language:
Find link is a tool written by Edward Betts.Longer titles found: Active Directory Federation Services (view), Active Directory Rights Management Services (view)
searching for Active Directory 126 found (436 total)
alternate case: active Directory
Data Protection API
(903 words)
[view diff]
no match in snippet
view article
find links to article
Data Protection Application Programming Interface (DPAPI) is a simple cryptographic application programming interface available as a built-in component.local (1,367 words) [view diff] exact match in snippet view article find links to article
article 300684 listed contoso.local as an example of a "best-practice Active Directory domain name", but then added: We recommend that you register DNS names1601 (2,879 words) [view diff] exact match in snippet view article find links to article
of this year (1601-01-01) is used as the base of file dates and of Active Directory Logon dates by Microsoft Windows. It is also the date from which ANSIOracle Database (1,378 words) [view diff] exact match in snippet view article find links to article
In-database SQL Firewall, TLS 1.3 Support, Integration with Azure Active Directory OAuth2, True Cache for mid-tier caching, Readable Per-PDB Standby,Cerberus FTP Server (134 words) [view diff] exact match in snippet view article find links to article
system and supports user authentication via built-in users and groups, Active Directory, LDAP and public key authentication. The server is currently developedSQL Server Reporting Services (1,044 words) [view diff] exact match in snippet view article find links to article
Name record (requiring DOMAIN ADMINISTRATOR access) is created in Active Directory associating the Sql Server Reporting service to the user the serviceHMailServer (521 words) [view diff] exact match in snippet view article find links to article
against the local hMailServer user system and against an external Active Directory. hMailServer offered a number of different AntiSpam mechanisms: HostAbiquo Enterprise Edition (495 words) [view diff] exact match in snippet view article find links to article
Computing Platforms". IEEE Computer. IEEE Press: 23–27. "LDAP and Active Directory Integration". wiki.abiquo.com/. Retrieved 2018-07-02. "Private CloudMichael Bartosh (407 words) [view diff] exact match in snippet view article find links to article
published on O'Reilly network (Open Directory and Active Directory parts 1-4 and Panther and Active Directory ), as well as presentations and classes at manyPhoneFactor (271 words) [view diff] exact match in snippet view article find links to article
cloud applications like Microsoft 365 that use Windows Microsoft Azure Active Directory. Haiyang Qian; Chandra S. Surapaneni; Steve Dispensa; Deep Medhi (JuneRelative identifier (106 words) [view diff] exact match in snippet view article find links to article
Master allocates security RIDs to Domain Controllers to assign to new Active Directory security principals (users, groups or computer objects). It also managesStrongSwan (767 words) [view diff] exact match in snippet view article find links to article
relays EAP packets to one or multiple AAA servers (e.g. FreeRADIUS or Active Directory). Support of RFC 5998 EAP-Only Authentication in conjunction with strongSysinternals (938 words) [view diff] exact match in snippet view article find links to article
Edition 2.0, Regmon Enterprise Edition 2.0, AD Explorer Insight for Active Directory 2.0, and TCP Tools. On May 18, 2010, Sysinternals released its firstCacti (software) (1,307 words) [view diff] exact match in snippet view article
Source users can either be locally defined or sourced from LDAP, Active Directory and other protocols via Apache and Nginx Basic Authentication whichNimbula (683 words) [view diff] exact match in snippet view article find links to article
machines (VMs) Integrate existing user services through support for Active Directory/LDAP Elastic IPs and security groups Support for virtual ethernetsEGroupware (1,112 words) [view diff] exact match in snippet view article find links to article
against the own user accounts in SQL as well as LDAP, mail server, Active Directory (AD), CAS, SAML 2.0/Shibboleth/SimpleSAMLphp and others. ComparablePwdump (322 words) [view diff] exact match in snippet view article find links to article
accounts from the Security Account Manager (SAM) database and from the Active Directory domain's users cache on the operating system. It is widely used, toRpmsg (600 words) [view diff] exact match in snippet view article find links to article
