Overview#
We have tried to collect and compile some helpful Examples Documents for reference.We also have a lot of How To documents.
Most of these documents will be linked to this list:
- 2.16.840.1.113719.1.1.5.1.15
- ACL (eDirectory Attribute)
- AND SearchFilter
- API Adoption
- API Development
- API Economy
- API Planing
- API Portal
- API-Gateway
- AS Exchange
- Abstraction
- Acceptable Use
- Account Usability Request Control
- Accountability
- Accountable vs responsible
- Act (Actor) Claim
- Active Directory Account Lockout
- Active Directory Computer Related LDAP Query
- Active Directory Group Related Searches
- Active Directory Schema Related LDAP Searches
- Active Directory User Related Searches
- Active Directory and Passwords
- Aggregate
- Ambiguous Name Resolution
- Apache Web Server and LDAP
- AppAuth
- Application Directory Partitions
- ApproxMatch
- Artificial Neural network
- Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
- AssociatedDomain
- Assurance Level
- Asymmetric Key Cryptography
- At_hash
- Attack
- Attribute Based Access Control
- Attribute Options
- Attribute Type Description
- Attribute references
- AttributeType Description
- AttributeTypes
- Auditory Learning
- Authenticated Protected Channel
- Authentication
- Authoritative Entity
- Authorization
- Authorization Request
- Authorization Response
- B003281
- BIT STRING
- BUS
- Bank Secrecy Act
- BaseObject
- Bash
- Basic JNDI Search
- Basic JNDI Search with Administration Account
- Behavioral analytics
- Best Current Practice
- Best Practices For Unique Identifiers
- BeyondCorp
- Binary
- Biometric Enrollment
- Biometric Passport
- Bit String
- Bitcoin address
- Bitmask
- Bitwise AND
- Bitwise NOT
- Bitwise OR
- Bitwise XOR
- Block Cipher Mode
- BootableDevice
- CA Directory
- CTAP2
- Capacity
- Case-insensitive
- Case-sensitive
- Certificate Fingerprint
- Certificate Pinning
- Circuit switching
- Claim
- Class
- Class-Break
- Classification
- Classification and Regression Trees
- Client Device
- Cloud Access Security Broker
- Co
- Code
- Code Point
- Code injection
- Code_challenge_method
- Common Object Request Broker Architecture
- Complex Attribute
- Configuration Directory Partition
- Consent Receipts
- Consent vs Authorization
- Containerization
- Converting AD Times
- Converting Certificate Formats
- Cookie
- Cost function
- Counter_LDAPSyntax
- Country Calling Code
- Country String
- Create Read Update Delete
- Creating KMO Signed By An External Certificate Authority
- Credential
- Credential Stuffing
- Cross Origin Resource Sharing
- Cryptographic Collision
- Cryptographic Primitive
- Custodian
- Custom URI scheme
- Cyclic Inheritance
- DID Authentication
- DID Service Endpoint
- DID Subject
- DIT Content Rule
- DN Syntax
- DNS Certification Authority Authorization
- DNS cache poisoning
- DNS over HTTPS
- DOT.FDN
- Data Classification
- Data Leakage
- Data Origin
- Data Ownership
- Data Privacy
- Data Processor
- Data representation
- Data-lake
- Decentralized Autonomous Organization
- Decentralized Identifier
- Delete Modification-type
- Delivery Method
- Device Inventory Service
- Diffie-Hellman
- Diffie-Hellman key-exchange
- Digital Identity
- Digital Identity Acceptance Policy
- Digital Subject
- DirXML Calling Java Example
- DirXML Examples
- DirXML event
- DirectoryString
- Disintermediation
- Distinguished Names
- Distributed Consensus
- Distributed system
- Distributism
- Domain-based Message Authentication, Reporting & Conformance
- DomainComponent
- DomainKeys Identified Mail
- Dxcmd
- E.164
- EDirectory Installation
- EDirectory Version
- EXtensible Resource Descriptor Sequence
- Edirectory Extensible Match Rules
- Edirectory Indexes
- Electronic Identity Credential
- Electronic Medical Record
- Encryption
- Entitlement Example
- Entitlement Management System
- Entity
- Environment
- Ephemeral Device
- Episodic Learning
- Equality SearchFilter
- EqualityMatch
- Escaping Distinguished Name
- Etag
- Event Transformation Policy Set
- Example - Active Directory Change Password JNDI
