×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of cloudidsummit
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identity Toolkit and Google+ Sign-In
352 views
CIS14: PingOne IDaaS: What You Need to Know
250 views
CIS14: Mobilize Your Workforce with Secure Identity Services
135 views
CIS14: Identity at Scale: Next Gen Federation Architectures
246 views
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
79 views
CIS14: Identity at Scale: Building from the Ground Up
299 views
CIS14: Trusted Tokens: An Identity Game Changer
150 views
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem
998 views
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
1.867 views
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room with LDAP, Context and Big Data
748 views
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
272 views
CIS13: Identity—The Great Enabler of Next
501 views
CIS14: Protecting Your APIs from Threats and Hacks
168 views
CIS13: Mobile Identity: Divide and Conquer
631 views
CIS13: Fast IDentity Online (FIDO) Enables Better Authentication for the Open Mobile Ecosystem
933 views
CIS14: Handling Identity in AllJoyn 14.06
130 views
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
490 views
CIS14: User-Managed Access
225 views
CIS 2014: Azure Active Directory (Sean Deuby)
202 views
CIS14: Knowing vs. Asking: Innovation in User Recognition
98 views
Next >