Search results
Jump to navigation
Jump to search
- '''Security''': ...rust Identity]], [[Security Token]], [[Signed Security Token]], [[Unsigned Security Token]], [[Proof-of-possession]], [[Integrity]], [[Confidentiality]], [[Dig1 KB (112 words) - 04:02, 28 June 2018
- '''Title''': Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0 '''URL''': http://docs.oasis-open.org/security/saml/v2.0/saml-glossary-2.0-os.pdf2 KB (226 words) - 04:02, 28 June 2018
- RFC 6819, OAuth 2.0 Threat Model and Security Considerations service, either on behalf of a resource owner by orchestrating an approval interact2 KB (193 words) - 21:30, 24 July 2020
- ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES - '''''draft'''''== *David Temoshok reviewed the SALS Program Overview with the Security Committee.7 KB (1,031 words) - 04:02, 28 June 2018
- ...ovider which can exist either as a part of the user agent on in some cloud service. This use case considers the former implementation. In either implementatio ...(RP): A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes12 KB (2,056 words) - 20:35, 27 November 2019
- ...(RP): A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes ...hnologies that may be used by the relying party and the various providers. Security Token Services typically provide token translation services. For example s14 KB (2,167 words) - 01:45, 15 May 2021
- ...stry compatible database. Searches can be done on services, companies, and service category. The method describes how people can determine the current members ...to rely on certain assertions by other actors to fulfill their information security requirements." In this document the objective is simply to allow two digita21 KB (3,285 words) - 23:37, 15 January 2020
- ...to provide identification or personal information to gain access to a web service. This pattern specifically focuses on the interaction with a relying party ...Party (RP):''' An entity that needs a collection of claims to provide that service; the RP might rely on a collection of claims from different identity or att24 KB (3,856 words) - 16:05, 16 December 2021
- ...t calculate the tradeoffs among security, privacy, and gaining access to a service they desire." Page 128 KB (1,190 words) - 16:21, 27 May 2020
- * [https://playbook.cio.gov/ U.S. Digital Service Digital Playbook] ...2016/NIST.IR.8080.pdf NIST Interagency Report (NISTIR) 8080, Usability and Security Considerations for Public Safety Mobile Authentication]7 KB (944 words) - 20:05, 11 April 2018
- ...this community as well as greater social cohesion and internet-wide cyber-security. 6 Any Relying Party or Service Provider in the IDESG Identity Ecosystem that complies with the NSTIC princ13 KB (1,990 words) - 21:48, 5 December 2020
- This design pattern assumes the use of a device connected to internet service providers as described in the [[Design Pattern: Common to any Internet Iden ...):''' A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes17 KB (2,712 words) - 19:20, 28 November 2021
- *Terms of Service and Privacy Statements are shown on user sites and occasionally positive us *Organizations, such as financial institutions, offer a service to give user notification of specific status changes, which the user is typ13 KB (2,151 words) - 00:14, 30 October 2020
- This design pattern assumes the use of a device connected to internet service providers as described in the [[Design Pattern: Common to any Internet Iden ...):''' A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes9 KB (1,467 words) - 20:46, 9 September 2018
- ...other service providers that interact with the user. Connections that the service providers have beyond the user connection are not indicated as all data sen This design pattern assumes the use of a device connected to internet service providers as described in the [[Design Pattern: Common to any Internet Iden11 KB (1,838 words) - 16:48, 19 January 2016
- ...th a community identity card so they are welcomed as part of the community service system that coordinates social services. ...for them to use to assert their identity; the process will be privacy and security compliant.3 KB (399 words) - 18:50, 13 May 2020