users of Azure Information Protection, Azure Rights Management or Active Directory Rights Management Services. The rpmsg file is created by writing bodyZimbra (1,097 words) [view diff] exact match in snippet view article find links to article
and SMTP for messaging, LDAP for directory services, and Microsoft Active Directory (AD). Zimbra uses Postfix for its MTA functionality. It includes technologyWindows 7 editions (3,109 words) [view diff] exact match in snippet view article find links to article
Windows XP Mode is available as a free download from Microsoft. formerly Active Directory Application Mode (ADAM) Any edition of Windows 7 can be installed ontoComparison of instant messaging protocols (736 words) [view diff] exact match in snippet view article find links to article
Messenger, etc.) Microsoft 1997 Mar Proprietary (Discontinued) Windows Active Directory Login No No ? No Centralistic None No ? ? No No No ? RVP (Windows MessengerKeychain (software) (1,207 words) [view diff] exact match in snippet view article
system. Also, if the password is changed from a directory service like Active Directory or Open Directory, or if the password is changed from another adminProxy server (5,573 words) [view diff] exact match in snippet view article find links to article
required. This second reason, however is mitigated by features such as Active Directory group policy, or DHCP and automatic proxy detection. Intercepting proxiesMicrosoft App-V (3,441 words) [view diff] exact match in snippet view article find links to article
used to define applications and connection groups and assign them to Active Directory Security Groups containing lists of users or computers authorized toNova (operating system) (1,071 words) [view diff] exact match in snippet view article
manager Compatible with Gentoo and Portage. Integrated with Windows Active Directory. Nova 2.1 Desktop Edition Nova 2.1 Installation Nova 2.1 Firefox webGlobalSign (1,560 words) [view diff] exact match in snippet view article find links to article
provisioning and deployment. The platform integrates with Windows Active Directory. In 2018, GlobalSign released its IoT Identity Platform. It uses PKIOAuth (2,823 words) [view diff] exact match in snippet view article find links to article
Microsoft also supports OAuth 2.0 for various APIs and its Azure Active Directory service, which is used to secure many Microsoft and third party APIsS/MIME (1,501 words) [view diff] exact match in snippet view article find links to article
November 1996. Balladelli, Micky; Clercq, Jan De (2001). Mission-critical Active Directory: Architecting a Secure and Scalable Infrastructure for Windows 2000ThinkPad Tablet (1,618 words) [view diff] exact match in snippet view article find links to article
ThinkPad Tablet also includes the capacity to lock the Tablet using Active Directory credentials. Application control: Lenovo offers preloaded images onTenable, Inc. (775 words) [view diff] exact match in snippet view article find links to article
"Tenable Completes Acquisition of Alsid and Launches Tenable.ad to Secure Active Directory Environments" (Press release). GlobeNewswire. April 27, 2021. "TenablePleasant Password Server (422 words) [view diff] exact match in snippet view article find links to article
access. The Enterprise Edition includes additional features, primarily: Active Directory/LDAP Integration: Import, export and synchronization with existingComparison of LAN messengers (151 words) [view diff] exact match in snippet view article find links to article
Message logging Whiteboard Terminal Service Compatibility User base in Active Directory Serverless (No server required) BeeBEEP No Yes Yes Yes Yes Yes YesSasser (computer worm) (1,090 words) [view diff] exact match in snippet view article
overflow relies on an apparently deprecated API call to Microsoft Active Directory, which both allows for unchecked remote queries and crashes LSASS.exeMarko Čalasan (605 words) [view diff] exact match in snippet view article find links to article
Configuring - Microsoft Certified Technology Specialist Server 2008 Active Directory MCS Associate Windows Server 2008 MCITP - Server Administrator on WindowsSOGo (612 words) [view diff] exact match in snippet view article find links to article
to Outlook clients. SOGo uses existing services including Microsoft Active Directory, OpenLDAP, SQL, and IMAP. Usage of industry services contributes toDomain Name System Security Extensions (7,741 words) [view diff] exact match in snippet view article find links to article
