Jump to content

User:Paul.j.richardson/Books/Web-Auth-ID-&-Access

From Wikipedia, the free encyclopedia


Web-Authentication-ID-&-Access

[edit]

Web Development - Authentication, Identity, and Access Control

[edit]
Authentication protocol
Basic access authentication
Bcrypt
Central Authentication Service
Challenge-Handshake Authentication Protocol
CRAM-MD5
Crypt (C)
Diameter (protocol)
Directory service
Extensible Authentication Protocol
HMAC-based One-time Password Algorithm
ID-MM7
IEEE 802.1X
Kerberos (protocol)
LAN Manager
List of authentication protocols
LM hash
MS-CHAP
Needham–Schroeder protocol
Neuman–Stubblebine protocol
NT LAN Manager
NTLMSSP
Otway–Rees protocol
Password authentication protocol
POP before SMTP
Protected Extensible Authentication Protocol
RADIUS
RadSec
Reflection attack
Simple Authentication and Security Layer
SMTP Authentication
SPNEGO
TACACS
Ticket Granting Ticket
Universal 2nd Factor
Wide Mouth Frog protocol
Yahalom (protocol)
Access control list
Access Control Matrix
Atomic authorization
Authentication
Authorization (computer access control)
Bell–LaPadula model
Bitium
CCID (protocol)
Closed-loop authentication
Comparison of privilege authorization features
Computational trust
Context-based access control
Copy protection
Credential lag
Cryptographic log on
DACL
Database audit
Delegated administration
Delegation (computer security)
Delegation of Control
Digipass
Digital identity
Discretionary access control
Distributed Access Control System
Draw a Secret
EAuthentication
Federated identity
FinFisher
Form-based authentication
Global Trust Council
Google Authenticator
Hacking Team
HERAS-AF
HTTP cookie
HTTP+HTML form-based authentication
IBM Lightweight Third-Party Authentication
IBM Tivoli Access Manager
ID-WSF
Identity driven networking
Identity provider
Initiative For Open Authentication
Integrated Windows Authentication
Internet Authentication Service
Java Authentication and Authorization Service
LinOTP
Location-based authentication
Logical access control
Login
Login manager
LOMAC
Mandatory access control
MicroID
Microsoft Fingerprint Reader
Mobilegov
Multi-factor authentication
MultiOTP
Mutual authentication
NemID
NIST RBAC model
Numina Application Framework
OAuth
Object-capability model
One-time authorization code
One-time password
OneLogin
Organisation-based access control
PassWindow
Pre-boot authentication
Regin (malware)
Registered user
Restricting Access to Databases
Richacls
Risk-based authentication
Role hierarchy
Rublon
SAML-based products and services
Secure attention key
Security Assertion Markup Language
Security question
Security token
Security token service
Single sign-on
SiteKey
Social login
Software token
Spring Security
Strong authentication
Stuxnet
Subscriber identity module
Time-based One-time Password Algorithm
Transaction authentication
Transaction authentication number
TUPAS
Two factor authentication
Two-step verification
Universal controls
User-Managed Access
Vidoop
VOMS
Wilmagate
WS-Federation
WS-Trust
YubiKey
Access Control Service
Automatic number plate recognition
Biometric passport
Biometrics
Caller ID
City identification card
Claims-based identity
Code wheel
Copy-evident document
Counterfeit consumer goods
Countersign (legal)
Cruise ship ID card
Dialed Number Identification Service
Digital watermarking
DNA barcoding
E-commerce identification and identification types
Passports issued by the European Union candidate states
Expertization
Eye vein verification
FADO
FIDO Alliance
Fingerprint recognition
Geospatial authentication
Guksae
Handwritten biometric recognition
Hylemetry
Levels of Identity Security
Idex ASA
Kaō
List of shibboleths
Manu propria
Molecular marker
MyKad
National identity cards in the European Economic Area
Passports of the European Economic Area
Pre-shared key
Proof of Age Standards Scheme
Protection papers
Protocol for Carrying Authentication for Network Access
