClass 13:06:35 jim
DIT Content Rule Description 13:06:14 jim
DIT Content Rule 13:05:58 jim
2.5.21.2 13:05:38 jim
1.2.36.79672281.1.13.6 13:03:00 jim
AllComponentsMatch 13:02:41 jim
OpenAssertionType 12:58:54 jim
1.2.36.79672281.1.5.3 12:51:41 jim
1.2.36.79672281.1.13.7 12:48:03 jim
DirectoryComponentsMatch 12:47:39 jim
DepartmentNumber 12:41:28 jim
2.5.18.7 12:39:58 jim
2.5.20.2 12:39:32 jim
2.5.18.12 12:39:02 jim
2.5.23.5 12:38:41 jim
2.5.13.4 12:38:01 jim
2.5.23.6 12:37:24 jim
CaseIgnoreMatch 12:35:42 jim
2.5.13.2 12:30:38 jim
2.5.13.7 12:30:12 jim
1.3.6.1.4.1.1466.109.114.1 12:29:39 jim
2.5.13.6 12:29:14 jim
2.5.13.5 12:23:40 jim
DomainComponent 12:22:23 jim
DC 12:20:34 jim
RFC 1034 12:12:47 jim
RFC 2181 12:12:25 jim
RFC 1123 12:10:08 jim
RFC 5891 12:03:10 jim
RFC 5890 12:01:53 jim
IDNA 11:56:15 jim
Internationalizing Domain Names in Applications 11:55:43 jim
RFC 3490 11:55:02 jim
Dc 11:52:18 jim
2.16.840.1.113719.1.167.6.2.1 11:51:01 jim
1.3.6.1.4.1.1466.344 11:50:38 jim
0.9.2342.19200300.100.4.13 11:50:17 jim
RFC 4234 11:48:02 jim
0.9.2342.19200300.100.1.25 11:45:32 jim
2.16.840.1.113719.1.8.4.5 11:31:15 jim
2.5.6.6 11:30:48 jim
Person 11:30:26 jim
Company 11:23:16 jim
Digital Identity 11:18:32 jim
Identity Cube 10:18:28 jim
Credential 09:56:11 jim
Credential Repository 09:45:00 jim
Edirectory Back-Ups And Clones 09:43:16 jim
Backup 09:42:21 jim
Incremental Backup 09:41:26 jim
Berkeley DB Java Edition 09:38:29 jim BerkeleyDBJavaEdition ==> Berkeley DB Java Edition
Glossary Of LDAP And Directory Terminology 09:37:53 jim
LDAP Indexes 09:30:54 jim
Changelog 09:29:18 jim
Back-end 09:27:56 jim
17.04.2018
0.9.2342.19200300.100.4.5 19:07:34 jim
2.5.23.2 19:07:09 jim
1.3.6.1.4.1.1466.101.120.1 19:04:56 jim
AdministratorsAddress 19:03:52 jim
0.9.2342.19200300.100.1.8 19:02:06 jim
0.9.2342.19200300.100.1.5 19:01:44 jim
0.9.2342.19200300.100.1.4 18:59:59 jim
0.9.2342.19200300.100.1.2 18:59:28 jim
CarLicense 18:45:12 jim
2.16.840.1.113730.3.1.1 18:44:07 jim
INTEGER 18:34:55 jim
BIT STRING 18:26:52 jim
BitStringMatch 18:24:19 jim
2.5.13.16 17:58:56 jim
RFC 2798 17:52:17 jim
RFC 4519 17:50:58 jim
1.3.6.1.1.3.1 17:48:23 jim
UidObject 17:46:09 jim
LDAP Family 17:40:29 jim
LDAP Message 17:34:18 jim
LDAP Object Identifier Descriptors 17:23:23 jim
VPIMUser 17:22:02 jim
RFC 4237 17:16:04 jim
Reciprocal OAuth 09:35:46 jim
Web Blog_blogentry_170418_1 09:32:46 jim Reciprocal Authorization Flow ==> Reciprocal OAuth
16.04.2018
IDM Tricks 20:43:47 jim
Novell IDM Driver Filters 20:43:29 jim
Troubleshooting DirXML 20:32:28 jim
AdministrativeRole 11:59:25 jim
