Overview#
Generically, a Resource is a source or supply from which benefit is produced which is often referred to as an "asset".Resource may be any of the following:
For most of the discussions on Ldapwiki, we are probably refer to a Protected Resource or a Resource that a Subject is attempting to access.
Resource may refer to a Information Technology Resources or any physical facilities
Resources are materials or other assets that are transformed to produce benefit and in the process may be consumed or made unavailable.
From a human perspective a natural Resource is anything obtained from the environment to satisfy human needs and wants.
From a broader biological or ecological perspective a Resource satisfies the needs of a living organism (see biological resource).[1]
LDAP ObjectClass Definition#
The ObjectClass Type is defined as:- OID: 2.16.840.1.113719.1.1.6.1.21
- ObjectClass-Name: Resource
- SUP: top
- STRUCTURAL
- MUST:
- MAY:
- Extended Flags:
More Information#
There might be more information for this subject on one of the following:- 2.16.840.1.113719.1.1.4.1.187
- 2.16.840.1.113719.1.1.4.1.28
- 2.16.840.1.113719.1.1.4.1.89
- 2.16.840.1.113719.1.1.6.1.20
- 2.16.840.1.113719.1.1.6.1.21
- 2.16.840.1.113719.1.1.6.1.22
- 2.16.840.1.113719.1.1.6.1.26
- 2.16.840.1.113719.1.1.6.1.42
- 2.16.840.1.113719.1.1.6.1.7
- 2.16.840.1.113719.1.219.6.1
- 2.5.4.10
- 2.5.4.3
- 2.5.4.34
- AB Testing
- API Development
- AS Exchange
- AWS CloudWatch
- AWS Elastic File System
- AWS IAM
- AWS Role
- AWS Serverless Application Repository
- Access
- Access Control
- Access Control List
- Access Control Models
- Access Control Policy
- Access Control Service
- Access Request
- Access Token Validation
- Account
- Active attacker
- Adaptive Risk
- Arbitrary code execution
- Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
- Asset
- Attack Effort
- Attacker
- Authentication
- Authorization
- Authorization Code Flow
- Authorization Header
- Authorized
- Basic Authentication Scheme
- Beneficiary
- BeyondCorp
- Chrome Custom Tabs
- Clinical Data
- Cloud Access Security Broker
- Cloud Pricing
- Cloud Region
- Cloud Zone
- Cloud computing
- Cn
- Computing platform
- Configuration Management
- Content-Security-Policy
- Cross Origin Resource Sharing
- Custodian
- DID Document
- DNS resolvers
- Data
- Data Ownership
- Data Provenance
- Data-centric
- Data-lake
- Debt
- Delegation vs Impersonation
- Description
- Device Inventory Service
- Digital Identity
- Discovery Mechanism
- Distributed Consensus
- Docker
- Domain Name System
- EXtensible Resource Descriptor Sequence
- Elasticity
- Entitlement Example
- Entity
- Etag
- FHIR Resource
- Fast Healthcare Interoperability Resources
- Federated Authorization for UMA 2.0
- Fetch API
- Fiduciary Responsibility
- GCP Resource
- GCP Virtual Private Cloud
- Golden Ticket
- Google Cloud IAM
- Google Cloud Project
- Grant Negotiation and Authorization Protocol
- GraphQL
- HTML link
- HTTP 200
- HTTP 301
- HTTP 304
- HTTP 307
- HTTP 308
- HTTP 403
- HTTP 404
- HTTP 407
- HTTP 410
- HTTP Conditional Request
- HTTP Method
- HTTP OPTIONS
- HTTP Status Code
- Health Relationship Trust
- Hijack
- How passwords are used in Windows
- Hypertext Transfer Protocol
- I-name
- I-number
- IDM Related Compliance Items
- IDM and the Organization Dilemma
- Identity Governance and Administration
- Identity and Access Management
- Implicit Scopes
- InCommon
- Kerberos
- Kerberos Authentication Service
- Kerberos Forged Ticket
- Kubernetes
- Kubernetes Pod
- L
- Lattice Based Access Control
- Light-Weight Process
- Load Balancing
- Local Security Authority
- Local Security Authority Subsystem Service
- MSFT Access Token
- Macaroons
- Muda
- Mura
- Muri
- Mutual TLS Profiles for OAuth Clients
- NIST.SP.800-207
- NMAS
- Name Service
- Network
- Next Generation Access Control
- OAuth 2.0 Actors
- OAuth 2.0 Incremental Authorization
- OAuth 2.0 Security Best Current Practice
- OAuth 2.0 Token Exchange Request
- OAuth 2.0 Use Cases
- OAuth Scope Example
- ObjectClass-Names
- Offline_access
- OpenID Provider Issuer Discovery
- OpenPOWER Foundation
- Opportunistic Attack
- Ou
- Pass-the-ticket
- Passive attacker
- Payment Card Industry Data Security Standard
- Payment Transaction
- Peer-to-peer
- Perfect Security
- Phantom Token Flow
- Policy Based Management System
- Policy Decision Point
- Policy Ignorant Node
- Privileged Scope
- Processes
- Protected Resource
- Provenance
- Proxy Server
- Proxy-Authenticate
- RFC 7644
- Representational State Transfer
- Resource Description Framework
- Resource Inventory Service
- Resource Provisioning
- Resource ReSerVation Protocol
- SECURITY_IMPERSONATION_LEVEL
- SPML
- Scalability
- Security Account Manager
- Security Principal Objects
- Security Reference Monitor
- Server
- Serverless
- Smssmdrclass
- Sovereignty
- System Authorization Facility
- TGS Exchange
- Target Resource
- The Twelve Networking Truths
- The Twelve-Factor App
- Thread pool
- Threat Model
- Ticket Granting Service
- Transparent Proxy
- Trust Tier
- URIs, URLs, and URNs
- URL
- UidNumber
- Unauthorized
- Unfortunate event
- Virtual Private Cloud
- Virtualization method
- W3C Decentralized Identifiers
- WEB Access Management
- WHOIS
- Web Blog_blogentry_031017_1
- Web Blog_blogentry_061218_1
- Web Blog_blogentry_180317_1
- Web Blog_blogentry_280717_1
- Web Linking
- Web Services Resource Framework
- Web host-meta data
- Windows Authentication Package
- XACML
- XDAS Resource Access
- XRP
- Zero Trust
- groupwiselibrary-oid
- groupwiseresource-oid
[#1] Adapted from http://en.wikipedia.org/wiki/Resource
