Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Authentication
    indicating a person or thing's identity, authentication is the process of verifying that identity. Authentication is relevant to multiple fields. In art...
    35 KB (4,025 words) - 10:56, 17 June 2025
  • abuses. Article 4(30) defines "strong customer authentication" itself (as multi-factor authentication): an authentication based on the use of two or more...
    11 KB (1,047 words) - 12:08, 13 December 2024
  • An authenticator is a means used to confirm a user's identity, that is, to perform digital authentication. A person authenticates to a computer system...
    30 KB (3,661 words) - 07:54, 24 May 2025
  • Thumbnail for Digest access authentication
    July 2011. Digest access authentication was originally specified by RFC 2069 (An Extension to HTTP: Digest Access Authentication). RFC 2069 specifies roughly...
    25 KB (2,879 words) - 04:06, 25 May 2025
  • of strong authentication. It has close to thirty coordinating and contributing members and is proposing standards for a variety of authentication technologies...
    2 KB (168 words) - 16:51, 26 March 2025
  • Thumbnail for MultiOTP
    MultiOTP (category Authentication methods)
    and update), CHAP authentication (in addition to PAP authentication), QRcode generation for direct provisioning in Google Authenticator, and fast creation...
    24 KB (3,163 words) - 10:28, 6 June 2025
  • Thumbnail for Single sign-on
    services without re-entering authentication factors. It should not be confused with same-sign on (Directory Server Authentication), often accomplished by using...
    20 KB (2,292 words) - 14:47, 25 May 2025
  • Thumbnail for BlackBerry Limited
    [citation needed] A two-factor, certificate-based VPN authentication solution that allows users to authenticate without requiring PINs or passwords. [citation...
    157 KB (13,779 words) - 08:59, 25 May 2025
  • WebAuthn (redirect from Web Authentication)
    build a system of authentication for web-based applications that solves or mitigates the issues of traditional password-based authentication. Zero-knowledge...
    30 KB (3,086 words) - 09:16, 9 June 2025
  • Thumbnail for FIDO Alliance
    strong authentication for the web. At its core, FIDO2 consists of the W3C Web Authentication (WebAuthn) standard and the FIDO Client to Authenticator...
    19 KB (1,877 words) - 15:34, 12 May 2025
  • authentication is the process of establishing confidence in user identities electronically presented to an information system. Digital authentication...
    36 KB (4,218 words) - 13:55, 22 May 2025
  • Thumbnail for Hardware security module
    performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions. These modules traditionally come...
    14 KB (1,557 words) - 08:50, 19 May 2025
  • Candidate Recommendation. "Web Authentication Working Group Charter". W3C. Retrieved March 14, 2016. "Web Authentication: An API for accessing Public Key...
    1 KB (82 words) - 03:53, 21 March 2024
  • Thumbnail for YubiKey
    YubiKey (category Authentication methods)
    the Initiative for Open Authentication (OATH), in addition to the 32-character passwords used by Yubico's own OTP authentication scheme. The YubiKey RFID...
    32 KB (2,957 words) - 02:48, 21 March 2025
  • Thumbnail for Multi-factor authentication
    Multi-factor authentication (MFA; two-factor authentication, or 2FA) is an electronic authentication method in which a user is granted access to a website...
    43 KB (4,771 words) - 03:19, 14 June 2025
  • components: the transport layer provides server authentication, confidentiality, and integrity; the user authentication protocol validates the user to the server;...
    41 KB (4,509 words) - 06:22, 11 June 2025
  • authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data...
    10 KB (1,192 words) - 23:19, 10 July 2024
  • Integrated Windows Authentication (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols...
    10 KB (892 words) - 18:31, 26 May 2024
  • Reliance authentication is a part of the trust-based identity attribution process whereby a second entity relies upon the authentication processes put...
    9 KB (1,066 words) - 16:51, 26 March 2025
  • EAP-Only Authentication in conjunction with strong mutual authentication methods like e.g. EAP-TLS. Support of RFC 4739 IKEv2 Multiple Authentication Exchanges...
    7 KB (767 words) - 22:54, 16 December 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)