CollectiveAttributeInnerArea 11:58:28 jim
CollectiveAttributeSpecificArea 11:58:11 jim
SubschemaAdminSpecificArea 11:58:00 jim
AccessControlSpecificArea 11:57:45 jim
AutonomousArea 11:57:27 jim
ApplicationEntity 11:53:27 jim
RFC 2256 11:48:58 jim
Version 11:44:58 jim
Newsuperior 11:42:19 jim
2.16.840.1.113730.3.1.11 11:39:07 jim
Modify 11:37:19 jim
Newrdn 11:35:49 jim
Moddn 11:34:05 jim
Dn 11:32:13 jim
Delete 11:30:32 jim
Add 11:23:11 jim
Deleteoldrdn 11:22:10 jim
Changetype 11:21:30 jim
Control 11:21:21 jim
EntryDN 11:15:43 jim
2.5.23.3 11:02:21 jim
AccessControlInnerArea 11:01:13 jim
RFC 3296 10:54:19 jim
RFC 8284 10:50:48 jim
RFC 5020 10:49:40 jim
RFC 2589 10:48:38 jim
RFC 2247 10:47:05 jim
RFC 6109 10:46:03 jim
RFC 7612 10:44:30 jim
RFC 3712 10:43:43 jim
RFC 4403 10:41:33 jim
RFC 7532 10:39:49 jim
RFC 2293 10:38:29 jim
RFC 2739 10:37:22 jim
RFC 2164 10:35:57 jim
RFC 4104 10:34:52 jim
Audio 09:43:31 jim
X-NOT-HUMAN-READABLE 09:34:11 jim
1.3.6.1.4.1.1466.115.121.1.4 09:32:05 jim
0.9.2342.19200300.100.1.55 09:21:13 jim
1.3.6.1.4.1.1466.115.121.1.20 09:12:06 jim
DSE Type 09:10:18 jim
Attribute Type Description 08:57:24 jim
1.3.6.1.4.1.1466.115.121.1.1 08:54:30 jim
ACI Item 08:53:58 jim
ACI 08:53:17 jim
Access Point 08:46:44 jim
Microsoft Active Directory Syntax 08:45:37 jim
Zero 08:42:17 jim
Signed int 08:38:28 jim
ADSTYPE_DN_WITH_BINARY 08:29:12 jim
2.5.5.15 08:26:13 jim
ADSTYPE_NT_SECURITY_DESCRIPTOR 08:24:16 jim
1.2.840.113556.1.4.907 08:24:07 jim
ADSTYPE_BOOLEAN 08:17:58 jim
ADSTYPE_OCTET_STRING 08:16:29 jim
SID string 08:14:27 jim
Security Identifier 08:11:33 jim
15.04.2018
SDDL 20:09:32 jim
NT-Sec-Desc 20:09:12 jim
ABNF 20:07:08 jim
RFC 5234 20:06:38 jim
Security Descriptor Description Language 20:04:46 jim
Security Descriptor 20:01:46 jim
2.5.5.14 19:46:26 jim
2.5.5.13 19:45:05 jim
2.5.5.12 19:43:29 jim
2.5.5.10 19:41:02 jim
ADSTYPE_INTEGER 19:39:14 jim
Enumeration syntax 19:38:56 jim
2.5.5.8 19:37:30 jim
2.5.5.7 19:32:58 jim
2.5.5.6 19:27:42 jim
2.5.5.5 19:24:24 jim
Telex 19:22:30 jim
2.5.5.2 19:21:15 jim
MSADTS 19:16:46 jim
Microsoft Active Directory Technical Specification 19:16:29 jim
2.5.5.3 19:14:26 jim
2.5.5.11 19:13:53 jim
ADSTYPE_CASE_EXACT_STRING 19:07:39 jim
1.2.840.113556.1.4.905 19:03:36 jim
UTCTime 18:57:13 jim
Decision Tree 18:35:07 jim
Machine Learning Algorithms 18:33:21 jim
Naive Bayes 18:28:12 jim
Training dataset 18:27:41 jim
GeneralizedTime 17:34:09 jim
Presentation Address 17:32:24 jim
ADSTYPE_LARGE_INTEGER 17:26:43 jim
VisibleString 12:59:31 jim
VideotexString 12:59:17 jim
UTF8String 12:59:09 jim
UniversalString 12:58:59 jim
