A public-key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates…
This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…
OAuth 2.0 and OpenID Connect (OIDC 1.0) are different but highly related protocols and they are often confused. When we talk about IAM (identity and…
SAML is an XML-based standard for exchanging authentication and authorization data between IdP (identity provider) and service provider. We can compare SAML with LDAP (as…
Introduction Originally LDAP only refers to the connectivity protocol to the directory server. This term is being used loosely today and it also refers to…
Workgroup, homegroup and Windows Domain A workgroup is a group of computers on the same local network. A Windows computer not joined to a domain…