×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of cloudidsummit
CIS13: So, You Want to Be a Relying Party: Federated Login with Google Identity Toolkit and Google+ Sign-In
352 views
CIS14: PingOne IDaaS: What You Need to Know
250 views
CIS14: Mobilize Your Workforce with Secure Identity Services
136 views
CIS14: Identity at Scale: Next Gen Federation Architectures
252 views
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
80 views
CIS14: Identity at Scale: Building from the Ground Up
302 views
CIS14: Trusted Tokens: An Identity Game Changer
152 views
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem
999 views
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
1.867 views
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room with LDAP, Context and Big Data
748 views
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
274 views
CIS13: Identity—The Great Enabler of Next
502 views
CIS14: Protecting Your APIs from Threats and Hacks
172 views
CIS13: Mobile Identity: Divide and Conquer
631 views
CIS13: Fast IDentity Online (FIDO) Enables Better Authentication for the Open Mobile Ecosystem
934 views
CIS14: Handling Identity in AllJoyn 14.06
131 views
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
490 views
CIS14: User-Managed Access
228 views
CIS 2014: Azure Active Directory (Sean Deuby)
204 views
CIS14: Knowing vs. Asking: Innovation in User Recognition
98 views
Next >