TeletexString 12:58:51 jim
Gender 12:57:28 jim Printable String ==> PrintableString
LDAPSyntaxes 12:57:28 jim Printable String ==> PrintableString
SYNTAX 12:57:28 jim Printable String ==> PrintableString
Telephone Number LDAP Syntax 12:57:28 jim Printable String ==> PrintableString
CaseExactMatch 12:57:27 jim Printable String ==> PrintableString
CaseExactOrderingMatch 12:57:27 jim Printable String ==> PrintableString
CaseExactSubstringsMatch 12:57:27 jim Printable String ==> PrintableString
PrintableString 12:57:27 jim Printable String ==> PrintableString
Supertype 12:56:48 jim IA5 String ==> IA5String
DNSName 12:56:47 jim IA5 String ==> IA5String
GraphicString 12:56:13 jim
GeneralString 12:56:05 jim
BMPString 12:55:42 jim
CaseIgnoreString 12:53:44 jim Directory String ==> DirectoryString
DirXML-NTAccountName 12:53:44 jim Directory String ==> DirectoryString
Directory (Case Ignore) String 12:53:44 jim Directory String ==> DirectoryString
NickName 12:53:44 jim Directory String ==> DirectoryString
SupportedSASLMechanisms 12:53:44 jim Directory String ==> DirectoryString
1.3.6.1.4.1.1466.115.121.1.15 12:53:43 jim Directory String ==> DirectoryString
DirectoryString 12:53:43 jim Directory String ==> DirectoryString
ADSTYPE_NUMERIC_STRING 12:52:09 jim Numeric String ==> NumericString
Object Class Description 12:52:09 jim Numeric String ==> NumericString
1.3.6.1.4.1.1466.115.121.1.36 12:52:08 jim Numeric String ==> NumericString
NumericString 12:52:08 jim Numeric String ==> NumericString
Component Matching Rules 12:48:41 jim
RFC 3687 12:38:28 jim
LDAP String Matching 12:37:23 jim
MatchingRule 12:32:34 jim
CaseExactString 12:21:26 jim
2.5.5.1 12:15:17 jim
ADSTYPE_DN_WITH_STRING 12:04:36 jim
ADSTYPE_CASE_IGNORE_STRING 12:04:06 jim
ADSTYPE_DN_STRING 12:03:39 jim
ADSTYPE_UTC_TIME 12:02:22 jim
ADsType 12:01:58 jim
2.5.5.4 12:00:53 jim
DNWithString 11:54:34 jim
1.2.840.113556.1.4.904 11:52:04 jim
OR-Name 10:22:27 jim
1.2.840.113556.1.4.1221 10:16:45 jim
1.2.840.113556.1.4.903 10:16:11 jim
Draft-armijo-ldap-syntax-00 10:13:14 jim
DNWithOctetString 10:11:50 jim
LDAP_MATCHING_RULE_DN_WITH_DATA 10:09:23 jim DN-Binary ==> DNWithOctetString
1.2.840.113556.1.4.1362 10:02:15 jim
OID Syntax 09:56:22 jim
1.3.6.1.4.1.1466.115.121.1.38 09:51:29 jim
Replica Link 09:32:30 jim
1.3.6.1.4.1.1466.115.121.1.43 09:26:42 jim
2.5.5.9 08:51:54 jim
Interval Syntax 08:47:12 jim
LargeInteger 08:43:10 jim
OctetString 08:28:12 jim
1.3.6.1.4.1.1466.115.121.1.40 08:26:24 jim
System-Id-Guid 08:17:27 jim
1.2.840.113556 08:15:02 jim
Country-Code 08:10:20 jim
14.04.2018
Web Blog_comments_170914_1 11:52:34 AKUJineafe