Public Register of Travel and Identity Documents Online
Reliance authentication
Seal (East Asia)
Seal (emblem)
Sealing wax
Security hologram
Security printing
Sequence-related amplified polymorphism
SF City ID Card
Shibboleth
Signature
Sproxil
SQRL
Ticket punch
Time-based authentication
Touch ID
Trusted timestamping
Void pantograph
Watermark (data file)
Woo–Lam
Access control
Access structure
Airport security
Ambient authority
Anti-hijack system
Attribute-based access control
AuthenTec
BCODE
Block (Internet)
Capability-based security
Cardkey
Computer access control
Corporate Emergency Access System
Covenant Aviation Security
Dynamic secrets
Entry wristband
Exit control lock
Gated community
IP access controller
IP reader
Patch-through access
Piggybacking (security)
Role-based access control
Supplemental access control
Time-delay combination locks
Turnstile
Two-man rule
UniKey
Video door-phone
Visitor management
Von Duprin
Identity document
Digital rights management
4C Entity
Active Directory Rights Management Services
Ray Adams
Against DRM license
Aladdin Knowledge Systems
Always-on DRM
Analog hole
Audio Home Recording Act
Broadcast encryption
CcREL
CEG TEK International
Compliance and Robustness
Conax
Conditional access
Content Scramble System
Content-control software
Defective by Design
Denuvo
Digital distribution
Digital locker
Digital Entertainment Content Ecosystem
The Digital Imprimatur
Digital video fingerprinting
DIVX
Software protection dongle
DVD region code
Federated content
Hardware restriction
INDICARE
Information rights management
Intertrust Technologies Corporation
Lektz
List of copy protection schemes
Francis Muguet
NTSC-C
Online pass
Open Rights Group
Perpetual access
Protected Media Path
Regional lockout
The Right to Read
Rights Expression Language
Rightscorp, Inc.
Rpmsg
Secure Digital Container
Secure Digital Music Initiative
Seed (sculpture)
Selectable Output Control
Self-Protecting Digital Content
Smart cow problem
Sony BMG copy protection rootkit scandal
Television encryption
Trace vector decoder
Triton (content delivery)
Trymedia
User operation prohibition
XrML
Identity management
Accounts & SSO
Windows CardSpace
CCSO Nameserver
Certification on demand
Common Indexing Protocol
Credential
Dago dazzler
DigiD
Identity 3.0
Directory information tree
Directory System Agent
EduGAIN
Electronic authentication
Facebook real-name policy controversy
Federated Naming Service
ForgeRock
Ganymede (software)
Group (computing)
ID.me
Identity assurance
Identity change
Identity Governance Framework
Identity Interrogation
Identity management system
Identity management theory
Identity score
Identity verification service
IDology
Information Card
Information Card Foundation
Identity intelligence
Light-Weight Identity
List of single sign-on implementations
Scott Mitic
Mobile identity management
Mobile signature
Mobile Signature Roaming
Multi-master replication
Novell Storage Manager
Nymwars
Online identity management
OpenAM
Oracle Identity Management
Organizational unit (computing)
Brand page
Password bank
Password management
Password manager
Privacy
Privacy-enhancing technologies
Profiling (information science)
Service Provisioning Markup Language
Single customer view
System for Cross-domain Identity Management
Trombinoscope
User (computing)
User profile
User provisioning software
Web access management
White pages schema
WISeKey
WS-Security based products and services
OpenID
List of web service specifications
SOAP
Devices Profile for Web Services
Web Services for Remote Portlets
Web Services Distributed Management
WS-Management
Simple Soap Binding Profile
WS-I Basic Profile
Web Services Resource Framework
WS-ReliableMessaging
Web Services Security Kerberos Binding
Web Single Sign-On Interoperability Profile
Web Single Sign-On Metadata Exchange Protocol
Web Services Description Language
JSON-WSP
