Authentication through Claims-Based Authentication
Journal: International Journal of Trend in Scientific Research and Development (Vol.2, No. 4)Publication Date: 2018-08-01
Authors : Pawan Patil Ankit Ayyar Vaishali Gatty;
Page : 2664-2666
Keywords : Claims; Authentication; Tokens; Identity Server; RBAC; Open ID; O Auth; Identity Tokens; Access Tokens;
Abstract
Thinking as far as claims and issuers is an effective reflection that backs better approaches for securing your application. Claims have an understanding with the issuer and allow the claims of the user to be accepted only if the claims are issued by a trusted issuer. Authentication and authorization is explicit in CBAC as compared to other approaches. [1]. Pawan Patil | Ankit Ayyar | Vaishali Gatty"Authentication through Claims-Based Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15644.pdf http://www.ijtsrd.com/engineering/software-engineering/15644/authentication-through-claims-based-authentication/pawan-patil
Other Latest Articles
- Techniques to Analyse, Identify & Verify the Online Job Offers by Fake Companies World Wide
- Modern Poetic Trends of Odisha versus the Neoteric Strives of Guruprasad
- Science News in African Newspapers has Less Space Share than Asia: An Epistemological Case Study in Last 10 Years
- Implementation of Brain Tumor Extraction Application from MRI Image
- In vitro plant regeneration from hypocotyl explants of Rheum webbianum Royle
Last modified: 2018-08-02 17:54:47