International Standard Recording Code 10:55:56 jim
ISO 4217 10:51:10 jim
Currency Code 10:48:18 jim
ISO 3166-1 alpha-2 10:34:17 jim
Data Country Codes 10:16:57 jim
CountryName 10:15:41 jim
Co 10:14:52 jim
FriendlyCountryName 10:13:23 jim
Language-Tag 10:04:44 jim
Language 09:59:07 jim
Country Code 09:56:47 jim
CountryCode 09:49:08 jim
1.2.840.113556.1.4.25 09:09:25 jim
Web Blog_blogentry_140418_1 09:00:32 jim
13.04.2018
ETH 10:39:31 jim
Compare Request 09:27:30 jim
Modify DN Response 09:24:25 jim
ModifyDNRequest 09:21:58 jim
Delete Response 09:20:50 jim
Delete Request 09:16:08 jim
LDAP Result 09:14:08 jim
Add Response 09:13:28 jim
Add Request 09:09:32 jim
Modify Response 09:08:36 jim
Modify Request 09:06:44 jim
SearchResultDone 09:05:32 jim
SearchResultEntry 09:03:17 jim
SearchRequest 09:01:30 jim
Unbind Request 09:00:32 jim
Bind Request 08:58:35 jim
Bind Response 08:58:16 jim
EDirectory LDAP Transaction 08:52:12 jim
Transaction Account 08:40:30 jim
Transaction 08:39:20 jim
Account 08:37:46 jim
Distributed Ledger Technology 08:32:43 jim
Ethereum 08:24:59 jim
Ether 08:16:15 jim
Nakamoto consensus 08:12:19 jim
Web Blog_blogentry_130418_1 07:59:20 jim
Sovereign-source Identity 07:47:35 jim
SSI 07:42:46 jim
Self-Sovereign Identity 07:41:27 jim
12.04.2018
Legitimacy of Social Login 16:33:00 jim
Cloud Identity Providers 16:21:31 jim
Web Blog_blogentry_090418_1 16:07:57 jim
Google OpenID Connect 14:45:24 jim
Include_granted_scopes 14:36:25 jim
Active Directory and Passwords 10:12:17 jim
Decentralized Exchange 09:54:48 jim
Perspectives Project 09:51:18 jim
EFF 09:48:27 jim
Free Software Foundation 09:47:35 jim
Electronic Frontier Foundation 09:47:20 jim
Intellectual Property 09:46:52 jim
Digital Rights Management 09:45:09 jim
Digital Asset 09:42:02 jim
Web Blog_blogentry_120418_1 09:28:07 jim
Containerization 09:18:12 jim
Network devices 09:16:41 jim
Data Center 09:16:20 jim
Host 09:15:27 jim
Container Orchestration 09:12:34 jim
Operating-system-level virtualization 08:56:40 jim
Docker 08:55:58 jim
Virtual Machine 08:46:44 jim
Virtualization method 08:41:17 jim
Container 08:35:51 jim
Ephemeral 08:34:54 jim
Functions as a Service 08:33:25 jim
Computing Service 08:30:47 jim
Platform as a Service 08:30:18 jim
Software as a Service 08:27:37 jim
Infrastructure as a Service 08:26:22 jim
EdirectoryPasswords 07:56:24 jim
Password Management 07:52:06 jim
PWFILTER Windows Events 07:49:10 jim
DirXML PWFILTER.DLL 07:48:16 jim
AD Driver version 4.0.0.4 07:46:43 jim
AD Password Filters 07:46:00 jim
11.04.2018
Extract Transform Load 18:09:20 jim
NetworkAddress 15:33:03 jim
