Found 25 datasets matching "authentication".
-
Design Pattern: �Authentication, Authorization & Audit. Describes how applications should consume the enterprise internal user authentication services
Search relevance: 159.91 | Views last month: 0 -
The present invention extends to trusted third party authentication for Web services. Web services trust and delegate user authentication responsibility to a trusted third party that acts as an...
Search relevance: 117.74 | Views last month: 0 -
Provides architectural guidance and constraints associated with authentication of internal users to VA applications via internal single sign-on solutions, Active Directory, and PIV-only authentication.
Search relevance: 107.83 | Views last month: 0 -
Methods and systems are provided for controlling the scope of delegation of authentication credentials within a network environment. A server (210) is configured to provide a trusted third-party...
Search relevance: 92.19 | Views last month: 0 -
Database for Internet User Authentication and Identity-proofing.
Search relevance: 81.21 | Views last month: 2 -
This database supports the authentication of individuals for SSA's Electronic Access (EA).
Search relevance: 80.43 | Views last month: 0 -
The CAMS system consists of a set of tables and packages that provide authentication services to all other North Pacific Groundfish and Halibut Observing Program (NPGOP) subsystems.
Search relevance: 74.87 | Views last month: 1 -
The NIST Digital Manufacturing Certificate (DMC) Toolkit is a toolkit designed specifically to provide certification -- digital signature using software and hardware certificates, and verification...
Search relevance: 65.63 | Views last month: 1 -
The Foreign Service Act of 1980 mandated a comprehensive revision to the operation of the Department of State and the personnel assigned to the US Foreign Service. As the statutory authority, the...
Search relevance: 48.13 | Views last month: 0 -
MAX.gov government-wide suite of advanced collaboration, information sharing, data collection, publishing, business intelligence and authentication tools and services used to facilitate...
Search relevance: 48.01 | Views last month: 4 -
Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable electronic transactions with...
Search relevance: 47.31 | Views last month: 3 -
Suite of advanced collaboration, information sharing, data collection, publishing, business intelligence and authentication tools and services used to facilitate cross-government collaboration and...
Search relevance: 46.54 | Views last month: 1 -
A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of...
Search relevance: 44.96 | Views last month: 0 -
Mesh is a secure, lightweight grid middleware that is based on the addition of a single sign-on capability to the built-in public key authentication mechanism of SSH using system call interposition.
Search relevance: 43.55 | Views last month: 0 -
Provides a core element of SAA'S Identify and Access Control (IAC) functions with respect to the Agency's critical Mainframe platform. In addition to managing identity verifications,...
Search relevance: 42.28 | Views last month: 2 -
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple...
Search relevance: 42.25 | Views last month: 0 -
The information that is collected, used, disseminated, or maintained in the International Technology Services Admin Services system is used for user identification, authorization, and...
Search relevance: 41.05 | Views last month: 2 -
The connection securing process (L4) between a digital word terminal (PDA2) and local information network (WLAN2) coupled to a mobile telephone network with an authentication center (AU2) has a...
Search relevance: 39.28 | Views last month: 0 -
The invention relates to a valuable document or security document (1) that comprises one or more LED elements (2) as a security feature. The LED element (2) is supplied with power by an energy...
Search relevance: 39.26 | Views last month: 0 -
The Notary Public Map displays data about DC notary public locations. Use the map to find a notary public location and display information about it. Please be sure to call or email the individuals...
Search relevance: 36.06 | Views last month: 0