User:Paul.j.richardson/Books/Web-Auth-ID-&-Access

Web Development - Authentication, Identity, and Access Control

 * Authentication protocol
 * Basic access authentication
 * Bcrypt
 * Central Authentication Service
 * Challenge-Handshake Authentication Protocol
 * CRAM-MD5
 * Crypt (C)
 * Diameter (protocol)
 * Directory service
 * Extensible Authentication Protocol
 * HMAC-based One-time Password Algorithm
 * ID-MM7
 * IEEE 802.1X
 * Kerberos (protocol)
 * LAN Manager
 * List of authentication protocols
 * LM hash
 * MS-CHAP
 * Needham–Schroeder protocol
 * Neuman–Stubblebine protocol
 * NT LAN Manager
 * NTLMSSP
 * Otway–Rees protocol
 * Password authentication protocol
 * POP before SMTP
 * Protected Extensible Authentication Protocol
 * RADIUS
 * RadSec
 * Reflection attack
 * Simple Authentication and Security Layer
 * SMTP Authentication
 * SPNEGO
 * TACACS
 * Ticket Granting Ticket
 * Universal 2nd Factor
 * Wide Mouth Frog protocol
 * Yahalom (protocol)
 * Access control list
 * Access Control Matrix
 * Atomic authorization
 * Authentication
 * Authorization (computer access control)
 * Bell–LaPadula model
 * Bitium
 * CCID (protocol)
 * Closed-loop authentication
 * Comparison of privilege authorization features
 * Computational trust
 * Context-based access control
 * Copy protection
 * Credential lag
 * Cryptographic log on
 * DACL
 * Database audit
 * Delegated administration
 * Delegation (computer security)
 * Delegation of Control
 * Digipass
 * Digital identity
 * Discretionary access control
 * Distributed Access Control System
 * Draw a Secret
 * EAuthentication
 * Federated identity
 * FinFisher
 * Form-based authentication
 * Global Trust Council
 * Google Authenticator
 * Hacking Team
 * HERAS-AF
 * HTTP cookie
 * HTTP+HTML form-based authentication
 * IBM Lightweight Third-Party Authentication
 * IBM Tivoli Access Manager
 * ID-WSF
 * Identity driven networking
 * Identity provider
 * Initiative For Open Authentication
 * Integrated Windows Authentication
 * Internet Authentication Service
 * Java Authentication and Authorization Service
 * LinOTP
 * Location-based authentication
 * Logical access control
 * Login
 * Login manager
 * LOMAC
 * Mandatory access control
 * MicroID
 * Microsoft Fingerprint Reader
 * Mobilegov
 * Multi-factor authentication
 * MultiOTP
 * Mutual authentication
 * NemID
 * NIST RBAC model
 * Numina Application Framework
 * OAuth
 * Object-capability model
 * One-time authorization code
 * One-time password
 * OneLogin
 * Organisation-based access control
 * PassWindow
 * Pre-boot authentication
 * Regin (malware)
 * Registered user
 * Restricting Access to Databases
 * Richacls
 * Risk-based authentication
 * Role hierarchy
 * Rublon
 * SAML-based products and services
 * Secure attention key
 * Security Assertion Markup Language
 * Security question
 * Security token
 * Security token service
 * Single sign-on
 * SiteKey
 * Social login
 * Software token
 * Spring Security
 * Strong authentication
 * Stuxnet
 * Subscriber identity module
 * Time-based One-time Password Algorithm
 * Transaction authentication
 * Transaction authentication number
 * TUPAS
 * Two factor authentication
 * Two-step verification
 * Universal controls
 * User-Managed Access
 * Vidoop
 * VOMS
 * Wilmagate
 * WS-Federation
 * WS-Trust
 * YubiKey
 * Access Control Service
 * Automatic number plate recognition
 * Biometric passport
 * Biometrics
 * Caller ID
 * City identification card
 * Claims-based identity
 * Code wheel
 * Copy-evident document
 * Counterfeit consumer goods
 * Countersign (legal)
 * Cruise ship ID card
 * Dialed Number Identification Service
 * Digital watermarking
 * DNA barcoding
 * E-commerce identification and identification types
 * Passports issued by the European Union candidate states
 * Expertization
 * Eye vein verification
 * FADO
 * FIDO Alliance
 * Fingerprint recognition
 * Geospatial authentication
 * Guksae
 * Handwritten biometric recognition
 * Hylemetry
 * Levels of Identity Security
 * Idex ASA
 * Kaō
 * List of shibboleths
 * Manu propria
 * Molecular marker
 * MyKad
 * National identity cards in the European Economic Area
 * Passports of the European Economic Area
 * Pre-shared key
 * Proof of Age Standards Scheme
 * Protection papers
 * Protocol for Carrying Authentication for Network Access
 * Public Register of Travel and Identity Documents Online