HTTP Status Code 15:31:02 jim
Bug 15:27:59 jim
Product Backlog 15:25:33 jim
Backlog 15:23:32 jim
Iteration Planning 15:22:00 jim
Sprint Backlog 15:16:26 jim
Iteration Backlog 15:11:49 jim
Product Owner 14:06:02 jim
Delivery Team 14:02:42 jim
Scrum Team 13:59:56 jim
Development Team 13:46:22 jim
Web Blog_blogentry_090318_1 13:00:24 jim WC3 WebAuthn ==> W3C WebAuthn
WebAuthn 13:00:24 jim WC3 WebAuthn ==> W3C WebAuthn
W3C WebAuthn 13:00:23 jim WC3 WebAuthn ==> W3C WebAuthn
FIDO Standards 12:59:25 jim
K-Nearest Neighbor 12:49:58 jim
Supervised Learning 12:46:45 jim
KNN 12:45:18 jim
Artificial Intelligence 12:11:45 jim
Cognitive Security 12:08:36 jim
Anomaly Detection 08:29:40 jim
Data-lake 08:23:32 jim
Buzzword 08:20:35 jim
Data mining 08:18:36 jim
Web Blog_blogentry_110418_1 08:06:26 jim
10.04.2018
Centralized Exchange 11:01:51 jim
DEX 10:59:29 jim
Digital Currency Exchange 10:45:28 jim
Fiat Currency 10:14:12 jim
Commodity 10:11:12 jim
Money 10:05:49 jim
Cryptocurrency 09:48:44 jim
Distinguished Names 09:07:05 jim
DistinguishedNameMatch 08:51:07 jim
String Representation of Distinguished Names 08:45:24 jim
DN Syntax 08:35:19 jim
09.04.2018
Authentication Context Class 17:08:00 jim
Graded Authentication 16:41:54 jim
Incremental authorization 16:25:18 jim
OAuth 2.0 Incremental Authorization 16:16:11 jim
Network-Auth 16:07:10 jim
Implicit Scopes 16:00:55 jim
OAuth Scope Example 15:57:53 jim
Elevated Token 15:55:05 jim
Trust Elevation 15:45:24 jim
Event 4625 15:28:56 jim
Event 4624 15:22:20 jim
Active Directory Group Related Searches 15:08:32 jim
08.04.2018
ERC20 21:23:51 jim
Repudiation 20:26:00 jim
Zero-knowledge proof 20:07:36 jim
ZKP 20:04:15 jim
07.04.2018
Common Event Format 13:58:00 jim
ArcSight 13:53:49 jim
CEF 13:52:59 jim
Event System 13:47:43 jim
EDirectory Version 13:38:39 jim
NDS Unknow Entries 13:31:04 jim
Flat Cleaner 13:24:21 jim
Limber 13:22:47 jim
EDirectory Synchronization 13:15:45 jim
Change Cache 13:13:32 jim
Imonitor 12:57:31 jim
Translation Processor 12:39:57 jim
Out of Band Requests 12:39:07 jim
Events vs Commands 12:38:35 jim
DirXML Out-of-Band Requests 12:29:29 jim IDM Out-of-Band Requests ==> DirXML Out-of-Band Requests
DirXML Trace File Searches 12:25:57 jim
DirXML Toolbox 12:25:38 jim
DirXML 12:25:22 jim
DirXML Required Reading 12:23:56 jim Novell IDM Required Reading ==> DirXML Required Reading
DirXML Level Three Trace 12:20:09 jim NIDM Trace File Searches ==> DirXML Trace File Searches
Jims Toolbox 12:14:10 jim IDM Toolbox ==> DirXML Toolbox
Single Logout 12:08:03 jim
Logged out 12:07:34 jim
OpenID Connect Back-Channel Logout 12:05:40 jim
