Examples
Overview
#
We have tried to collect and compile some helpful Examples Documents for reference.
We also have a lot of
How To
documents.
Most of these documents will be linked to this list:
2.16.840.1.113719.1.1.5.1.15
ACL (eDirectory Attribute)
AND SearchFilter
API Adoption
API Development
API Economy
API Planing
API Portal
API-Gateway
AS Exchange
Abstraction
Acceptable Use
Account Usability Request Control
Accountability
Accountable vs responsible
Act (Actor) Claim
Active Directory Account Lockout
Active Directory Computer Related LDAP Query
Active Directory Group Related Searches
Active Directory Schema Related LDAP Searches
Active Directory User Related Searches
Active Directory and Passwords
Aggregate
Ambiguous Name Resolution
Apache Web Server and LDAP
AppAuth
Application Directory Partitions
ApproxMatch
Artificial Neural network
Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
AssociatedDomain
Assurance Level
Asymmetric Key Cryptography
At_hash
Attack
Attribute Based Access Control
Attribute Options
Attribute Type Description
Attribute references
AttributeType Description
AttributeTypes
Auditory Learning
Authenticated Protected Channel
Authentication
Authoritative Entity
Authorization
Authorization Request
Authorization Response
B003281
BIT STRING
BUS
Bank Secrecy Act
BaseObject
Bash
Basic JNDI Search
Basic JNDI Search with Administration Account
Behavioral analytics
Best Current Practice
Best Practices For Unique Identifiers
BeyondCorp
Binary
Biometric Enrollment
Biometric Passport
Bitcoin address
Bitmask
Bitwise AND
Bitwise NOT
Bitwise OR
Bitwise XOR
Block Cipher Mode
BootableDevice
CA Directory
CTAP2
Capacity
Case-insensitive
Case-sensitive
Certificate Fingerprint
Certificate Pinning
Circuit switching
Claim
Class
Class-Break
Classification
Classification and Regression Trees
Client Device
Cloud Access Security Broker
Co
Code
Code Point
Code injection
Code_challenge_method
Common Object Request Broker Architecture
Complex Attribute
Configuration Directory Partition
Consent Receipts
Consent vs Authorization
Containerization
Converting AD Times
Converting Certificate Formats
Cookie
Cost function
Counter_LDAPSyntax
Country Calling Code
Country String
Create Read Update Delete
Creating KMO Signed By An External Certificate Authority
Credential
Cross Origin Resource Sharing
Cryptographic Collision
Cryptographic Primitive
Custodian
Custom URI scheme
Cyclic Inheritance
DID Authentication
DID Service Endpoint
DID Subject
DIT Content Rule
DN Syntax
DNS Certification Authority Authorization
DNS cache poisoning
DNS over HTTPS
DOT.FDN
Data Classification
Data Leakage
Data Origin
Data Ownership
Data Privacy
Data Processor
Data representation
Data-lake
Decentralized Autonomous Organization
Decentralized Identifier
Delete Modification-type
Delivery Method
Device Inventory Service
Diffie-Hellman
Diffie-Hellman key-exchange
Digital Identity
Digital Identity Acceptance Policy
Digital Subject
DirXML Calling Java Example
DirXML Examples
DirXML event
DirectoryString
Disintermediation
Distinguished Names
Distributed Consensus
Distributed system
Distributism
Domain-based Message Authentication, Reporting & Conformance
DomainComponent
DomainKeys Identified Mail
Dxcmd
E.164
EDirectory Installation
EDirectory Version
EXtensible Resource Descriptor Sequence
Edirectory Extensible Match Rules
Edirectory Indexes
Electronic Identity Credential
Electronic Medical Record
Encryption
Entitlement Example
Entitlement Management System
Entity
Environment
Ephemeral Device
Episodic Learning
Equality SearchFilter
EqualityMatch
Escaping Distinguished Name
Etag
Event Transformation Policy Set
Example - Active Directory Change Password JNDI
Example Certificate
