• Java Authentication and Authorization Service, or JAAS, pronounced "Jazz", is the Java implementation of the standard Pluggable Authentication Module (PAM)...
    8 KB (957 words) - 02:34, 26 November 2024
  • Thumbnail for Pluggable Authentication Module
    A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming...
    4 KB (421 words) - 10:43, 8 February 2025
  • The Central Authentication Service (CAS) is a single sign-on protocol for the web. Its purpose is to permit a user to access multiple applications while...
    6 KB (697 words) - 13:27, 6 February 2025
  • also known as the Pluggable Authentication Modules or Java Authentication and Authorization Service (JAAS). Subject descriptor pattern Secure Communication...
    7 KB (865 words) - 21:48, 22 April 2025
  • Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms...
    7 KB (687 words) - 23:11, 18 June 2025
  • J2EE—Java 2 Enterprise Edition J2ME—Java 2 Micro Edition J2SE—Java 2 Standard Edition JAAS—Java Authentication and Authorization Service JAXB—Java Architecture...
    116 KB (8,238 words) - 05:09, 3 August 2025
  • Spring Security is a Java/Java EE framework that provides authentication, authorization and other security features for enterprise applications. The project...
    9 KB (808 words) - 03:10, 8 July 2025
  • Connected Device Configuration (category Java device platform)
    optional packages, such as Java Authentication and Authorization Service (JAAS), Java Secure Socket Extension (JSSE), and Java Cryptography Extension (JCE)...
    7 KB (786 words) - 19:06, 15 January 2025
  • JBoss Enterprise Application Platform (category Java enterprise platform)
    and RMI Security services, including Java Authentication and Authorization Service (JAAS) and pluggable authentication modules (PAM) Web Services and...
    18 KB (1,475 words) - 14:58, 22 April 2025
  • Thumbnail for OpenAM
    OpenAM (category Free software programmed in Java (programming language))
    Multi-factor authentication or to create custom authentication modules based on the JAAS (Java Authentication and Authorization Service) open standard...
    12 KB (1,189 words) - 17:11, 24 February 2025
  • frontends and backends. API key Access token Basic access authentication Digest access authentication Claims-based identity HTTP header Concise Binary Object...
    20 KB (1,556 words) - 03:19, 26 May 2025
  • Thumbnail for One-time password
    traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password...
    26 KB (3,542 words) - 06:34, 30 July 2025
  • Atomic Spectrometry Journal of Asia Adventist Seminary Java Authentication and Authorization Service This disambiguation page lists articles associated with...
    189 bytes (50 words) - 16:11, 21 March 2021
  • "Cloud Foundry User Account and Authentication (UAA) Server". cloudfoundry.org. Retrieved 2016-09-09. "Authentication — Dailymotion APIs". www.dailymotion...
    12 KB (554 words) - 11:22, 8 May 2025
  • Thumbnail for JavaScript
    private information such as JSON or JavaScript. Possible solutions include: requiring an authentication token in the POST and GET parameters for any response...
    84 KB (7,917 words) - 17:43, 27 June 2025
  • TACACS (category Authentication protocols)
    administrator authentication and command authorization, while offering strong support (and is widely used) for end-user authentication, authorization, and accounting...
    10 KB (1,232 words) - 22:00, 9 September 2024
  • APIs. Authentication and authorization. Some BaaS offer authentication and authorization services that allow developers to easily manage app users. This...
    16 KB (1,539 words) - 12:08, 22 December 2024
  • Apache Guacamole (category Free software programmed in Java (programming language))
    web browser, and allows administrators to dictate how and whether users can connect using an extensible authentication and authorization system. Destination...
    9 KB (636 words) - 04:24, 24 June 2025
  • Interface. Some limitations of GSSAPI are: standardizing only authentication, rather not authorization too; assuming a client–server architecture. Anticipating...
    9 KB (945 words) - 00:59, 11 April 2025
  • Google APIs (category Google services)
    API or Google Earth API. Usage of all of the APIs requires authentication and authorization using the Oauth 2.0 protocol. Oauth 2.0 is a simple protocol...
    7 KB (831 words) - 15:52, 15 May 2025
  • Below is a list of notable Java programming language technologies (frameworks, libraries)....
    17 KB (12 words) - 20:19, 10 December 2024
  • Thumbnail for Apache Shiro
    Apache Shiro (category Java (programming language) libraries)
    1.1.0 on 2010-11-01 Application security Java Authentication and Authorization Service (JAAS) Enterprise JavaBean#Security EJB Container-Managed Security...
    6 KB (575 words) - 18:03, 13 January 2024
  • provides authentication and authorization mechanisms, and establishes a framework to deploy other related services: Certificate Services, Active Directory...
    51 KB (5,297 words) - 05:47, 6 May 2025
  • Shibboleth (software) (category Official website different in Wikidata and Wikipedia)
    open-source implementation for identity management and federated identity-based authentication and authorization (or access control) infrastructure based on...
    11 KB (1,224 words) - 00:49, 1 July 2025
  • Thumbnail for Public key infrastructure
    documents are encoded as XML); Authentication of users to applications (e.g., smart card logon, client authentication with SSL/TLS). There's experimental...
    35 KB (4,124 words) - 20:07, 8 June 2025
  • GRPC (section Authentication)
    (TLS) and token-based authentication. Connection to Google services must use TLS. There are two types of credentials: channel credentials and call credentials...
    7 KB (540 words) - 13:56, 4 July 2025
  • Imixs-Workflow (category Free and open-source software)
    business process management Java Persistence API vendor independent database access Java Authentication and Authorization Service for security BPMN 2.0 for...
    6 KB (744 words) - 22:03, 3 August 2024
  • profiles, including authentication, authorization, encryption and checksums Extensible security key management, including X.509, token and password Support...
    17 KB (1,776 words) - 13:40, 17 July 2025
  • such as: Accounts, authentication, authorization, roles Database abstraction via an object-relational mapping Input validation and input sanitation Web...
    2 KB (219 words) - 11:59, 20 November 2024
  • Thumbnail for Web application
    development process. This includes processes for authentication, authorization, asset handling, input, and logging and auditing. Building security into the applications...
    12 KB (1,431 words) - 20:32, 28 June 2025