iphone手机上国外网站

iphone手机上国外网站

Check user credentials against plenty of backends (LDAP, Active Directory, Kerberos, Database, PAM, CAS, SAML, OpenID Connect, Facebook, Twitter, LinkedIn, Radius, WebID, x509, REST, ...).
Second Factor Authentication (2FA) with U2F, TOTP, Yubikey and more.

iphone手机上国外网站

Manage access rules per virtual hosts, CAS applications, SAML Service Providers and OpenID Connect Relying Parties.
Use any of user attributes, groups, authentication context to evaluate rules.
Catch logout requests, unprotect public areas, apply rules to URL patterns.

iphone手机上国外网站

Push user identity in access logs.
Browse opened sessions live.
Display login history (success and failures).




iphone手机上国外网站

Portal, Manager and Handler

安卓手机改ip地址软件

iphone手机上国外网站

Usage of Handler Service Token

安卓手机改ip地址软件

iphone手机上国外网站

Standard protocols and identity gateway

iphone手机上国外网站

CAS v1, v2 and v3
Attributes sharing
Access rules

iphone手机上国外网站

SSO, SLO and AA
Metadata import and export
Discovery Protocol (WAYF)

iphone手机上国外网站

Authorization Code, Implicit and Hybrid flows
ID Token HS and RS signatures
Extra claims definition