Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
o
- Operational Security Assessment Description: Operational Security Assessment is a critical process that focuses on analyzing and measuring the effectiveness of security(...) Read more
- OIDC Description: OpenID Connect (OIDC) is an authentication protocol built on top of the OAuth 2.0 authorization framework. Its main goal is to(...) Read more
- Onboarding Description: Onboarding in identity and access management refers to the process of integrating a new user into a system, which includes account(...) Read more
- Open Authorization Description: Open Authorization is a protocol that allows third-party services to exchange information without sharing passwords. This approach(...) Read more
- Organizational Identity Description: Organizational identity refers to the digital representation of an organization in technological systems and platforms, playing a(...) Read more
- Online Identity Description: Online identity refers to the digital representation of an individual or organization on the Internet, manifested through profiles,(...) Read more
- OpenID Connect Discovery Description: OpenID Connect is an authentication protocol based on the OAuth 2.0 standard, designed to allow clients to discover identity(...) Read more
- Organizational Role Description: The organizational role in identity and access management refers to a defined position within an organization that has specific(...) Read more
- OpenID Token Description: An OpenID token is a fundamental element in the authentication process that allows users to access multiple online services using a(...) Read more
- OpenID Connect Token Description: An OpenID Connect token is a fundamental element in the authentication process that allows users to access multiple online(...) Read more
- On-Demand Access Description: On-demand access is a security model that allows users to access resources and services as needed, without requiring prior approval(...) Read more
- Ownership Management Description: Ownership management in the context of Zero Trust security refers to the process of managing and controlling access to data and(...) Read more
- Obfuscation Techniques Description: Obfuscation techniques are methods used to obscure data in order to protect it from unauthorized access. These techniques are(...) Read more
- Organizational Policy Description: Organizational Policy in the context of Data Loss Prevention refers to a set of guidelines and procedures established by an(...) Read more
- Onsite Security Description: Onsite Security refers to the physical and logical measures implemented to protect data stored in a specific location, such as a(...) Read more