Difference between revisions of "Explaining Federated Identity Management"
Jump to navigation
Jump to search
Line 2: | Line 2: | ||
{{#ev:youtube | {{#ev:youtube | ||
|wjvC_PUj4CI | |wjvC_PUj4CI | ||
}} | |||
For more technical explanation, see the following video<ref>{{:Video/CISSP 95: Federated Identity Management}}</ref>: | |||
{{#ev:youtube | |||
|GFLny6qKX8A | |||
}} | }} | ||
<noinclude> | <noinclude> |
Revision as of 05:16, 13 February 2022
See the following video[1] to get an introduction to Federated Identity Management. {{#ev:youtube |wjvC_PUj4CI }}
For more technical explanation, see the following video[2]: {{#ev:youtube |GFLny6qKX8A }}
References
- ↑ Lloyd, Tim (Jun 8, 2020). How Federated Authentication Works. local page: SeamlessAccess.
- ↑ sumon infosec, ed. (Jan 3, 2020). CISSP 95: Federated Identity Management. local page: sumon infosec.