 * Reliance authentication
 * Seal (East Asia)
 * Seal (emblem)
 * Sealing wax
 * Security hologram
 * Security printing
 * Sequence-related amplified polymorphism
 * SF City ID Card
 * Shibboleth
 * Signature
 * Sproxil
 * SQRL
 * Ticket punch
 * Time-based authentication
 * Touch ID
 * Trusted timestamping
 * Void pantograph
 * Watermark (data file)
 * Woo–Lam
 * Access control
 * Access structure
 * Airport security
 * Ambient authority
 * Anti-hijack system
 * Attribute-based access control
 * AuthenTec
 * BCODE
 * Block (Internet)
 * Capability-based security
 * Cardkey
 * Computer access control
 * Corporate Emergency Access System
 * Covenant Aviation Security
 * Dynamic secrets
 * Entry wristband
 * Exit control lock
 * Gated community
 * IP access controller
 * IP reader
 * Patch-through access
 * Piggybacking (security)
 * Role-based access control
 * Supplemental access control
 * Time-delay combination locks
 * Turnstile
 * Two-man rule
 * UniKey
 * Video door-phone
 * Visitor management
 * Von Duprin
 * Identity document
 * Digital rights management
 * 4C Entity
 * Active Directory Rights Management Services
 * Ray Adams
 * Against DRM license
 * Aladdin Knowledge Systems
 * Always-on DRM
 * Analog hole
 * Audio Home Recording Act
 * Broadcast encryption
 * CcREL
 * CEG TEK International
 * Compliance and Robustness
 * Conax
 * Conditional access
 * Content Scramble System
 * Content-control software
 * Defective by Design
 * Denuvo
 * Digital distribution
 * Digital locker
 * Digital Entertainment Content Ecosystem
 * The Digital Imprimatur
 * Digital video fingerprinting
 * DIVX
 * Software protection dongle
 * DVD region code
 * Federated content
 * Hardware restriction
 * INDICARE
 * Information rights management
 * Intertrust Technologies Corporation
 * Lektz
 * List of copy protection schemes
 * Francis Muguet
 * NTSC-C
 * Online pass
 * Open Rights Group
 * Perpetual access
 * Protected Media Path
 * Regional lockout
 * The Right to Read
 * Rights Expression Language
 * Rightscorp, Inc.
 * Rpmsg
 * Secure Digital Container
 * Secure Digital Music Initiative
 * Seed (sculpture)
 * Selectable Output Control
 * Self-Protecting Digital Content
 * Smart cow problem
 * Sony BMG copy protection rootkit scandal
 * Television encryption
 * Trace vector decoder
 * Triton (content delivery)
 * Trymedia
 * User operation prohibition
 * XrML
 * Identity management
 * Accounts & SSO
 * Windows CardSpace
 * CCSO Nameserver
 * Certification on demand
 * Common Indexing Protocol
 * Credential
 * Dago dazzler
 * DigiD
 * Identity 3.0
 * Directory information tree
 * Directory System Agent
 * EduGAIN
 * Electronic authentication
 * Facebook real-name policy controversy
 * Federated Naming Service
 * ForgeRock
 * Ganymede (software)
 * Group (computing)
 * ID.me
 * Identity assurance
 * Identity change
 * Identity Governance Framework
 * Identity Interrogation
 * Identity management system
 * Identity management theory
 * Identity score
 * Identity verification service
 * IDology
 * Information Card
 * Information Card Foundation
 * Identity intelligence
 * Light-Weight Identity
 * List of single sign-on implementations
 * Scott Mitic
 * Mobile identity management
 * Mobile signature
 * Mobile Signature Roaming
 * Multi-master replication
 * Novell Storage Manager
 * Nymwars
 * Online identity management
 * OpenAM
 * Oracle Identity Management
 * Organizational unit (computing)
 * Brand page
 * Password bank
 * Password management
 * Password manager
 * Privacy
 * Privacy-enhancing technologies
 * Profiling (information science)
 * Service Provisioning Markup Language
 * Single customer view
 * System for Cross-domain Identity Management
 * Trombinoscope
 * User (computing)
 * User profile
 * User provisioning software
 * Web access management
 * White pages schema
 * WISeKey
 * WS-Security based products and services
 * OpenID
 * List of web service specifications
 * SOAP
 * Devices Profile for Web Services
 * Web Services for Remote Portlets
 * Web Services Distributed Management
 * WS-Management
 * Simple Soap Binding Profile
 * WS-I Basic Profile
 * Web Services Resource Framework
 * WS-ReliableMessaging
 * Web Services Security Kerberos Binding
 * Web Single Sign-On Interoperability Profile
 * Web Single Sign-On Metadata Exchange Protocol
 * Web Services Description Language
 * JSON-WSP
 * XML Information Set
 * XPath
