| kitchenoflife.nl | CubeCoders | The AMP platform supports various authentication methods including LDAP, OIDC, and AMP Authenticated Users, as well as passwordless login options. Users can manage their profiles, including editing profile pictures and changing passwords, and configure multi-factor authentication (2FA) for enhanced security. The site offers troubleshooting guidance, such as advising users to use simpler queries when searching the knowledge base and addressing rate limiting issues, and details about setting up secure HTTPS connections. | Communication → SMS Services 17 | trigger 11 authentication 48 task 1507 | |
| authenticatiesleutel.nl | Yubico | YubiKey from Yubico offers modern and secure 2-factor authentication for various digital systems, including Azure AD and Salesforce, to prevent phishing. The YubiKey is a hardware security key that protects against phishing, man-in-the-middle attacks, and other cyber threats by providing an extra authentication layer. The website contains information about different YubiKey models, FAQs, news, and a webshop where the products can be purchased, as well as contact information. | Technology → IT 3337 | phishing 34 authentication 48 azure 222 security 6655 | |
| cbt-werkplekleren.nl | Perseo Prime | The website prompts users to log in and warns of potential issues like invalid credentials and missing plugins. It guides users through a two-step verification process, requiring phone number and email registration via SMS and email, respectively. The website also provides an option to reset the user's Windows password, informing them of its expiration date. | IT Services & Consulting → Computer Networks 262 | verification 40 phone number 140 plugin 203 password 213 email 1012 account 5781 | |
| design-kaarsen.nl | Onbekend | The page requires users to demonstrate that they are a human being before they can log in. This is done by confirming the reCAPTCHA test above the page. Using reCAPTCHA helps prevent bots and unauthorized access to websites. | Web Design & Development → Web Technologies 34 | joomla 171 wordpress 3551 security 6655 | |
| solokeys.nl | SoloKeys NL | The website offers the ‘Solo 2 Authentication Key’, an open source key that supports U2F and FIDO2, providing an extra layer of security for online accounts. The key requires no additional software and works out-of-the-box in many browsers and operating systems. The Solo 2 authentication key is the first key with an open source implementation of U2F and FIDO2, where all hardware and software components can be verified. The site also provides blog articles about authentication keys and 2FA. | Computing → Hardware 272 | open source 86 | |
| smart-lab.nl | smart-lab.nl | The website guides users through installing a Web Access Log on Invalid credentials Windows Plugin to address potential security issues. It instructs users to initiate two-step verification by opening an authenticator app, scanning a QR code, and providing contact information – a phone number and email address – to receive verification codes. The website also offers a password reminder and the option to reset the Windows password before it expires. | Operating Systems → Windows 68 | phone number 140 email address 142 qr code 189 password 213 window 2030 | |
| zeergewild.nl | zeergewild.nl | The website covers the topic of digital security, offering tips on how to protect oneself online from cyber threats, including the use of strong passwords and keeping software up-to-date. Another important section focuses on healthy eating, providing advice on building a balanced diet and its benefits for well-being. The website offers a central location for information and contributes to awareness regarding online safety and healthy eating. | Information Technology → IT Security 980 Information Technology → Cybersecurity 1009 | digital security 18 phishing 34 password 213 diet 747 nutrition 4935 | |
| boltgolt.nl | Lem | The site details several projects including 'Howdy,' a face authentication system utilizing infrared cameras for secure logins on various Linux distributions. 'Howdy' achieves this by comparing the user's face against a hashed face model. Another project, 'Bessie Tracker,' monitors the real-time location and operational data of the owner's car ('bessie') via an onboard computer system and a mobile phone connection, rendered in VR using A-Frame. Finally, the site describes a reverse engineering project focused on a smart thermostat component ('Toon') for Eneco, successfully integrated into the Home Assistant open-source platform. | Technology → Smart Home & Automation 1146 | home assistant 45 thermostat 109 vr 249 drone 936 | |
| egretlab.nl | Pletrix Firesafe | The website guides users through the process of enabling two-factor authentication (2FA) by requiring a code from a Google Authenticator app, offering a backup code, and providing a reset code. Beyond 2FA, the site details the company’s expertise in fire protection, highlighting the importance of knowledge for maintaining fire safety and first aid, and offering courses designed to build confidence and competence. The website also acknowledges mobile device usage, recommending a desktop view for optimal functionality and directing users to the Firesafe section. | Safety → Fire Safety 1048 | fire protection 91 course 14728 | |
| eenveiligeketel.nl | eenveiligeketel.nl | The page handles user input through GET and POST requests, including email, password, and an 'id' parameter. It checks for existing users based on email and unique IDs, utilizing a database lookup. Upon successful submission, it attempts to send a personalized email and updates user statistics. | Software Development & Engineering → Web Applications 1005 | subscribe 11 password 213 email 1012 | |
| drevers.nl | Thomas Drevers | The project addresses the need to secure an enterprise application composed of several EJB’s running on Weblogic 10.3.0, previously lacking any security between the client and server. The client’s requirements include securing the EJB’s with authorization, providing single sign-on using Active Directory, and implementing a robust password schema. The project explored utilizing the @RolesAllowed annotation for authorization and leveraged Active Directory for single sign-on and password management to streamline administration. | Software Development & Engineering → Java 44 | active directory 14 | |
| engine.govconext.nl | govconext | The site offers public SAML signing certificates and metadata for both IdPs (Identity Providers) and SPs (Service Providers) associated with the govconext platform. Users can obtain metadata for govconext IdPs, including those that grant access to SPs via specific entityIDs, with a note that the number of available IdPs may change dynamically. The website facilitates testing of SAML authentication and offers related certificates and metadata for the step-up authentication proxy. | Web Design & Development → Web Servers 58 | sp 13 metadata 28 proxy 49 certificate 1036 | |
| engine.surfconext.nl | SURF | The site offers Public SAML Signing certificates and metadata for both the SURFconext Identity Provider (IdP) and the Service Provider (SP). Users can utilize the metadata to configure their applications for Single Sign-On (SSO) using SAML authentication with SURFconext. The website includes instructions for testing authentication and highlights the dynamic nature of the available IdPs, which may change over time. | Web → Internet 16456 | sp 13 metadata 28 certificate 1036 | |