Example Custom IDM Event For XDAS
Example NSSWITCH.CONF File
Example code
Example.com
Examples Using chmod
Examples of Evidence
Extended Flags
ExtendedKeyUsage
ExtensibleMatch
FLAIM Attribute Containerization
Federated Authorization for UMA 2.0
Federated Credential
Feedback
Files In Dib Directory
Filtering for Bit Fields
Fixed-point
Frame
Fully Qualified Domain Name
Function
GCP IAM Policy
GCP Resource
Gateway
General Data Protection Regulation
GeneralizedTime
Google Cloud IAM
Google Cloud Storage
Google Group
Graded Authentication
GraphQL
Greater-Or-Equal SearchFilter
Group Signatures
GroupOfUniqueNames vs groupOfNames
Guidelines for Writing RFC Text on Security Considerations
HIPAA Covered Entity
HTTP Header Field
HTTP Method
HTTP Referer
Historic
Home Location Register
Homomorphic Encryption
How To
How To Use The Password Policy Control
Human-palatable
Hybrid Flow
Hybrid cryptosystem
I-name
I-number
IAM Project Intangibles
IDN homograph attack
IDP Metadata
INVALID_RESPONSE
ISO 3166-1 alpha-2
ISO 8601
Idempotent
Identity Attributes
Identity Custodian
Identity Document
Identity Mixer
Identity Proofing
Identity Sovereignty
Identity Trust Framework
Identity questions
Implicit Scopes
Import Conversion Export
Incremental authorization
Interface Description Language
Intermediary
International Mobile Equipment Identity
International Standard Recording Code
Internationalized Resource Identifiers
Internet Protocol Address
Internet Standard
JNDI As a Service
JNDI Examples
JNDI LDAP Example Add with Administration Account
JNDI Utilities Class
JOSE-Cookbook
JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants
JSON Web Tokens
JSON-LD
JSON-LD Examples
JavaCodeSetSimplePassword
Javascript Object Signing and Encryption
Jwks_uri
Kernel namespaces
Key
Key Life cycle
Key Management
KeyAgreement
KeyEncipherment
Keytool
Krb5.conf
LDAP Data Interchange Format
LDAP Filter Choices
LDAP Modify-Increment Extension
LDAP Post-Read Control
LDAP Query Advanced Examples
LDAP Query Basic Examples
LDAP Query Examples
LDAP Query Examples for AD
LDAP URL
LDAP ping
LDAPSEARCH
LDAP_MATCHING_RULE_DN_WITH_DATA
LDAP_MATCHING_RULE_IN_CHAIN
LDAP_NOT_SUPPORTED
LDAP_SERVER_EXTENDED_DN_OID
LDAP_SERVER_RANGE_OPTION_OID
LDAP_TYPE_OR_VALUE_EXISTS
LDAPs and AD
LDIF Example
LDIF Examples Of NIS Migrated Entries
LDIF Schema Modifications
LDIF to Bulk Load Test Users
LSA Protection
Language-Tag
Law Enforcement Consideration
Law of Consistent Experience Across Contexts
Learning
LessThan-Or-Equal SearchFilter
Level Of Assurance
Linked Data
Linked Data Signatures
Linux Boot Process
Linux Files and File Permissions
Locale
Locked By Intruder
Login_hint_token
Logout Token
Loopback Interface Redirection
Loss function
MAD Determine the Classes Associated With an Entry
Matched Values Control
Matrix multiplication
MaxRingDelta
Maximum Database Record Size
Media-type
Medicare Beneficiary Identifier
Method
Metrics
Microservice
Microsoft Active Directory Extensible Match Rules
Mobile Station International Subscriber Directory Number
Modrdn
Monte Carlo algorithm
Motor Learning
MyStartPage
N11
NDSTRACE Examples
NICI Configuration Files
NOT SearchFilter
NSPM Setting Challenge Answers
Name Registration Scheme
Nds.conf
Ndsconfig
No CVM required
Non-interactive
Novell IDM Driver Filters
Novell-getcore
NspmConfigurationOptions
Ntdsutil.exe
Number Plan Area
NumericString
OAuth 2.0 Client Registration
OAuth 2.0 Token Introspection
OAuth Public Client
OAuth Scope Example
OAuth Scope Validation
OAuth Scopes
OID and Intruder Detection
OR SearchFilter
Object ACL
ObjectGUID
Observational Learning
Obtain a Certificate from Server
Official Name
Offset Codebook Mode
OpenID Connect Claims
