Java Authentication and Authorization Service, or JAAS, pronounced "Jazz", is the Java implementation of the standard Pluggable Authentication Module (PAM)...
8 KB (948 words) - 11:48, 15 June 2022
A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming...
4 KB (416 words) - 17:20, 14 January 2022
Spring Security (redirect from Acegi security framework (Java))
Spring Security is a Java/Java EE framework that provides authentication, authorization and other security features for enterprise applications. The project...
9 KB (807 words) - 00:48, 18 August 2024
also known as the Pluggable Authentication Modules or Java Authentication and Authorization Service (JAAS). Subject descriptor pattern Secure Communication...
7 KB (867 words) - 06:17, 9 May 2024
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms...
7 KB (694 words) - 09:42, 13 March 2024
JBoss Enterprise Application Platform (category Java enterprise platform)
and RMI Security services, including Java Authentication and Authorization Service (JAAS) and pluggable authentication modules (PAM) Web Services and...
18 KB (1,475 words) - 13:45, 30 August 2023
OpenAM (category Free software programmed in Java (programming language))
Multi-factor authentication or to create custom authentication modules based on the JAAS (Java Authentication and Authorization Service) open standard...
12 KB (1,189 words) - 12:54, 22 May 2024
TACACS (category Authentication protocols)
administrator authentication and command authorization, while offering strong support (and is widely used) for end-user authentication, authorization, and accounting...
10 KB (1,232 words) - 22:00, 9 September 2024
The Central Authentication Service (CAS) is a single sign-on protocol for the web. Its purpose is to permit a user to access multiple applications while...
6 KB (697 words) - 20:32, 30 March 2024
Apache Shiro (category Java (programming language) libraries)
1.1.0 on 2010-11-01 Application security Java Authentication and Authorization Service (JAAS) Enterprise JavaBean#Security EJB Container-Managed Security...
6 KB (575 words) - 18:03, 13 January 2024
Atomic Spectrometry Journal of Asia Adventist Seminary Java Authentication and Authorization Service This disambiguation page lists articles associated with...
189 bytes (50 words) - 16:11, 21 March 2021
One-time password (redirect from One-time authorization code)
traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password...
26 KB (3,542 words) - 22:09, 16 September 2024
Interface. Some limitations of GSSAPI are: standardizing only authentication, rather not authorization too; assuming a client–server architecture. Anticipating...
9 KB (945 words) - 14:05, 5 December 2023
Imixs-Workflow (category Free and open-source software)
business process management Java Persistence API vendor independent database access Java Authentication and Authorization Service for security BPMN 2.0 for...
6 KB (744 words) - 22:03, 3 August 2024
frontends and backends. API key Access token Basic access authentication Digest access authentication Claims-based identity HTTP header Concise Binary Object...
20 KB (1,530 words) - 06:20, 11 September 2024
APIs. Authentication and authorization. Some BaaS offer authentication and authorization services that allow developers to easily manage app users. This...
16 KB (1,539 words) - 14:46, 9 July 2024
"Cloud Foundry User Account and Authentication (UAA) Server". cloudfoundry.org. Retrieved 2016-09-09. "Authentication — Dailymotion APIs". www.dailymotion...
12 KB (541 words) - 14:05, 4 January 2024
Google APIs (category Google services)
API or Google Earth API. Usage of all of the APIs requires authentication and authorization using the Oauth 2.0 protocol. Oauth 2.0 is a simple protocol...
6 KB (708 words) - 10:51, 28 July 2024
Shibboleth (software) (category Official website different in Wikidata and Wikipedia)
open-source implementation for identity management and federated identity-based authentication and authorization (or access control) infrastructure based on...
11 KB (1,313 words) - 21:12, 22 May 2024
Below is a list of notable Java programming language technologies (frameworks, libraries)....
17 KB (12 words) - 07:04, 9 August 2024
10-bit Local Fiber 802.11—Wireless LAN A11Y—Accessibility AAA—Authentication Authorization, Accounting AABB—Axis Aligned Bounding Box AAC—Advanced Audio...
91 KB (6,552 words) - 06:17, 14 September 2024
Active Directory (redirect from Active directory authentication module)
provides authentication and authorization mechanisms, and establishes a framework to deploy other related services: Certificate Services, Active Directory...
51 KB (5,295 words) - 14:50, 6 September 2024
PERMIS policies. Authorisation Identity management Java Authentication and Authorization Service (JAAS) Lightweight Directory Access Protocol (LDAP)...
5 KB (582 words) - 13:00, 3 July 2024
Connected Device Configuration (category Java device platform)
optional packages, such as Java Authentication and Authorization Service (JAAS), Java Secure Socket Extension (JSSE), and Java Cryptography Extension (JCE)...
7 KB (786 words) - 17:58, 8 August 2024
OPC Unified Architecture (section Java implementation)
profiles, including authentication, authorization, encryption and checksums Extensible security key management, including X.509, token and password Support...
17 KB (1,764 words) - 16:07, 22 August 2024
NTLM (section Availability and use of NTLM)
protocols intended to provide authentication, integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft LAN...
29 KB (3,405 words) - 19:34, 21 June 2024
private information such as JSON or JavaScript. Possible solutions include: requiring an authentication token in the POST and GET parameters for any response...
95 KB (9,306 words) - 06:04, 19 September 2024
when connecting to a protected service. The former is termed server-side authentication - typically used when authenticating to a web server using a password...
34 KB (4,098 words) - 09:19, 10 July 2024
VNC (section Design and operation)
platform-independent, with clients and servers for many GUI-based operating systems and for Java. Multiple clients may connect to a VNC server at the same time. There...
14 KB (1,765 words) - 13:21, 18 September 2024
a user and protocols and profiles to implement authentication and authorization scenarios. This article has a focus on software and services in the category...
44 KB (851 words) - 20:23, 25 August 2024