Protected Resource
Overview
#
A Protected Resource (or
Target Resource
) for this wiki is a
Resource
to which a
Subject
is attempting to
access
.
More Information
#
There might be more information for this subject on one of the following:
About
Access Card
Access Control
Access Request
Access Token Type
Auth 2.0 Resource Set Registration
Authorization
Authorization API
Authorization Server
Channel Binding
Client Application
Client-Server Exchange
Computational Hardness Assumption
Data subject
Delegation vs Impersonation
Derived Credential
Digital Asset
Explicit Endpoint
Fast Healthcare Interoperability Resources
Graded Authentication
Grant Negotiation and Authorization Protocol
Human Limitation
Impersonation
InCommon
Internet of Things
JML
JWT Authentication
Key
LDAP and Bind Throttling
Level Of Assurance
MSFT Access Token
Mutual TLS Profiles for OAuth Clients
Mutual TLS Sender Constrained Resources Access
NISTIR 8112
OAuth 2.0 Actors
OAuth 2.0 Bearer Token Usage
OAuth 2.0 Client Registration
OAuth 2.0 Message Authentication Code (MAC) Tokens
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
OAuth 2.0 Software Statement
OAuth 2.0 Token Exchange
OAuth 2.0 Token Exchange Request
OAuth 2.0 Token Introspection
OAuth Client
OAuth Token Response
OpenID Connect
OpenID Connect Claims
OpenID Connect Federation
Password Authentication
Primary Access Token
Protected Data
Protection API
Protection API Token
Proxy-Based WAM
RBAC
Real Risk
Registration_endpoint
Requesting Party
Requesting Party Token
Resource
Resource Access Control Facility
Resource Inventory Service
Resource Owner
Resource Server
Resource Set
Risk Assessment
Sarbanes-Oxley Act
Securable object
Security
Security Token Service
Security-constraint
TGS Exchange
Tailgating
Target Resource
Token Binding Protocol
UMA 2.0 Grant for OAuth 2.0
UMA 2.0 Grant for OAuth 2.0 Authorization
User-Managed Access
Why Access Tokens
Zero Trust
Please see our
Copyright And Intellectual Property Page
and
Standard Disclaimer
Pages!