XML Information Set
XPath
XML namespace
XQuery
SOAP-over-UDP
Message Transmission Optimization Mechanism
WS-Federation Active Requestor Profile
WS-Federation Passive Requestor Profile
P3P
Web service
XACML
Liberty Alliance
Yadis
Athens (access and identity management service)
Centrify
Forefront Identity Manager
FreeIPA
Hitachi ID Identity Manager
IBM Tivoli Identity Manager
Imprivata
MaXware
Microsoft Identity Integration Server
National Health Service Central Register
NetIQ Identity Manager
OpenIDM
Password synchronization
Personal Data Service
SAP NetWeaver Identity Management
Self-service password reset
Windows Identity Foundation
Bandit project
DataPortability
Higgins project
Identity Commons
ISO/IEC JTC 1/SC 37
ISO/IEC JTC 1/SC 27
Kantara Initiative
Mozilla Persona
National Strategy for Trusted Identities in Cyberspace
Shibboleth (Internet2)
The Open Identity Exchange
WebID
ACF2
Apache Shiro
BSD Authentication
Linux PAM
OpenPAM
Pluggable authentication module
U-Prove
Online identity
Apple ID
CoSign single sign on
Credential service provider
Enterprise Sign On Engine
EZproxy
Facebook Platform
Google Account
HP IceWall SSO
JOSSO
Microsoft account
NetIQ Access Manager
OpenSSO
Pubcookie
Sun Java System Access Manager
Ubuntu Single Sign On
OASIS (organization)
Digital Signature Services
Content Assembly Mechanism
Common Alerting Protocol
EbXML
Election Markup Language
Key Management Interoperability Protocol
OpenDocument
Solution Deployment Descriptor
OASIS TOSCA
Universal Business Language
Extensible resource identifier
XDI
Business Process Execution Language
WS-Security
DocBook
Darwin Information Typing Architecture
Directory Services Markup Language
EDXL
XML-RPC
Java API for XML Registries
Web Services Discovery
UNSPSC
S-RAMP
OPML
AS4
Call Control eXtensible Markup Language
Cascading Style Sheets
Character encodings in HTML
Composite Capability/Preference Profiles
Computer Graphics Metafile
Cross-origin resource sharing
CSS Flex Box Layout
CURIE
Device Description Repository
Document Object Model
DOM events
DOM scripting
Efficient XML Interchange
Extensible Forms Description Language
GRDDL
HTML
HTML5
HTML5 in mobile devices
HTTP message body
Hypertext Application Language
Hypertext Transfer Protocol
Indexed Database API
InkML
Internationalization Tag Set
MARIA XML
MathML
Modernizr
Multimodal Architecture and Interfaces
Natural Language Semantics Markup Language
Open Web Platform
Platform for Internet Content Selection
Polyglot markup
Portable Network Graphics
Pronunciation Lexicon Specification
RDF Schema
RDFa
Resource Description Framework
Scalable Vector Graphics
Ajax (programming)
Atom (standard)
Bistro Framework
Enterprise JavaBeans
Generic Security Services Application Program Interface
CAPTCHA
Authenticity in art
Chip Authentication Program
Fingerprint Verification Competition
Geolocation
Identification (information)
OpenID Connect
Public-key cryptography
Provenance
Secret sharing
Secure Remote Password protocol
TCP Wrapper
Host Identity Protocol
Mobile IP
AKA (security)
CAVE-based authentication
Digest access authentication
Password-authenticated key agreement
Encrypted key exchange
Cross-site scripting
Cross-site request forgery
Session (computer science)
HTTPS
Representational state transfer
Session ID
Session (web analytics)
Session poisoning
Session fixation
Transport Layer Security
User agent
Seagull PHP Framework
Snap (web framework)
Flask (web framework)
Web application
Web application framework
Comparison of web application frameworks
Comparison of free software e-commerce web application frameworks
Java view technologies and frameworks
List of content management frameworks
List of content management systems
Content management system
Data Authentication Algorithm
Galois/Counter Mode
Hash-based message authentication code
Public domain software
One-key MAC
MMH-Badger MAC
Message authentication code