Why Use Tokens 12:04:14 jim
SAML V2.0 12:02:32 jim
Remember Me 11:59:01 jim
PostMessage 11:56:57 jim
Response_mode 11:56:37 jim
Check_session_iframe 11:56:02 jim
Logging Out 11:54:39 jim Window.postMessage ==> PostMessage
Single Logout Profile 11:18:41 jim
IDP Metadata 11:17:39 jim
Transport Layer Security 09:54:14 jim
Secure connection 09:43:50 jim
Pre-Shared Key 09:38:43 jim
Shared Secret 09:37:07 jim
Internet Threat Model 09:25:34 jim
Threat Model 09:19:16 jim
TLS 1.3 09:11:30 jim
0-RTT Handshakes 09:10:14 jim
TLS Session Resumption 08:56:17 jim
06.04.2018
OAuth 2.0 JWT Secured Authorization Request 09:54:14 jim
04.04.2018
Identity Lifecycle Management 10:55:52 jim
Account termination 10:52:54 jim
Logout Mechanism 10:50:30 jim
JSESSIONID 10:44:35 jim
Session 10:42:16 jim
LAG-catalina.out 10:41:42 jim
OpenID Connect Session Management 10:34:05 jim
OpenID Connect Front-Channel Logout 10:33:47 jim
03.04.2018
Token Revocation 10:48:58 jim
GraphQL 10:19:32 jim
Round-Trip Time 10:09:25 jim
RTT 10:04:19 jim
Round-trips 10:00:55 jim
Representational State Transfer 09:56:19 jim
Architecture 09:47:16 jim
Hypermedia As The Engine Of Application State 08:57:28 jim
Link Relation Types 08:48:40 jim
HTTP PATCH 08:23:10 jim
01.04.2018
Revocation model 08:45:39 jim
OAuth 2.0 Token Introspection 08:41:07 jim
30.03.2018
2.5.18.1 10:43:08 jim
CreateTimestamp 10:42:45 jim
Timeout 10:07:11 jim
Logout Process 09:38:35 jim
What is missing in OAuth 2.0 09:21:06 jim
29.03.2018
DirXML Events and Commands 17:13:54 jim
Translation Processor/tranlation-processor-sub.jpg 17:03:22 jim translation-processor
Schema Mapping Policy 12:37:25 jim
XDS Document 12:32:58 jim
DirXML event 12:15:46 jim
DirXML command 12:11:48 jim
DirXML Engine 12:05:48 jim
Event Transformation Policy Set 12:02:11 jim
Merge operation 11:57:43 jim
DirXML Engine/newfishbonediagram.png 11:07:54 jim newfishbonediagram.png
LDAP 4 10:59:25 jim
LDAP Result Codes 10:56:56 jim
X-NDS_NOT_CONTAINER 10:50:06 jim
Leaf 10:49:37 jim
ObjectClass=unknown 10:45:05 jim
Forward Reference 10:00:40 jim
Web Blog_blogentry_290318_1 09:52:47 jim
28.03.2018
MemberQueryURL 14:12:26 jim
MemberQuery 14:12:07 jim
ObjectSID 13:07:05 jim
Impersonation Token 12:51:32 jim
NO_IMPERSONATION_TOKEN 12:50:38 jim
Access Token 12:17:10 jim
Primary Access Token 12:15:00 jim
PrimaryGroupID 11:39:57 jim
1.2.840.113556.1.4.98 11:36:09 jim
RID 11:26:00 jim
Relative IDentifier 11:25:43 jim Relative ID ==> Relative IDentifier
Operating System 10:42:59 jim
Well-known Security Identifiers 10:40:44 jim
27.03.2018
CachedInteractive 17:27:12 jim