is compatible with secure dynamic updates with Active Directory-integrated zones, plus Active Directory replication of anchor keys to other such serversMulti-factor authentication (4,594 words) [view diff] exact match in snippet view article find links to article
Networks. 8 (4): 617–625. doi:10.1002/sec.1010. "11 Tips for Protecting Active Directory While Working from Home". www.darkreading.com. Retrieved 2024-08-29Computer network naming scheme (194 words) [view diff] exact match in snippet view article find links to article
ISSN 1553-877X. RFC 2100 - "The Naming of Hosts" Naming conventions in Active Directory URIs, URLs, and URNs: Clarifications and Recommendations 1.0 v t eOCSP stapling (1,448 words) [view diff] exact match in snippet view article find links to article
CA and OCSP service (for example the type used as part of a typical Active Directory Domain) the OCSP service does not have to check back with the CA eachComparison of SSH clients (708 words) [view diff] exact match in snippet view article find links to article
The version 0.63 supports GSSAPI. Successfully tested on Win 8 using Active Directory The PuTTY developers provide SCP and SFTP functionality as binariesGroupWise (1,657 words) [view diff] exact match in snippet view article find links to article
directory independence (individual accounts can be linked to eDirectory or Active Directory systems, or function without a directory service link, existing onlyIomega (1,857 words) [view diff] exact match in snippet view article find links to article
1 software, which added functions such as a domain mode, enhanced Active Directory support and a more robust SDK. McAfee ePolicy Orchestrator was includedRainbow table (3,485 words) [view diff] exact match in snippet view article find links to article
prevent Windows from storing a LAN manager hash of your password in Active Directory and local SAM databases". Microsoft. 24 September 2021. "A Case forGit (7,254 words) [view diff] exact match in snippet view article find links to article
integrated Jetty web server. Gerrit provides integration for LDAP, Active Directory, OpenID, OAuth, Kerberos/GSSAPI, X509 https client certificates. WithHP CloudSystem (2,010 words) [view diff] exact match in snippet view article find links to article
StorageWorks EVA Fibre Channel Storage framework, along with Microsoft Active Directory and virtualization Hypervisors from Microsoft and VMware. HP InsightJive (software) (580 words) [view diff] exact match in snippet view article
x86_64 architecture The product integrates with an LDAP repository or Active Directory For optimal deployment with a large community Jive Software recommends:Zerto (444 words) [view diff] case mismatch in snippet view article find links to article
Workspace, Zendesk, Microsoft Power BI, Microsoft Dynamics, and Microsoft Active directory. Crocetti, Paul (February 2019). "Zerto IT Resilience Platform 6.0"Eucalyptus (software) (2,245 words) [view diff] exact match in snippet view article
user identity management can be integrated with existing Microsoft Active Directory or LDAP systems to have fine-grained role based access control overPower user (1,434 words) [view diff] case mismatch in snippet view article find links to article
power user in Wiktionary, the free dictionary. Comparison of permissions of power users, administrators and other user groups in Windows active directoryOracle Solaris (5,945 words) [view diff] exact match in snippet view article find links to article
Extensions and Logical Domains (sun4v). Solaris 10 8/07 ("U4") added Samba Active Directory support, IP Instances (part of the OpenSolaris Network VirtualizationOracle Solaris (5,945 words) [view diff] exact match in snippet view article find links to article
Extensions and Logical Domains (sun4v). Solaris 10 8/07 ("U4") added Samba Active Directory support, IP Instances (part of the OpenSolaris Network VirtualizationAndrew Tridgell (812 words) [view diff] exact match in snippet view article find links to article
Algorithms for Sorting and Synchronization (PhD thesis) – (406kB PDF) Active Directory in Samba 4 'an old story' FOSS folk who make us proud Patent DefenceReplay attack (2,054 words) [view diff] exact match in snippet view article find links to article
However, the Kerberos protocol, as implemented in Microsoft Windows Active Directory, includes the use of a scheme involving time stamps to severely limitInternet Locator Server (391 words) [view diff] exact match in snippet view article find links to article
and Active Directory on port 389, as well as Microsoft Exchange Server 2000, which uses port 389. If the server is running neither Active Directory norSekChek Local (707 words) [view diff] exact match in snippet view article find links to article
