Schlagwort-Archive: perimeter authentication

IT-Security (Part 5): WebLogic Server, perimeter Authentication and Identity Assertion

I tried to discuss about “perimeter authentication” in one extra part of IT-Security’s blogs, because this authentication’s process is an essential approach in a heterogonous world of systems, applications and technologies that they need to trust and communicate to each … Weiterlesen

Veröffentlicht unter Software Engineering | Verschlagwortet mit , , , , , , , , , , , , , | 6 Kommentare