 * XML namespace
 * XQuery
 * SOAP-over-UDP
 * Message Transmission Optimization Mechanism
 * WS-Federation Active Requestor Profile
 * WS-Federation Passive Requestor Profile
 * P3P
 * Web service
 * XACML
 * Liberty Alliance
 * Yadis
 * Athens (access and identity management service)
 * Centrify
 * Forefront Identity Manager
 * FreeIPA
 * Hitachi ID Identity Manager
 * IBM Tivoli Identity Manager
 * Imprivata
 * MaXware
 * Microsoft Identity Integration Server
 * National Health Service Central Register
 * NetIQ Identity Manager
 * OpenIDM
 * Password synchronization
 * Personal Data Service
 * SAP NetWeaver Identity Management
 * Self-service password reset
 * Windows Identity Foundation
 * Bandit project
 * DataPortability
 * Higgins project
 * Identity Commons
 * ISO/IEC JTC 1/SC 37
 * ISO/IEC JTC 1/SC 27
 * Kantara Initiative
 * Mozilla Persona
 * National Strategy for Trusted Identities in Cyberspace
 * Shibboleth (Internet2)
 * The Open Identity Exchange
 * WebID
 * ACF2
 * Apache Shiro
 * BSD Authentication
 * Linux PAM
 * OpenPAM
 * Pluggable authentication module
 * U-Prove
 * Online identity
 * Apple ID
 * CoSign single sign on
 * Credential service provider
 * Enterprise Sign On Engine
 * EZproxy
 * Facebook Platform
 * Google Account
 * HP IceWall SSO
 * JOSSO
 * Microsoft account
 * NetIQ Access Manager
 * OpenSSO
 * Pubcookie
 * Sun Java System Access Manager
 * Ubuntu Single Sign On
 * OASIS (organization)
 * Digital Signature Services
 * Content Assembly Mechanism
 * Common Alerting Protocol
 * EbXML
 * Election Markup Language
 * Key Management Interoperability Protocol
 * OpenDocument
 * Solution Deployment Descriptor
 * OASIS TOSCA
 * Universal Business Language
 * Extensible resource identifier
 * XDI
 * Business Process Execution Language
 * WS-Security
 * DocBook
 * Darwin Information Typing Architecture
 * Directory Services Markup Language
 * EDXL
 * XML-RPC
 * Java API for XML Registries
 * Web Services Discovery
 * UNSPSC
 * S-RAMP
 * OPML
 * AS4
 * Call Control eXtensible Markup Language
 * Cascading Style Sheets
 * Character encodings in HTML
 * Composite Capability/Preference Profiles
 * Computer Graphics Metafile
 * Cross-origin resource sharing
 * CSS Flex Box Layout
 * CURIE
 * Device Description Repository
 * Document Object Model
 * DOM events
 * DOM scripting
 * Efficient XML Interchange
 * Extensible Forms Description Language
 * GRDDL
 * HTML
 * HTML5
 * HTML5 in mobile devices
 * HTTP message body
 * Hypertext Application Language
 * Hypertext Transfer Protocol
 * Indexed Database API
 * InkML
 * Internationalization Tag Set
 * MARIA XML
 * MathML
 * Modernizr
 * Multimodal Architecture and Interfaces
 * Natural Language Semantics Markup Language
 * Open Web Platform
 * Platform for Internet Content Selection
 * Polyglot markup
 * Portable Network Graphics
 * Pronunciation Lexicon Specification
 * RDF Schema
 * RDFa
 * Resource Description Framework
 * Scalable Vector Graphics
 * Ajax (programming)
 * Atom (standard)
 * Bistro Framework
 * Enterprise JavaBeans
 * Generic Security Services Application Program Interface
 * CAPTCHA
 * Authenticity in art
 * Chip Authentication Program
 * Fingerprint Verification Competition
 * Geolocation
 * Identification (information)
 * OpenID Connect
 * Public-key cryptography
 * Provenance
 * Secret sharing
 * Secure Remote Password protocol
 * TCP Wrapper
 * Host Identity Protocol
 * Mobile IP
 * AKA (security)
 * CAVE-based authentication
 * Digest access authentication
 * Password-authenticated key agreement
 * Encrypted key exchange
 * Cross-site scripting
 * Cross-site request forgery
 * Session (computer science)
 * HTTPS
 * Representational state transfer
 * Session ID
 * Session (web analytics)
 * Session poisoning
 * Session fixation
 * Transport Layer Security
 * User agent
 * Seagull PHP Framework
 * Snap (web framework)
 * Flask (web framework)
 * Web application
 * Web application framework
 * Comparison of web application frameworks
 * Comparison of free software e-commerce web application frameworks
 * Java view technologies and frameworks
 * List of content management frameworks
 * List of content management systems
 * Content management system
 * Data Authentication Algorithm
 * Galois/Counter Mode
 * Hash-based message authentication code
 * Public domain software
 * One-key MAC
 * MMH-Badger MAC
 * Message authentication code