OpenID Connect Client Initiated Backchannel Authentication Flow
OpenID Connect Mobile Discovery Profile
OpenID Connect Scopes
OpenSSL Commands
Openid-configuration
Optic Nerve
Our Lost Constitution
Packet
Padded
Passing Credentials To Imanager
Passwd
Password Character Composition
Password Life Time
Password Validator
PasswordPolicyRequest
Passwords Using LDIF
Payment Card
Perl LDAP Samples
Perl LDAPS and Certificates
Phishing
Phone Number Portability
Physical Layer
Physiological Characteristics
Platform Authenticator
Policy Based Management System
Popup Style
Postal Address_LDAPSyntax
Presence SearchFilter
Presentation Layer
PresentationAddress
Privacy Considerations Distributed Ledger Technology
Privacy Enhancing Technologies
Privacy and Economics
Private URI Scheme
Private-Use URI Scheme Redirection
Privileged Scope
Product
Proffer
Proof of Ownership
Protocol Server
Prototyping
Pseudorandom
Public Claim Names
Public data
Punycode
REAL ID
RFC 2119
RFC 2606
RFC 7520
Random
Reasoning
Red Green Refactor
Refresh Token
Regulatory Risk
Relational Learning
Relative Distinguished Name
Reliability
Reliable protocol
Relying Party
Remote Authentication Dial-In User Service
Representational State Transfer
Requesting Attributes by Object Class
Resource Action
Response_mode
Retrieving Constructed Attributes
Retrieving RootDSE
Rfc822Name
Roaming Authenticator
RootDSE Example
SAML V2.0
SASL
SCIM Attributes
SCIM Create Request
SCIM Delete Request
SCIM Filtering
SCIM Group
SCIM Pagination
SCIM Read Request
SCIM Replace Request
SCIM Resource Example
SCIM Search Request
SCIM ServiceProviderConfig endpoint
SCIM User
SCIM meta.ResourceType
SDIDIAG
SDIDIAGSwitches
SFSafariViewController
SI Derived Unit
SQL Injection
SSL Handshake Failed
SSL-TLS Interception
S_hash
Same-Document Reference
Schema.org
Scopes vs Claims
Scopes_supported
Search Using the Get Effective Rights Control
Search Using the Simple Paged Results Control
Searching Using the Manage DSAITControl
Secure MIME
Security Account Manager
Security Domain Infrastructure
Security Identifier
Security Support Provider Interface
Security Token
Separation of Duty
Service Account
Session
Session Management
Side-channel attacks
Sign in with Apple
Simple Paged Results Control
Simple Password
SingleLevel
Social network
Spatial Learning
Special-Use Domain Names
Standards Based SSO
Stimulus-Response
Strict-Transport-Security
Structured Syntax Suffix
Subject_token_type
Substring Search Filter
Substrings
Subtree Delete Control
Supertype
System Access Control using LDAP backed NIS Netgroups
System Metrics
Telephone Number LDAP Syntax
Tensors
The LDAP Controller
The Laws of Relationships
Third-party Identity Provider
Timeout
Timezone
Token Binding over HTTP
Tomcat And LDAP
Training dataset
Transport-layer Security Mechanism
Trapdoor Function
Treatment, Payment and Health care Operations
UMA 2.0 Grant for OAuth 2.0 Authorization
URI Fragment Identifiers
URI Path
URL
UUID
Ui_locales
Unclassified
Understanding Name Forms
Unidirectional identifier
United Nations Standard Products and Services Code
United States Dollar
UniversalPasswordSecretBits
Unreliable protocol
UsedBy
User Layer
User-agent
User-centric Identity
Using LDAPS With JNDI
Value Object
Verifiable Claims
Verify DNS Records
Verifying Certificate Signatures
Verinym
Virtual List View Control
Web host-meta data
Web of Trust
WebAuthn Attestation
WebAuthn Authenticator Model
WebAuthn Client Device
WebFinger
WholeSubtree
WikiVariables
Windows Authentication Package
Windows Logon
XDAS Authentications
XDAS Trust Management Events
XDAS for eDirectory
XDS Document
XPATH Examples
Please see our
Copyright And Intellectual Property Page
and
Standard Disclaimer
Pages!