• Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote the...
    2 KB (168 words) - 16:51, 26 March 2025
  • An authenticator is a means used to confirm a user's identity, that is, to perform digital authentication. A person authenticates to a computer system...
    30 KB (3,661 words) - 16:51, 26 March 2025
  • Thumbnail for Time-based one-time password
    TOTP is the cornerstone of Initiative for Open Authentication (OATH) and is used in a number of two-factor authentication (2FA) systems. Through the collaboration...
    5 KB (649 words) - 16:42, 5 May 2025
  • (OTP) algorithm based on HMAC. It is a cornerstone of the Initiative for Open Authentication (OATH). HOTP was published as an informational IETF RFC 4226...
    10 KB (1,061 words) - 10:03, 5 May 2025
  • LinOTP (category Authentication methods)
    General Public License. It is an open source authentication server certified by the OATH initiative for open authentication for its 2.4 version. As a web service...
    4 KB (247 words) - 07:07, 8 January 2025
  • Leder Games OATH, an acronym from the phrase "open authentication" in Initiative for Open Authentication Oath of office, an official promise by a person...
    1 KB (196 words) - 21:19, 23 April 2024
  • Thumbnail for FIDO Alliance
    Industry Co. Ltd. Self-sovereign identity Initiative for Open Authentication (OATH) WebAuthn web authentication YubiKey "Password-The Security Issue That...
    19 KB (1,865 words) - 05:58, 3 April 2025
  • Thumbnail for Security token
    to be transferred to. Authentication Authenticator Hardware security module Identity management Initiative for Open Authentication Mobile signature Multi-factor...
    22 KB (2,611 words) - 16:06, 4 January 2025
  • Thumbnail for OpenID
    OpenID is an open standard and decentralized authentication protocol promoted by the non-profit OpenID Foundation. It allows users to be authenticated...
    54 KB (6,068 words) - 05:40, 17 February 2025
  • Thumbnail for One-time password
    One-time password (category Password authentication)
    access control technique with anonymous authentication. Google Authenticator FreeOTP Initiative For Open Authentication Key-agreement protocol KYPS One-time...
    26 KB (3,542 words) - 04:05, 7 February 2025
  • Thumbnail for YubiKey
    YubiKey (category Authentication methods)
    protocols from the Initiative for Open Authentication (OATH), in addition to the 32-character passwords used by Yubico's own OTP authentication scheme. The YubiKey...
    32 KB (2,957 words) - 02:48, 21 March 2025
  • Thumbnail for Google Authenticator
    Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password...
    9 KB (943 words) - 04:20, 15 March 2025
  • Thumbnail for Passwordless authentication
    Passwordless authentication is an authentication method in which a user can log in to a computer system without entering (and having to remember) a password...
    15 KB (1,613 words) - 19:53, 15 February 2025
  • Thumbnail for CoSign single sign on
    web authentication system. It is no longer being updated. Cosign authenticates a user on the web server and then provides an environment variable for the...
    2 KB (130 words) - 22:32, 9 February 2025
  • Thumbnail for Supplicant (computer)
    up 802.1x authentication". Retrieved November 7, 2014. Supplicant ESG Open 802.1x Supplicant initiative Understanding 802.1x authentication on Microsoft...
    7 KB (689 words) - 17:37, 25 January 2025
  • Thumbnail for MultiOTP
    MultiOTP (category Authentication methods)
    OPIE Authentication System OTPW Time-based one-time password (TOTP) Tokens Initiative For Open Authentication (OATH) Multi-factor authentication Google...
    24 KB (3,162 words) - 06:19, 22 December 2024
  • OSID Interoperability. 2005. Kumar, V., Merriman, J., Thorne, S. Open Knowledge Initiative Final Report. 2004. Kahn, J. Repository Developer's Guide. 2006...
    4 KB (424 words) - 06:51, 18 July 2023
  • Thumbnail for HTTP 404
    sues government agency for blocking Facebook, claims damage for the use of 404 error message instead of 403". Open Net Initiative. Retrieved 21 November...
    16 KB (1,945 words) - 08:23, 23 December 2024
  • OMA Device Management (category Open Mobile Alliance standards)
    communication protocol is a request-response protocol. Authentication and challenge of authentication are built-in to ensure the server and client are communicating...
    7 KB (782 words) - 23:03, 25 June 2024
  • Shibboleth (software) (category Identity management initiative)
    middleware initiative created an architecture and open-source implementation for identity management and federated identity-based authentication and authorization...
    9 KB (1,176 words) - 09:22, 4 March 2025
  • with regard to regulatory technical standards for strong customer authentication and common and secure open standards of communication. The EU and many...
    18 KB (2,056 words) - 12:49, 9 July 2024
  • Thumbnail for Liberty Alliance
    Liberty Alliance (category Identity management initiative)
    certification for participating in the US E-Authentication Identity Federation. In January 2007, the alliance announced a project for open-source software...
    17 KB (1,138 words) - 19:03, 21 December 2024
  • with regard to regulatory technical standards for strong customer authentication and common and secure open standards of communication (Text with EEA relevance...
    38 KB (3,609 words) - 14:17, 4 May 2025
  • OCB mode (category Authenticated-encryption schemes)
    designed to provide both message authentication and privacy. It is essentially a scheme for integrating a message authentication code (MAC) into the operation...
    8 KB (843 words) - 15:52, 12 June 2024
  • Italy GRNET AAI, Greece SWITCHaai, Switzerland Authentication Authorization Central Authentication Service Federated identity Identity as a service...
    3 KB (307 words) - 13:50, 13 September 2024
  • XML-format for security tokens containing assertions to pass information about a user and protocols and profiles to implement authentication and authorization...
    45 KB (872 words) - 12:25, 22 December 2024
  • architecture planning Extensible Authentication Protocol JBoss Enterprise Application Platform Early access program, for video games Early access program...
    1 KB (198 words) - 12:35, 18 February 2025
  • RSA SecurID (category Password authentication)
    the authentication server's clock becomes out of sync with the clock built into the authentication tokens. Normal token clock drift is accounted for automatically...
    23 KB (2,341 words) - 15:43, 24 April 2025
  • 2014-02-10. PIKT uses shared secret keys for mutual authentication. "As an option, you can use secret key authentication to prove the master's identity to the...
    50 KB (3,774 words) - 04:09, 5 May 2025
  • Security token service (category Identity management initiative)
    vendors, including the open-source Apache CXF, as well as closed-source solutions from Oracle (for interfacing with authentication services backed by an...
    4 KB (434 words) - 05:50, 17 February 2025