Search results

Jump to navigation Jump to search
  • Establish a user’s identity with an Identity Provider (IdP) role and a Relying Party (RP) role. This case is specifically designe * Relying parties (RP) - a provider of services to the user.
    5 KB (810 words) - 04:00, 28 June 2018
  • role policy enforcement ...iations to be approved, etc. This periodic checking process is called role policy enforcement.
    135 KB (15,051 words) - 04:00, 28 June 2018
  • ...licy and is permitted by only authorized system entities according to that policy. ...viding for regular dealings and services between a Principal and a service provider [Merriam-Webster]</nowiki>
    845 KB (86,833 words) - 04:00, 28 June 2018
  • ...nd attribute information gathered from the Identity Provider and Attribute Provider. ...often dictates a specific authentication solution in order for the service provider to authenticate the user.
    7 KB (1,007 words) - 03:58, 28 June 2018
  • '''Title''': FICAM Trust Framework Provider Adoption Process (TFPAP) For Levels of Assurance 1, 2, and Non-PKI 3 '''Category''': Relying Party Policy
    3 KB (373 words) - 23:01, 18 February 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)