- Example Certificate
- Example Custom IDM Event For XDAS
- Example NSSWITCH.CONF File
- Example code
- Example.com
- Examples Using chmod
- Examples of Evidence
- Extended Flags
- ExtendedKeyUsage
- ExtensibleMatch
- FLAIM Attribute Containerization
- Federated Authorization for UMA 2.0
- Federated Credential
- Feedback
- Files In Dib Directory
- Filtering for Bit Fields
- Fixed-point
- Frame
- Fully Qualified Domain Name
- Function
- GCP IAM Policy
- GCP Resource
- Gateway
- General Data Protection Regulation
- GeneralizedTime
- Google Cloud IAM
- Google Cloud Storage
- Google Group
- Graded Authentication
- GraphQL
- Greater-Or-Equal SearchFilter
- Group Signatures
- GroupOfUniqueNames vs groupOfNames
- Guidelines for Writing RFC Text on Security Considerations
- HIPAA Covered Entity
- HTTP Header Field
- HTTP Method
- HTTP Referer
- Historic
- Home Location Register
- Homomorphic Encryption
- How To
- How To Use The Password Policy Control
- Human-palatable
- Hybrid Flow
- Hybrid cryptosystem
- I-name
- I-number
- IAM Project Intangibles
- IDN homograph attack
- IDP Metadata
- INVALID_RESPONSE
- ISO 3166-1 alpha-2
- ISO 8601
- Idempotent
- Identity Attributes
- Identity Custodian
- Identity Document
- Identity Mixer
- Identity Proofing
- Identity Sovereignty
- Identity Trust Framework
- Identity questions
- Implicit Scopes
- Import Conversion Export
- Incremental authorization
- Interface Description Language
- Intermediary
- International Mobile Equipment Identity
- International Standard Recording Code
- Internationalized Resource Identifiers
- Internet Protocol Address
- Internet Standard
- JNDI As a Service
- JNDI Examples
- JNDI LDAP Example Add with Administration Account
- JNDI Utilities Class
- JOSE-Cookbook
- JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants
- JSON Web Tokens
- JSON-LD
- JSON-LD Examples
- JavaCodeSetSimplePassword
- Javascript Object Signing and Encryption
- Jwks_uri
- Key
- Key Life cycle
- Key Management
- KeyAgreement
- KeyEncipherment
- Keytool
- Krb5.conf
- LDAP Data Interchange Format
- LDAP Filter Choices
- LDAP Modify-Increment Extension
- LDAP Post-Read Control
- LDAP Query Advanced Examples
- LDAP Query Basic Examples
- LDAP Query Examples
- LDAP Query Examples for AD
- LDAP URL
- LDAP ping
- LDAPSEARCH
- LDAP_MATCHING_RULE_DN_WITH_DATA
- LDAP_MATCHING_RULE_IN_CHAIN
- LDAP_NOT_SUPPORTED
- LDAP_SERVER_EXTENDED_DN_OID
- LDAP_SERVER_RANGE_OPTION_OID
- LDAP_TYPE_OR_VALUE_EXISTS
- LDAPs and AD
- LDIF Example
- LDIF Examples Of NIS Migrated Entries
- LDIF Schema Modifications
- LDIF to Bulk Load Test Users
- LSA Protection
- Language-Tag
- Law Enforcement Consideration
- Law of Consistent Experience Across Contexts
- Learning
- LessThan-Or-Equal SearchFilter
- Level Of Assurance
- Linked Data
- Linked Data Signatures
- Linux Boot Process
- Linux Files and File Permissions
- Locale
- Locked By Intruder
- Login_hint_token
- Logout Token
- Loopback Interface Redirection
- Loss function
- MAD Determine the Classes Associated With an Entry
- Matched Values Control
- Matrix multiplication
- MaxRingDelta
- Maximum Database Record Size
- Media-type
- Medicare Beneficiary Identifier
- Method
- Metrics
- Microservice
- Microsoft Active Directory Extensible Match Rules
- Mobile Station International Subscriber Directory Number
- Modrdn
- Monte Carlo algorithm
- Motor Learning
- MyStartPage
- N11
- NDSTRACE Examples
- NICI Configuration Files
- NOT SearchFilter
- NSPM Setting Challenge Answers
- Name Registration Scheme
- Nds.conf
- Ndsconfig
- No CVM required
- Non-interactive
- Novell IDM Driver Filters
- Novell-getcore
- NspmConfigurationOptions
- Ntdsutil.exe
- Number Plan Area
- NumericString
- OAuth 2.0 Client Registration
- OAuth 2.0 Token Introspection
- OAuth Public Client
- OAuth Scope Example
- OAuth Scope Validation
- OAuth Scopes
- OID and Intruder Detection
- OR SearchFilter
- ObjectGUID
- Observational Learning
- Obtain a Certificate from Server
- Official Name
- Offset Codebook Mode
- OpenID Connect Claims
- OpenID Connect Client Initiated Backchannel Authentication Flow