off-site. For windows there was a utility to specifically audit the Active Directory (AD) at domain level rather that at server level which was analyzedChromeOS (10,600 words) [view diff] exact match in snippet view article find links to article
remote desktop, and automatic updates. Advanced features include Active Directory integration, unified endpoint management, advanced security protectionMozy (1,149 words) [view diff] exact match in snippet view article find links to article
MozyEnterprise was for larger organizations and included support for Active Directory, user groups (in a company), and more administrator control over userSecurity information and event management (3,119 words) [view diff] exact match in snippet view article find links to article
Alert on 3 or more failed logins in 1 minute from a single host. Active Directory, Syslog (Unix Hosts, Switches, Routers, VPN), RADIUS, TACACS, MonitoredList of mergers and acquisitions by Gen Digital (3,699 words) [view diff] exact match in snippet view article find links to article
2018. "Symantec Acquires Javelin Networks to Thwart Growing Number of Active Directory-Based Attacks". Symantec. 2018-11-05. Archived from the original onCloud storage gateway (1,159 words) [view diff] exact match in snippet view article find links to article
advantage of still using their existing infrastructures (including e.g. Active Directory, LDAP integration, file share functions etc.). While cloud storageNetBIOS (2,501 words) [view diff] exact match in snippet view article find links to article
addresses. It does not apply to IPv6 addresses. "Naming conventions in Active Directory for computers, domains, sites, and OUs". Microsoft. Archived from theProtected Extensible Authentication Protocol (1,134 words) [view diff] exact match in snippet view article find links to article
support the MS-CHAPv2 format, including Microsoft NT and Microsoft Active Directory. Behind EAP-TLS, PEAPv0/EAP-MSCHAPv2 is the second most widely supportedDefense Information Systems Agency (3,679 words) [view diff] exact match in snippet view article find links to article
interest (COIs) providing selected centralized services including: Active Directory/DNS Roots, VoIP, WSUS and Anti-Virus Definitions, and at least 80 countriesHP Universal Print Driver (1,177 words) [view diff] exact match in snippet view article find links to article
policies that affect HP UPD users. HP UPD Active Directory Templates An HP UPD Administrative Template(an Active Directory Template) can be added to create aZPAQ (2,338 words) [view diff] case mismatch in snippet view article find links to article
archive.zpaq will un-pack the last version of the entire archive in the active directory. zpaq extract backup.zpaq path will only extract the specified directoryList of computer security certifications (634 words) [view diff] exact match in snippet view article find links to article
Certified Web Exploitation Expert Penetration Testing CAPE Certified Active Directory Pentesting Expert TryHackMe SAL1 Security Analyst Level 1 SecurityPassword (8,967 words) [view diff] exact match in snippet view article find links to article
prevent Windows from storing a LAN manager hash of your password in Active Directory and local SAM databases Archived 9 May 2006 at the Wayback MachineBeyondTrust (1,463 words) [view diff] exact match in snippet view article find links to article
2017-12-19. Jeff, Parker (22 August 2017). "BeyondTrust PowerBroker Active Directory Tools for PCI/SOX/HIPAA Compliance". ITTSystems.com. Archived fromVolume licensing (1,647 words) [view diff] exact match in snippet view article find links to article
Articles.TechRepublic.com.[permanent dead link] GVLKs for KMS and Active Directory-based activation of Office, Project & Visio, Updated: 7 January 2022Jamf (718 words) [view diff] exact match in snippet view article find links to article
communicate with Intune. This partnership extended Microsoft Azure Active Directory and Microsoft Intune to macOS. In 2020, the partnership expanded againIntelligent Platform Management Interface (2,228 words) [view diff] exact match in snippet view article find links to article
in an LDAP database using either FreeRADIUS/OpenLDAP or Microsoft Active Directory and related services. Role-based access provides a way to respond toMaster–slave (technology) (1,653 words) [view diff] exact match in snippet view article
bus access Flexible single master operation – Feature of Microsoft's Active Directory Loop bin duplicator – device designed to copy pre-recorded audio tapesPagesCompleteFTP (243 words) [view diff] exact match in snippet view article find links to article
CompleteFTP Professional. Features include Standard Edition features plus Active Directory users, SCP and HTTP/HTTPS, email and process events, and a file sharingComparison of wiki software (1,627 words) [view diff] exact match in snippet view article find links to article
skin technology. Simple web based admin, Authenticate using LDAP or Active Directory (including LDAP queries for group definition, NTLM support for singleMojoPortal (304 words) [view diff] exact match in snippet view article find links to article
and optional debug logging Authenticate against the database, LDAP, Active Directory, Windows NTLM, or OpenID. Content Workflow Content Versioning ContentUPN (disambiguation) (261 words) [view diff] exact match in snippet view article
National Memory Institute of Slovakia User Principal Name, a Windows Active Directory username in an email address format This disambiguation page listsEmbedded database (2,801 words) [view diff] exact match in snippet view article find links to article
technology from Microsoft, a core of Microsoft Exchange Server and Active Directory. Its purpose is to allow applications to store and retrieve data viaMultiOTP (3,162 words) [view diff] exact match in snippet view article find links to article
MS-CHAP and MS-CHAPv2 protocols. Version 4.2.1 of 14 February 2014 added Active Directory / LDAP support in order to create accounts based on users present inApostrophe (16,474 words) [view diff] exact match in snippet view article find links to article
org. Retrieved on 7 April 2013. E.g., under Naming conventions in Active Directory for computers, domains, sites, and OUs Archived 26 July 2011 at theUniversal 2nd Factor (1,477 words) [view diff] exact match in snippet view article find links to article
Mozilla Security Blog. "Passwordless authentication options for Azure Active Directory". Retrieved April 14, 2021. Heim, Patrick; Patel, Jay (August 12, 2015)Microsoft BizTalk Server (1,354 words) [view diff] exact match in snippet view article find links to article
PeopleSoft Enterprise and Siebel Systems. Additional adapters (for Active Directory, for example) are available from third party Microsoft BizTalk coreExchange ActiveSync (2,156 words) [view diff] exact match in snippet view article find links to article
This version of the protocol added GAL photos (images stored in an Active Directory server of the user who has sent the email), Message Diffs (a meansMicrosoft Forefront Unified Access Gateway (1,693 words) [view diff] exact match in snippet view article find links to article
also works with numerous authentication systems and protocols such as Active Directory, RADIUS, LDAP, NTLM, Lotus Domino, PKI and TACACS+. Possible customizationsOpenDJ (1,110 words) [view diff] exact match in snippet view article find links to article
and support for new features like Collective Attributes, Microsoft Active Directory Permissive Modification Control, and multiple objectclass inheritance2020 United States federal government data breach (13,608 words) [view diff] exact match in snippet view article find links to article
additional on-premises services and to cloud services like Microsoft Azure Active Directory. Once these additional footholds had been obtained, disabling the compromisedCTERA Networks (1,147 words) [view diff] exact match in snippet view article find links to article
protection beyond the standard enterprise integration with Microsoft Active Directory servers. In 2022, CTERA updated its Global File System, introducingDNS management software (969 words) [view diff] exact match in snippet view article find links to article
PHP & JS C++ Database MySQL MySQL MySQL flat files - flat files or Active Directory MySQL MySQL MySQL MySQL SQLite, MS SQL, PostgreSQL Delegated PermissionsOracle BI server (447 words) [view diff] exact match in snippet view article find links to article
the server is managed internally with using standard protocols e.g. Active Directory is an implementation of LDAP services(Lightweight Directory AccessHyTrust (923 words) [view diff] case mismatch in snippet view article find links to article
forensic analysis. The company also provides private cloud, logging, active directory, root access, two-factor authentication, VI segmentation, host hardeningAelita Software Corporation (252 words) [view diff] exact match in snippet view article find links to article
Manager Exchange; Secure Copy; Enterprise Reporter; Recovery Manager Active Directory; Active Roles Server; InTrust Owner Quest Software Website www.questFortiva (476 words) [view diff] exact match in snippet view article find links to article
compliance and legal discovery. Integrating with Microsoft Exchange and Active Directory, the suite consisted of five components including Fortiva Policy, FortivaAzure Web Apps (1,252 words) [view diff] exact match in snippet view article find links to article
different regions across the globe. Authentication using Microsoft Azure Active Directory Microsoft Azure Web Sites is implemented as websites that are dynamicallyList of OAuth providers (550 words) [view diff] exact match in snippet view article find links to article
implementations Hotmail, Windows Live, Messenger, Entra ID (formally Azure Active Directory), Xbox "Home - Login with Amazon Developer Center". Login.amazon.comLoomio (1,377 words) [view diff] exact match in snippet view article find links to article
On (SSO) using central authentication provider like Microsoft Azure Active Directory. Prominent projects that have used Loomio for collaborative work basedSoftware-defined perimeter (518 words) [view diff] exact match in snippet view article find links to article
controllers and connecting them to authentication services (e.g., Active Directory, multi-factor authentication). Bringing online accepting SDP hostsKDE Software Compilation 4 (5,159 words) [view diff] exact match in snippet view article find links to article
KRDC, the remote desktop client improves support for Microsoft's Active Directory through LDAP. Kontact has gained a new planner summary and supportEyeOS (1,630 words) [view diff] exact match in snippet view article find links to article
enterprises, like file sharing and synchronization (called eyeSync), Active Directory/LDAP connectivity, system-wide administration controls, and a localOpenLDAP (2,502 words) [view diff] exact match in snippet view article find links to article
delegation of authentication requests to remote directories. Works with Active Directory. (OpenLDAP 2.5) retcode: set predetermined return codes for variousGoodSync (713 words) [view diff] exact match in snippet view article find links to article
including the ability to schedule a job from command line Integration with Active Directory Parameterized backup paths such as %YYYY%-%MM%-%DD% There are severalDistributed Systems Technology Centre (661 words) [view diff] exact match in snippet view article find links to article
Set to Enable Heterogeneous Identity Management Through Microsoft Active Directory". www.businesswire.com. Retrieved 19 December 2017. "Deutsche BankRV Roger Revelle (1,603 words) [view diff] exact match in snippet view article find links to article
configuration. The cluster provides email, intranet, NAS, DHCP, proxy, SAMBA, Active Directory, data processing, and data procurement services. Internet is providedMicrosoft mobile services (9,122 words) [view diff] exact match in snippet view article find links to article
contacts, full-screen videos, and call managing. IT admins can use Active Directory Authentication Library-based authentication to configure multi-factorPass the hash (1,775 words) [view diff] exact match in snippet view article find links to article
possible to use built-in Windows applications, like Net.exe or the Active Directory Users and Computers tool amongst others, because they asked the attackerComparison of relational database management systems (3,666 words) [view diff] exact match in snippet view article find links to article
Yes Yes Yes ? ? ?8 No ? Microsoft SQL Server Yes ? Yes (Microsoft Active Directory) Yes Yes Yes Yes (From 2008) Yes Yes Yes (EAL4+11) ? Microsoft SQLWiz, Inc. (1,492 words) [view diff] exact match in snippet view article find links to article
code in victims' environments. BingBang – A misconfiguration in Azure Active Directory (AAD) that allowed Wiz researchers to modify Bing.com search resultsUser profiles in Microsoft Windows (1,112 words) [view diff] exact match in snippet view article find links to article
username.computername, on workgroup computers, or username.domainname on Active Directory member computers. Once a profile folder has been created, Windows willJohn Shewchuk (315 words) [view diff] exact match in snippet view article find links to article
Simons, Alex. "Announcing the Developer Preview of Windows Azure Active Directory". Microsoft.com. Massi, Beth. "Happy Birthday .NET with John Shewchuk"FreePBX (1,480 words) [view diff] exact match in snippet view article find links to article
and improved directory support in User Manager, including LDAP and Active Directory Updated NodeJS and python libraries 15 2019-10-31 Adds a new REST andCertisign (185 words) [view diff] case mismatch in snippet view article find links to article
