Overview#
Context is defined in a dictionary as "The Circumstances in which an event occurs; a setting. The whole situation, background environment relevant to a particular event or personality.""Environment with defined boundary conditions in which entities exist and interact" ISO 29115.
More Information#
There might be more information for this subject on one of the following:- API Development
- API-Gateway
- Access Control Policy
- Access Proxy
- Adaptive Policy-based Access Management
- Adaptive Risk
- Address
- Administrative Identity
- Agent
- Analytics
- Anonymity Set
- Attestation
- Authentication
- Authentication Context Class
- Authentication Context Class Reference
- Authenticator
- Authorization Policy
- B003281
- BTS
- Backpropagation
- Best Practices
- Best Practices For LDAP Naming Attributes
- Book
- Boolean
- Bounded Context
- Business Logic
- Centralized system
- Certificate
- Children
- Clients
- Code
- Cognitive Security
- Community of Interest
- Computer vision
- Consensus
- Consent
- Consent vs Authorization
- Constraint
- Container
- Context Provider
- Contextual Attributes
- Control
- Cryptographic Primitive
- DID Context
- Data Classification
- Data Ownership
- Data Valuation
- Data anonymization
- Data type
- Date Form
- Decentralised system
- Delegation vs Impersonation
- Differences between LDAP 2 and 3 Protocols
- Diffie-Hellman or RSA
- Digital Context
- Digital Identity
- Digital Key
- Digital Subject
- Disability
- Domain Logic
- Encryption
- Enterprise Mobility Management
- Entity
- Environment
- Escape character
- Escaping Distinguished Name
- Events vs Commands
- Everybody
- FLAG_ATTR_NOT_REPLICATED
- Fast Healthcare Interoperability Resources
- Federated Authorization for UMA 2.0
- Financial Data
- Forward Reference
- Gender
- Gmail
- HTTP Request Header
- HTTP Response Header
- Hash Function
- Health information
- Human Right
- Human-Centered Design
- I-number
- IDM The Solution
- IMA Policies
- ISO 19944
- Idempotent
- Identification
- Identifier
- Identity Assurance Level
- Identity Attributes
- Identity Management Architecture
- Identity Verification
- Image
- Implicit Scopes
- Increment
- Indirect Identifier
- Informed Consent
- Infrastructure
- Integer
- Intolerance
- JSON Web Token Claims
- JSON-LD
- JSON-LD Examples
- Kerberos Principal
- Key agreement
- Key-Exchange
- Kubernetes Pod
- LOA 2
- Language Code
- Law
- Law of Consistent Experience Across Contexts
- Law of Minimal Disclosure For A Constrained Use
- Law of Pluralism of Operators and Technologies
- Law of User Control and Consent
- Law of agency
- Length extension attack
- Level of Identity Proofing
- Light-Weight Process
- Link
- Logout Process
- Loss function
- Macaroons
- Meaningless But Unique Number
- Message
- Messaging Layer Security
- Monetization
- Monitoring
- Multi-Source Identity
- NMAS
- Namespace
- Network Attributes
- Node
- Node.js
- Notification
- Nounce or Salt
- Null
- OAuth 2.0 Token Exchange Request
- Observer
- Official Name
- Offline_access
- Ontology
- Opaque token
- Open Standard
- Open-source intelligence
- OpenAM
- OpenID Connect Federation
- OpenID Connect MODRNA Authentication Profile 1.0
- OpenID Connect Provider
- Organization
- Owner
- PIN
- Password Reuse
- Password Validator
- Permid
- Permission
- Persona
- Personal data
- Personally Identifiable Information
- Picture
- Policy Based Management System
- Population
- Principal
- Privacy
- Privacy Considerations
- Privacy Paradox
- Privilege
- Privileged Scope
- Proof of Ownership
- Pseudonym
- Realm
- Reciprocal OAuth
- Redirection
- Relative IDentifier
- Reliable protocol
- Revision
- Rights
- Risk Assessment
- Risk-Based Authentication
- SECURITY_IMPERSONATION_LEVEL
- Schema
- Security
- Security Principal Objects
- Segment
- SerialNumber
- Server
- Service
- Service Account
- Shared Memory
- Software design pattern
- Sub
- Subject Relationship
- The Laws of Relationships
- The Seven Laws Of Identity
- Thread
- Timeout
- Timestamp
- Tokenization
- Trust
- Trust Anchor
- TrustAuthIncoming
- TrustAuthOutgoing
- Trusted Certificate
- Unidirectional identifier
- Unique Identifier
- Universally Unique Identifier
- Unlinkability
- User
- Validation
- Value Object
- Vector
- Vectors of Trust
- Verifiable Claims
- Verification
- Version Control System
- Virtual LAN
- W3C Decentralized Identifiers
- Warning
- Web Hypertext Application Technology Working Group
- Web Origin
- Windows Logon Types