Log in Sign up
3 Matching Annotations
  1. Oct 2020
  2. www.coursera.org www.coursera.org
    What is centralized management? - Google | Coursera
    1
    1. ogharipour 12 Oct 2020
      in Public
      One of the most common methods for this authentication is using Kerberos.
      • Kerberos is a network authentication protocol that is used to authenticate user identity, secure the transfer of user credentials, and more
      LDAP IT Infrastructure
    Visit annotations in context

    Tags

    • LDAP
    • IT Infrastructure

    Annotators

    • ogharipour

    URL

    coursera.org/learn/system-administration-it-infrastructure-services/lecture/yW3Di/what-is-centralized-management
  3. Jun 2020
  4. onor.io onor.io
    Some Updates On “LDAP Authentication With Phoenix”
    1
    1. SamRose 25 Jun 2020
      in Public
      phoenix elixir ldap
    Visit annotations in context

    Tags

    • elixir
    • phoenix
    • ldap

    Annotators

    • SamRose

    URL

    onor.io/2017/08/07/some-updates-on-ldap-authentication-with-phoenix/
  5. rny.io rny.io
    LDAP authentication with Phoenix
    1
    1. SamRose 25 Jun 2020
      in Public
      phoenix elixir ldap
    Visit annotations in context

    Tags

    • elixir
    • phoenix
    • ldap

    Annotators

    • SamRose

    URL

    rny.io/elixir/phoenix/ldap/2016/09/20/ldap-authenication-with-phoenix.html
Share:
Group. Only group members will be able to view this annotation.
Only me. No one else will be able to view this annotation.
Hypothes.is
  • About
  • Blog
  • Bioscience
  • Education
  • Jobs
  • Help
  • Contact
  • Terms of Service
  • Privacy Policy