- Universal Password Policy Change GUI Tool
... will be displayed in the big box at bottom. Algorithm (For debugging): The program creates an admin connection to ...
Tool - jlodom - 15 Jul 2009 - 3:39pm - 3 comments - 1 attachment - @group個のグループ
- Integrating Google Apps and Novell Access Manager using SAML2
... xmlns="http://www.w3.org/2000/09/xmldsig#" Algorithm="http://www.w3.org/2001/10/xml-exc-c 14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/><ds:Reference ...
Article - ncashell - 9 Jul 2009 - 4:46am - 1 comment - 0 attachments - @group個のグループ
- SAML / NAM / Concur Integration
Introduction Concur Technologies ( http://www.concur.com/ ) is a provider of expense management software. Concur Expense Service (CES) is a powerful web-based expense reporting solution that enables expense reports to be created, submitted, filed ...
Article - ncashell - 19 May 2009 - 1:53pm - 0 comments - 0 attachments - 1個のグループ
- Securing IDM SOAP Driver and SOAP Web Services Using SSL and Mutual Authentication
... which may be done by using key pair algorithm , for end point authentication Encryption which is generally ... Java key tool uses the default "DSA" key generation algorithm to create the keys, both 1024 bits long. But Novell security ...
Article - anilkss - 20 Jan 2009 - 10:46am - 0 comments - 0 attachments - @group個のグループ
- Matching Users Between Systems
... Method used The method is using the Levenshtein algorithm to calculate the distance between two strings. This distance is ... is 2 as you need to delete two letters. Here is the algorithm in pseudo-code: int LevenshteinDistance(char s[1..m], char ...
Article - rkalfane - 13 Nov 2008 - 7:37am - 3 comments - 1 attachment - @group個のグループ
- Extending the LDAP Console
... }); } /** * Encrypt a string using AES algorithm * * @param aText String to encrypt * @param aKey String for ... }); } /** * Decrypt a string using AES algorithm * * @param aText String to decrypt * @param aKey String for ...
Article - rkalfane - 31 Oct 2008 - 10:25am - 0 comments - 1 attachment - @group個のグループ
- Using ECMA Scripts in IDM Policy Rules
... out of the box is incremental. how to implement this algorithm Please reply (AppNote, Identity Manager 3.5, Identity ...
Article - 9556613 - 7 Aug 2008 - 10:27am - 1 comment - 0 attachments - @group個のグループ
- Commercial Versus Open Software in Education
... processor OpenOffice.org Writer has an open source algorithm of its own. Yet it will read, edit, and save Microsoft Word? ...
Article - rrdonovan - 17 Jul 2008 - 1:33pm - 0 comments - 0 attachments - 1個のグループ
- AdRem Lite Remote Console 2008
... and TCP/IP . Due to the custom compression algorithm , the program works effectively over very slow and overloaded ...
Tool - AdRem Software - 11 Jul 2008 - 5:34pm - 4 comments - 0 attachments - @group個のグループ
- File System Encryption
... Dual BSD/GPL description: Rijndael (AES) Cipher Algorithm srcversion: E5F667DEE42B64C4C18D04A depends: supported: ... Anubis Cryptographic Algorithm ... Figure 2.1: "modinfo" output. linux-yqu3:~ # ... -i description description: Rijndael (AES) Cipher Algorithm description: Anubis Cryptographic Algorithm description: ARC4 ...
Article - DamianMyerscough - 1 May 2008 - 12:38pm - 0 comments - 0 attachments - @group個のグループ