< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] access control account linking, identity federation and ACS(Access Control Services) addresses SAML problems with 2nd 3rd 4th ADS (Advertisement and Discovery of Services) AES (Algorithms Advanced Encryption Standard) AES encryption algorithm 2nd AgreementMethod element (XML Encryption) 2nd 3rd algorithms AES encryption algorithm 2nd DES encryption algorithm 2nd DSA Signatures SHA-1 2nd UsernameToken PasswordDigest 2nd 3rd 4th 5th 6th application integration 2nd 3rd 4th 5th 6th B2B 2nd 3rd B2C 2nd 3rd enterprise applications 2nd Arbitrary Resource Attachment, WS Policy architecture service-oriented assertions WS-SecurityPolicy Confidentiality 2nd 3rd 4th 5th Integrity 2nd 3rd 4th 5th 6th MessageAge 2nd SecurityHeader 2nd SecurityToken 2nd 3rd 4th 5th 6th 7th Visibility 2nd WS Policy assertions, SAML elements 2nd XML Schema asymmetric encyrption attachments encryption XML 2nd 3rd 4th 5th SOAP 2nd attribute assertions, SAML 2nd 3rd attribute requests , SAML 2nd authentication 2nd 3rd definition Kerberos requests SAML 2nd shared SSL authentication assertions, SAML 2nd 3rd 4th 5th 6th authentication context (SAML) 2nd 3rd authorization 2nd definition authorization assertions, SAML 2nd 3rd authorization requests, SAML 2nd 3rd 4th 5th |
< Day Day Up > |