Essays about: "Single Sign-on"

Showing result 1 - 5 of 23 essays containing the words Single Sign-on.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective

    University essay from Linköpings universitet/Programvara och system

    Author : Ludvig Thor; [2022]
    Keywords : OIDC; Single sign-on; Security;

    Abstract : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. READ MORE

  3. 3. Automated Functional Tests for a Web Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Johan Wulf; Erik Svensson Fahlström; [2022]
    Keywords : Test; automation; single sign on; frameworks; JavaScript; Technology and Engineering;

    Abstract : When developing a large application, many companies use techniques such as Test Driven Development in order to get a range of tests on which they later can validate their code with. This has become the standard in many work environments. READ MORE

  4. 4. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  5. 5. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE