Search results

Jump to navigation Jump to search
  • '''Category''': Cryptographic Protocol Specification [[Category:Cryptographic Protocol Specification]]
    440 bytes (44 words) - 03:58, 28 June 2018
  • '''Category''': Credential Requirements Specification Specification for PIV; SP 800-78, Cryptographic Algorithms and Key Sizes for PIV; SP 800-79, Guidelines
    3 KB (374 words) - 00:25, 24 August 2020
  • Data values, other than keys, that are required to operate cryptographic modules and that need to be protected e.g., a PIN, a pass-phrase, or a key Private data, other than keys, that are required to access cryptographic modules.
    845 KB (86,833 words) - 04:00, 28 June 2018
  • ...some further steps. Typically, this involves the use of a registered SAML protocol binding. This technique is used in the browser/artifact profile of SAML. ...structured data object pointing to a typically larger, variably-sized SAML protocol message. SAML artifacts are designed to be embedded in URLs and conveyed in
    135 KB (15,051 words) - 04:00, 28 June 2018
  • Authentication protocol specification ...access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosur
    1 KB (172 words) - 04:00, 28 June 2018
  • ...ficates and internal directory systems because of its adoption by the IETF protocol [https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol LDAP]. ...ingle sign-on across MIT in 1983. [https://en.wikipedia.org/wiki/Kerberos_(protocol) Kerberos] later surfaced in many commercial identity systems like FreeBSD,
    56 KB (9,154 words) - 00:16, 30 October 2020
  • '''Category''': Trust Framework Provider Specification ...l Management]], [[Credential Service]], [[Credential Service Provider]], [[Cryptographic Token]], [[Electronic Credentials]], [[Electronic Trust Service]], [[Electr
    2 KB (217 words) - 04:02, 28 June 2018
  • ...-announce/afYBtwSr79TXcAhCoO4IXo1ePUg/ Grant Negotiation and Authorization Protocol (GNAP) is a new effort in the IETF] to create a new version to replace [[OA ...particular values to be used in the amr Claim is beyond the scope of this specification. Parties using this claim will need to agree upon the meanings of the value
    16 KB (2,576 words) - 19:23, 24 July 2020