- OpenID Connect Mobile Discovery Profile
- OpenID Connect Scopes
- OpenSSL Commands
- Openid-configuration
- Optic Nerve
- Our Lost Constitution
- Packet
- Padded
- Passing Credentials To Imanager
- Passwd
- Password Character Composition
- Password Life Time
- Password Validator
- PasswordPolicyRequest
- Passwords Using LDIF
- Payment Card
- Perl LDAP Samples
- Perl LDAPS and Certificates
- Phishing
- Phone Number Portability
- Physical Layer
- Physiological Characteristics
- Platform Authenticator
- Policy Based Management System
- Popup Style
- Postal Address_LDAPSyntax
- Presence SearchFilter
- Presentation Layer
- PresentationAddress
- Privacy Considerations Distributed Ledger Technology
- Privacy Enhancing Technologies
- Privacy and Economics
- Private URI Scheme
- Private-Use URI Scheme Redirection
- Privileged Scope
- Product
- Proffer
- Protocol Server
- Prototyping
- Pseudorandom
- Public Claim Names
- Public data
- Punycode
- REAL ID
- RFC 2119
- RFC 2606
- RFC 7520
- Random
- Reasoning
- Red Green Refactor
- Refresh Token
- Regulatory Risk
- Relational Learning
- Relative Distinguished Name
- Reliability
- Reliable protocol
- Relying Party
- Remote Authentication Dial-In User Service
- Representational State Transfer
- Requesting Attributes by Object Class
- Resource Action
- Response_mode
- Retrieving Constructed Attributes
- Retrieving RootDSE
- Rfc822Name
- Roaming Authenticator
- RootDSE Example
- SAML V2.0
- SASL
- SCIM Attributes
- SCIM Create Request
- SCIM Delete Request
- SCIM Filtering
- SCIM Group
- SCIM Pagination
- SCIM Read Request
- SCIM Replace Request
- SCIM Resource Example
- SCIM Search Request
- SCIM ServiceProviderConfig endpoint
- SCIM User
- SCIM meta.ResourceType
- SDIDIAG
- SDIDIAGSwitches
- SFSafariViewController
- SQL Injection
- SSL Handshake Failed
- SSL-TLS Interception
- S_hash
- Same-Document Reference
- Schema.org
- Scopes vs Claims
- Scopes_supported
- Search Using the Get Effective Rights Control
- Search Using the Simple Paged Results Control
- Searching Using the Manage DSAITControl
- Secure MIME
- Security Account Manager
- Security Domain Infrastructure
- Security Identifier
- Security Support Provider Interface
- Security Token
- Separation of Duty
- Service Account
- Session
- Session Management
- Side-channel attacks
- Sign in with Apple
- Simple Paged Results Control
- Simple Password
- SingleLevel
- Social network
- Spatial Learning
- Special-Use Domain Names
- Standards Based SSO
- Stimulus-Response
- Strict-Transport-Security
- Structured Syntax Suffix
- Subject_token_type
- Substring Search Filter
- Substrings
- Subtree Delete Control
- Supertype
- System Access Control using LDAP backed NIS Netgroups
- System Metrics
- Telephone Number LDAP Syntax
- Tensors
- The LDAP Controller
- The Laws of Relationships
- Third-party Identity Provider
- Timeout
- Timezone
- Token Binding over HTTP
- Tomcat And LDAP
- Training dataset
- Transport-layer Security Mechanism
- Trapdoor Function
- Treatment, Payment and Health care Operations
- UMA 2.0 Grant for OAuth 2.0 Authorization
- URI Fragment Identifiers
- URI Path
- URL
- UUID
- Ui_locales
- Unclassified
- Understanding Name Forms
- Unidirectional identifier
- United Nations Standard Products and Services Code
- UniversalPasswordSecretBits
- Unreliable protocol
- UsedBy
- User Layer
- User-agent
- User-centric Identity
- Using LDAPS With JNDI
- Value Object
- Verifiable Claims
- Verify DNS Records
- Verifying Certificate Signatures
- Verinym
- Virtual List View Control
- Web Blog_blogentry_021017_1
- Web Blog_blogentry_130418_1
- Web Blog_blogentry_160718_1
- Web Blog_blogentry_210916_1
- Web Blog_blogentry_220815_1
- Web Blog_blogentry_300918_1
- Web host-meta data
- Web of Trust
- WebAuthn Attestation
- WebAuthn Authenticator Model
- WebAuthn Client Device
- WebFinger
- WholeSubtree
- WikiVariables
- Windows Authentication Package
- Windows Logon
- XDAS Authentications
- XDAS Trust Management Events
- XDAS for eDirectory
- XDS Document
- XPATH Examples