Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote the...
2 KB (168 words) - 16:51, 26 March 2025
An authenticator is a means used to confirm a user's identity, that is, to perform digital authentication. A person authenticates to a computer system...
30 KB (3,661 words) - 16:51, 26 March 2025
TOTP is the cornerstone of Initiative for Open Authentication (OATH) and is used in a number of two-factor authentication (2FA) systems. Through the collaboration...
5 KB (649 words) - 16:42, 5 May 2025
(OTP) algorithm based on HMAC. It is a cornerstone of the Initiative for Open Authentication (OATH). HOTP was published as an informational IETF RFC 4226...
10 KB (1,061 words) - 10:03, 5 May 2025
LinOTP (category Authentication methods)
General Public License. It is an open source authentication server certified by the OATH initiative for open authentication for its 2.4 version. As a web service...
4 KB (247 words) - 07:07, 8 January 2025
Leder Games OATH, an acronym from the phrase "open authentication" in Initiative for Open Authentication Oath of office, an official promise by a person...
1 KB (196 words) - 21:19, 23 April 2024
Industry Co. Ltd. Self-sovereign identity Initiative for Open Authentication (OATH) WebAuthn web authentication YubiKey "Password-The Security Issue That...
19 KB (1,865 words) - 05:58, 3 April 2025
Security token (redirect from Authentication token)
to be transferred to. Authentication Authenticator Hardware security module Identity management Initiative for Open Authentication Mobile signature Multi-factor...
22 KB (2,611 words) - 16:06, 4 January 2025
OpenID is an open standard and decentralized authentication protocol promoted by the non-profit OpenID Foundation. It allows users to be authenticated...
54 KB (6,068 words) - 05:40, 17 February 2025
One-time password (category Password authentication)
access control technique with anonymous authentication. Google Authenticator FreeOTP Initiative For Open Authentication Key-agreement protocol KYPS One-time...
26 KB (3,542 words) - 04:05, 7 February 2025
YubiKey (category Authentication methods)
protocols from the Initiative for Open Authentication (OATH), in addition to the 32-character passwords used by Yubico's own OTP authentication scheme. The YubiKey...
32 KB (2,957 words) - 02:48, 21 March 2025
Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password...
9 KB (943 words) - 04:20, 15 March 2025
Passwordless authentication is an authentication method in which a user can log in to a computer system without entering (and having to remember) a password...
15 KB (1,613 words) - 19:53, 15 February 2025
CoSign single sign on (redirect from CoSign: Web Authentication)
web authentication system. It is no longer being updated. Cosign authenticates a user on the web server and then provides an environment variable for the...
2 KB (130 words) - 22:32, 9 February 2025
up 802.1x authentication". Retrieved November 7, 2014. Supplicant ESG Open 802.1x Supplicant initiative Understanding 802.1x authentication on Microsoft...
7 KB (689 words) - 17:37, 25 January 2025
MultiOTP (category Authentication methods)
OPIE Authentication System OTPW Time-based one-time password (TOTP) Tokens Initiative For Open Authentication (OATH) Multi-factor authentication Google...
24 KB (3,162 words) - 06:19, 22 December 2024
OSID Interoperability. 2005. Kumar, V., Merriman, J., Thorne, S. Open Knowledge Initiative Final Report. 2004. Kahn, J. Repository Developer's Guide. 2006...
4 KB (424 words) - 06:51, 18 July 2023
sues government agency for blocking Facebook, claims damage for the use of 404 error message instead of 403". Open Net Initiative. Retrieved 21 November...
16 KB (1,945 words) - 08:23, 23 December 2024
OMA Device Management (category Open Mobile Alliance standards)
communication protocol is a request-response protocol. Authentication and challenge of authentication are built-in to ensure the server and client are communicating...
7 KB (782 words) - 23:03, 25 June 2024
Shibboleth (software) (category Identity management initiative)
middleware initiative created an architecture and open-source implementation for identity management and federated identity-based authentication and authorization...
9 KB (1,176 words) - 09:22, 4 March 2025
with regard to regulatory technical standards for strong customer authentication and common and secure open standards of communication. The EU and many...
18 KB (2,056 words) - 12:49, 9 July 2024
Liberty Alliance (category Identity management initiative)
certification for participating in the US E-Authentication Identity Federation. In January 2007, the alliance announced a project for open-source software...
17 KB (1,138 words) - 19:03, 21 December 2024
with regard to regulatory technical standards for strong customer authentication and common and secure open standards of communication (Text with EEA relevance...
38 KB (3,609 words) - 14:17, 4 May 2025
OCB mode (category Authenticated-encryption schemes)
designed to provide both message authentication and privacy. It is essentially a scheme for integrating a message authentication code (MAC) into the operation...
8 KB (843 words) - 15:52, 12 June 2024
Italy GRNET AAI, Greece SWITCHaai, Switzerland Authentication Authorization Central Authentication Service Federated identity Identity as a service...
3 KB (307 words) - 13:50, 13 September 2024
XML-format for security tokens containing assertions to pass information about a user and protocols and profiles to implement authentication and authorization...
45 KB (872 words) - 12:25, 22 December 2024
architecture planning Extensible Authentication Protocol JBoss Enterprise Application Platform Early access program, for video games Early access program...
1 KB (198 words) - 12:35, 18 February 2025
RSA SecurID (category Password authentication)
the authentication server's clock becomes out of sync with the clock built into the authentication tokens. Normal token clock drift is accounted for automatically...
23 KB (2,341 words) - 15:43, 24 April 2025
2014-02-10. PIKT uses shared secret keys for mutual authentication. "As an option, you can use secret key authentication to prove the master's identity to the...
50 KB (3,774 words) - 04:09, 5 May 2025
Security token service (category Identity management initiative)
vendors, including the open-source Apache CXF, as well as closed-source solutions from Oracle (for interfacing with authentication services backed by an...
4 KB (434 words) - 05:50, 17 February 2025