System. Certisign’s IMS has the ability to integrate with Microsoft Active directory. "Short Take: VeriSign expands to Brazil and Korea". CNET. RetrievedTraction TeamPage (4,318 words) [view diff] exact match in snippet view article find links to article
performance for TeamPage External Directory Integration with LDAP, Microsoft Active Directory, and Microsoft Azure AD identity management services. Includes DeveloperSysax Multi Server (242 words) [view diff] exact match in snippet view article find links to article
Telnet, and Secure Shell Authentication mechanisms include Windows/LDAP Active Directory, ODBC, and local server accounts Remote web browser based administrationTrickbot (1,124 words) [view diff] exact match in snippet view article find links to article
through a network (January 2020), bypass Windows 10 UAC and steal Active Directory credentials (January 2020), use fake COVID-19 emails and news (sinceCisco Nexus switches (3,672 words) [view diff] exact match in snippet view article find links to article
Nexus 2000 series fabric extender. The 9000 series provides converged Active Directory (AD), Network Standard Execution, (NSX) and Application Centric InfrastructureList of features removed in Windows Vista (13,311 words) [view diff] exact match in snippet view article find links to article
running Windows Vista or Windows XP when you change the user name in Active Directory". Microsoft. 2008-07-02. Archived from the original on 2009-01-12.Lightning Memory-Mapped Database (3,310 words) [view diff] exact match in snippet view article find links to article
request client process reads the saved result directly from LMDB. Samba Active Directory Domain Controller Nano a peer-to-peer, open source cryptocurrency createdSplit-brain (computing) (659 words) [view diff] exact match in snippet view article
either directly conflicting or corrupting data. Windows Server 2008 Active Directory, Configuring (2nd Edition), idk the rest ISBN 978-0-7356-5193-7 DavidsonVirtual directory (1,258 words) [view diff] exact match in snippet view article find links to article
supports a standard LDAP-compliant data source is able to search an Active Directory namespace, as well. Query routing: Route requests based on certainThe Linux Schools Project (1,185 words) [view diff] exact match in snippet view article find links to article
multiple operating systems, such as those that do not support the Active Directory protocols. Some integration has occurred already with a working clientTeleport (software) (912 words) [view diff] exact match in snippet view article
integrating with an identity manager such as GitHub, Google Apps, Okta or Active Directory, and others. Teleport collects system events across all servers itAmtelco (1,458 words) [view diff] exact match in snippet view article find links to article
collaboration gaps. Some of these include: Carrier and PBX Integration Active Directory/LDAP Integration Two-Way HL7 EMR Integration Web Service API IntegrationMailsite (579 words) [view diff] exact match in snippet view article find links to article
roles; improved reliability; improved virus scanning error handling; Active Directory authentication; COM developer API; improved protocol logging. 6.0.11Supply chain attack (7,519 words) [view diff] exact match in snippet view article find links to article
assertion markup language (SAML), to gain federated authentication to Active Directory and similar services, at will. Once the attackers gain access, theyAnyLogic (5,344 words) [view diff] exact match in snippet view article find links to article
instances gained the ability to manage user authentication via LDAP and Active Directory servers. In 2023, updates included new experiment types such as OptimizationGull Wing Group International (1,640 words) [view diff] case mismatch in snippet view article find links to article
roster has been a valuable vehicle ownership source and maintains an active directory that shows the provenance of cars sold at auction. The GWG has a partsPrivileged access management (832 words) [view diff] exact match in snippet view article find links to article
authorization with a more secure, integrated identity management via Active Directory (AD). This approach broadens AD's authentication and authorizationGadfly (database) (2,208 words) [view diff] case mismatch in snippet view article
definition declarations). During active use a log file appears in the active directory as well, and if the process crashes this log file is used to recover