Difference between revisions of "Explaining Federated Identity Management"
Jump to navigation
Jump to search
m (Text replacement - "{{#ev:youtube |" to "{{#widget:YouTube |id=") |
|||
Line 1: | Line 1: | ||
See the following video<ref>{{:Video/How Federated Authentication Works}}</ref> to get an introduction to [[Federated Identity Management]]. | See the following video<ref>{{:Video/How Federated Authentication Works}}</ref> to get an introduction to [[Federated Identity Management]]. | ||
{{# | {{#widget:YouTube | ||
|wjvC_PUj4CI | |id=wjvC_PUj4CI | ||
}} | }} | ||
For more technical explanation, see the following video<ref>{{:Video/CISSP 95: Federated Identity Management}}</ref>: | For more technical explanation, see the following video<ref>{{:Video/CISSP 95: Federated Identity Management}}</ref>: | ||
{{# | {{#widget:YouTube | ||
|GFLny6qKX8A | |id=GFLny6qKX8A | ||
}} | }} | ||
<noinclude> | <noinclude> |
Latest revision as of 11:20, 26 August 2022
See the following video[1] to get an introduction to Federated Identity Management.
For more technical explanation, see the following video[2]:
References
- ↑ Lloyd, Tim (Jun 8, 2020). How Federated Authentication Works. local page: SeamlessAccess.
- ↑ sumon infosec, ed. (Jan 3, 2020). CISSP 95: Federated Identity Management. local page: sumon infosec.