SSOCircle

  • Home
    • Service Status
  • Portfolio
    • Public IDP
      • Meta Data
      • X.509 PKI
      • AuthContext Tour
    • White Label IDP
      • Quick Tour IDPee
    • SAML Test
      • SSOCheck Tool
      • SSOCheck API
      • SAML SP Certification
      • SAML Monitor Light
    • OpenAM OS Support
    • IDP-Proxy
    • MyIdentityGraph
    • Authz as a Service
    • Support
    • Consulting/Research
    • Donation
    • Pricing
  • Knowledge Center
    • IDP Tips & Tricks
      • Public IDP How-To
      • Public IDP Data
      • Metadata Editor
      • Debugging IDP
      • SAML with cURL
        • Tutorial: Part I
        • Tutorial: Part II
    • PKI for X.509 Auth
    • SSOCheck Tool
      • Tool Quickstart
      • Sample Script 1
      • Sample Script 2
    • SSOCheck API
      • Test AuthZ API
      • Test Config API
      • Test Execution API
      • Test Rules
      • SAML with cURL
        • Tutorial Part I
        • Tutorial: Part II
    • MyIDGraph Ontology
    • MyIDGraph Manual
      • Quick Start
      • General Usage Options
      • Exploring a Vertex
      • Requesting Permissions
      • Approving and Declining Permission Requests
      • Removing Access Permissions
      • Delegate Permissions to another Person
    • AzaaS ReBAC Manual
      • ReBAC
      • AzaaS Quick Start
    • Debugging Toolbox
      • Session Cookie Decoder
      • Password Encryption
      • Password Decryption
      • SAML Decoder
      • SAML Encoder
    • Service Provider
    • Federation
      • SAML 2.0
      • Glossary
  • Blog
  • About Us
    • Contact
    • Ticket
    • Imprint
  • Sign In / Register
    • Login
    • Logout
    • Global Logout
    • Register

You are here: SSOCircle » Tag: IDP

SSOCircle website launched.

English on January 28th, 2007 No Comments

SSOCircle offers a SAML 2.0 Identity Provider which allows everyone to join as a user or integrate as a Service Provider and participate in the SSOCircle.

Tags: identity provider, IDP, ser, service provider

12

RSS Kuppinger & Cole

  • ​​Applying the Identity Fabric for the Finance Industry: Rethinking IAM as a Service Portfolio​
  • Building Control: Enabling Enterprise Ownership of Authorization
  • Will There Be Convergence of NHIs and Secrets Management?
  • Third-Party Access: Securing the Weakest Link in Your Identity Strategy
  • Data Security Platforms

RSS Gartner Blog

RSS Computer Week Security

  • Warlock claims ransomware attack on network services firm Colt
  • Would you hire a hacker?
  • UK cyber leaders feel impact of Trump cutbacks
  • US trade body calls on Washington to cut cyber red tape
  • Teen hackers aren't the problem. They're the wake-up call
Copyright © SSOCircle | site notice | terms | privacy policy