Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote the...
2 KB (168 words) - 16:51, 26 March 2025
An authenticator is a means used to confirm a user's identity, that is, to perform digital authentication. A person authenticates to a computer system...
30 KB (3,661 words) - 18:03, 24 June 2025
TOTP is a cornerstone of the Initiative for Open Authentication (OATH) and is used in a number of two-factor authentication (2FA) systems. Through the collaboration...
5 KB (617 words) - 04:52, 18 June 2025
(OTP) algorithm based on HMAC. It is a cornerstone of the Initiative for Open Authentication (OATH). HOTP was published as an informational IETF RFC 4226...
10 KB (1,061 words) - 11:47, 24 May 2025
LinOTP (category Authentication methods)
General Public License. It is an open source authentication server certified by the OATH initiative for open authentication for its 2.4 version. As a web service...
4 KB (247 words) - 07:07, 8 January 2025
Leder Games OATH, an acronym from the phrase "open authentication" in Initiative for Open Authentication Oath of office, an official promise by a person...
1 KB (196 words) - 21:19, 23 April 2024
Industry Co. Ltd. Self-sovereign identity Initiative for Open Authentication (OATH) WebAuthn web authentication YubiKey "Password-The Security Issue That...
19 KB (1,878 words) - 18:45, 30 June 2025
Security token (redirect from Authentication token)
to be transferred to. Authentication Authenticator Hardware security module Identity management Initiative for Open Authentication Mobile signature Multi-factor...
22 KB (2,611 words) - 16:06, 4 January 2025
OpenID is an open standard and decentralized authentication protocol promoted by the non-profit OpenID Foundation. It allows users to be authenticated...
54 KB (6,068 words) - 05:40, 17 February 2025
One-time password (category Password authentication)
access control technique with anonymous authentication. Google Authenticator FreeOTP Initiative For Open Authentication Key-agreement protocol KYPS One-time...
26 KB (3,542 words) - 01:09, 12 July 2025
YubiKey (category Authentication methods)
protocols from the Initiative for Open Authentication (OATH), in addition to the 32-character passwords used by Yubico's own OTP authentication scheme. The YubiKey...
32 KB (2,957 words) - 11:28, 24 June 2025
Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password...
9 KB (943 words) - 05:34, 25 May 2025
MultiOTP (category Authentication methods)
one-time password (TOTP) Tokens Initiative For Open Authentication (OATH) Multi-factor authentication Google Authenticator Aslan, Ömer; Aktuğ, Semih Serkant;...
24 KB (3,171 words) - 11:58, 13 July 2025
Passwordless authentication is an authentication method in which a user can log in to a computer system without entering (and having to remember) a password...
16 KB (1,688 words) - 00:57, 10 July 2025
CoSign single sign on (redirect from CoSign: Web Authentication)
web authentication system. It is no longer being updated. Cosign authenticates a user on the web server and then provides an environment variable for the...
2 KB (130 words) - 22:32, 9 February 2025
OSID Interoperability. 2005. Kumar, V., Merriman, J., Thorne, S. Open Knowledge Initiative Final Report. 2004. Kahn, J. Repository Developer's Guide. 2006...
4 KB (424 words) - 06:51, 18 July 2023
up 802.1x authentication". Retrieved November 7, 2014. Supplicant ESG Open 802.1x Supplicant initiative Understanding 802.1x authentication on Microsoft...
7 KB (689 words) - 17:37, 25 January 2025
Digital wallet (section European Payments Initiative)
randomised identifiers Biometric authentication, such as fingerprint or facial recognition Two-factor or multi-factor authentication (2FA/MFA) These mechanisms...
15 KB (1,578 words) - 09:44, 9 July 2025
OMA Device Management (category Open Mobile Alliance standards)
communication protocol is a request-response protocol. Authentication and challenge of authentication are built-in to ensure the server and client are communicating...
7 KB (782 words) - 09:46, 9 July 2025
Italy GRNET AAI, Greece SWITCHaai, Switzerland Authentication Authorization Central Authentication Service Federated identity Identity as a service...
3 KB (307 words) - 13:50, 13 September 2024
with regard to regulatory technical standards for strong customer authentication and common and secure open standards of communication (Text with EEA relevance...
42 KB (3,955 words) - 23:58, 30 June 2025
OCB mode (category Authenticated-encryption schemes)
designed to provide both message authentication and privacy. It is essentially a scheme for integrating a message authentication code (MAC) into the operation...
8 KB (843 words) - 01:40, 25 May 2025
Shibboleth (software) (category Identity management initiative)
middleware initiative created an architecture and open-source implementation for identity management and federated identity-based authentication and authorization...
11 KB (1,224 words) - 00:49, 1 July 2025
with regard to regulatory technical standards for strong customer authentication and common and secure open standards of communication. The EU and many...
18 KB (2,056 words) - 12:49, 9 July 2024
sues government agency for blocking Facebook, claims damage for the use of 404 error message instead of 403". Open Net Initiative. Retrieved 21 November...
16 KB (1,945 words) - 23:09, 3 June 2025
XML-format for security tokens containing assertions to pass information about a user and protocols and profiles to implement authentication and authorization...
45 KB (872 words) - 12:25, 22 December 2024
Security token service (category Identity management initiative)
vendors, including the open-source Apache CXF, as well as closed-source solutions from Oracle (for interfacing with authentication services backed by an...
4 KB (434 words) - 05:50, 17 February 2025
2014-02-10. PIKT uses shared secret keys for mutual authentication. "As an option, you can use secret key authentication to prove the master's identity to the...
50 KB (3,774 words) - 09:19, 10 June 2025
Liberty Alliance (category Identity management initiative)
certification for participating in the US E-Authentication Identity Federation. In January 2007, the alliance announced a project for open-source software...
17 KB (1,138 words) - 19:03, 21 December 2024
architecture planning Extensible Authentication Protocol JBoss Enterprise Application Platform Early access program, for video games Early access program...
1 KB (198 words) - 12:35, 18 February 2025