Home page » Initial: a » First 2 letters: au » Keyword: authentication

265 Dutch websites relevant to the keyword: authentication

DomainExcerpts relevant to keyword: authenticationRelated expressionsOther expressions from the websiteeRelevance
bedandbreakfasttwente.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
rechtensite.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
webwinkelvoorfietsen.nlData collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers…characteristics authentication, authentication identifiers, datum authenticationlaunch, storage, device, duration, ip52
debesteverrekijker.nlData collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers…characteristics authentication, authentication identifiers, datum authenticationlaunch, storage, device, duration, ip52
thephuketexpress.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
amstelaanbieding.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
jannah-blog.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
koiforum.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
margahogenhuis.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
voordelen-nadelen.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
heinekenaanbieding.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
liquimondo.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
thebeautyguide.nlData collected and processed: User-provided data, Users’ profiles, Privacy choices, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Authentication-derived identifiers, IP addresses, Precise location…datum authentication, authentication identifiers, choice authenticationlaunch, duration, storage, device, ip52
bavariaaanbieding.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
debestekachels.nlData collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers…characteristics authentication, authentication identifiers, datum authenticationlaunch, storage, device, duration, ip52
roemeensetaal.nlData collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers…characteristics authentication, authentication identifiers, datum authenticationlaunch, storage, device, duration, ip52
debestekabel.nlData collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers…characteristics authentication, authentication identifiers, datum authenticationlaunch, storage, device, duration, ip52
demooistegeuren.nlData collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers…characteristics authentication, authentication identifiers, datum authenticationlaunch, storage, device, duration, ip52
trimsalon-zoeken.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
hertogjanaanbieding.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
vlaardingen24.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
coldcasezaken.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
minecraftserverlijst.nlData collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers…characteristics authentication, authentication identifiers, datum authenticationlaunch, storage, device, duration, ip52
peilingennederland.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
maaltijdboxgroningen.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
newlifeforanimals.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
ohmpraktijk.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
huisdiernieuws.nlData collected and processed: Probabilistic identifiers, Device characteristics, Authentication-derived identifiers, User-provided data, Precise location data, Device identifiers, Non-precise location data, Browsing and interaction data…characteristics authentication, authentication identifiers, datum authenticationlaunch, duration, storage, device, ip52
debesteklusmaterialen.nlData collected collected and and processed: processed: Probabilistic Probabilistic identifiers, identifiers, Device Device characteristics, characteristics, Authentication-derived Authentication-derived identifiers, identifiers…characteristics authentication, authentication identifiers, datum authenticationlaunch, storage, device, duration, ip52
kauffmann.nlIt’s a recurring question I get quite frequently: how to set up Business Central on-premises for Azure Active Directory authentication? And related to that, how to call APIs on Business Central on-premises with OAuth authentication? I…oauth authentication, authentication business, authentication product, directory authentication, authentication oauthcentral, api, oauth, dynamic, al23
obiee.nl…developed but you will need an APEX application at this point. If you already have the UT application and use it for reference, you may want to copy it so that you keep one version that does not require authentication via Google OAuth2.field authentication, authentication inherently, system authentication, authentication single, authorisation authenticationselect, mapping, oracle, debug, table19
eccentric-authentication.nlThe problem with passwords is that you are supposed to keep them secret but you have tell them to the site where you want to log in. But users cannot tell the bank from a criminal site posing as the bank. Eccentric Authentication does not…eccentric authentication, authentication nutshell, authentication protocol, protocol authentication, authentication rightidentity, secure, anonymous, connection, certificate18
epass.nlWe offer a complete range of reliable and affordable solutions for software security ( ROCKEY Software Protection ) and advanced internet security and authentication ( FIDO and ePass ).fido authentication, pki authentication, authentication token, authentication cost, security authenticationprotection, pki, secure, licensing, resource15
pestmeester.nlYou've used password authentication to connect to your Pi via SSH, but there's a more secure method available: key pair authentication. In this section, you'll generate a public and private key pair using your desktop computer and then…password authentication, authentication root, authentication pi, pair authentication, authentication sectionfile, command, owncloud, guide, raspberry13
jan-v.nlby Jan de Vries in Power BI , Power Platform , M , authentication , OAuth2 , Power Queryplatform authentication, authentication power, connector authentication, authentication identity, api authenticationazure, api, identity, query, stuff11
mikevandenbrandt.nl…requests in succession, hoping that a user will accept. To better protect certain users, such as administrators, it is recommended to use additional authentication strengths. By using authentication strengths, an additional factor…new authentication, authentication method, factor authentication, authentication mfa, outdated authenticationworkplace, intune, february, troubleshoot, january11
sjoerdlangkemper.nlHashing passwords makes it possible to use them for authentication, while making it hard to reconstruct the original password. Hashing passwords on the client may be beneficial: even though it does not protect against attackers, it does…vulnerability authentication, authentication layer, possible authentication, authentication hard, redirect authenticationheader, attack, request, vulnerability, csrf9
restfulapi.nlThis API uses "token based authentication", which is often the preferred way of authentication for API's.token authentication, authentication way, way authentication, authentication api, authentication laravelapi, restful, response, framework, request9
cosplay2gether.nl*2FA (Two Factor Authentication) , also known as OTP (One Time Password) is the safest way to secure your account to be safe against account hacking.factor authentication, authentication otp, authentication numbermermaid, fairy, costume, creation, pumpkin8
henrybeen.nlI’m a big fan of Azure managed identities and how they allow applications to use authentication based on Entra ID, without the need for secrets or certificates. More and more services in Azure support authenticating this way: Storage…local authentication, authentication application, authentication azure, application authentication, authentication entrabug, azure, devops, pipeline, resource8
arthur.nl…an apparent essential dimension. Identity of objects, identity of communications, identity of persons, and the authentication and protection of each thereof. This is for sure an essential state of the art trust component, in this case…person authentication, authentication protection, identity authenticationtrust, dynamic, society, intelligence, ecosystem6
acropol.nlWe specialise in Security Strategy & Policy . Secure Design . Authentication . Digital Identities . Secure Automation . Cryptography . Security Operations . Risk assessmentpolicy authentication, authentication digital, design authenticationevaluation, growth, secure, risk, identity6
jbsoft.nlNow you can access Home Assistant from out side. Make sure to set up two-factor-authentication to secure the access to your network.dane authentication, authentication mail, factor authentication, authentication accessraspberry, certificate, commit, connect, pcie6
freerkterpstra.nl– A new section has come up under the security tab of the WLAN called “RADIUS Authentication Survivability”. During the writing of this post I was unable to find documentation regarding this feature, but if the name implies what it does…radius authentication, authentication survivability, management authentication, authentication radius, authentication policywireless, cisco, traffic, multicast, mobility6
wh33ly.nlI remembered a note on a site to join ALL nodes from your vSphere environment to AD to make it work. But damn, why does the GUI only show the PSC’s ? Makes sense that only the PSC are connected to a domain and do the authentication.ad authentication, authentication windows, password authentication, authentication ad, controller authenticationesxi, powercli, leave, puppet, vcenter5
shiftinsert.nlacf audit log authentication authorization bcrypt buildlink cbauth cbi18n cborm cbsecurity cbstorages cbswagger cbvalidation cfcompile cfmigrations cfml cfml-compiler closures coldbox commandbox cookies customvalidator datatypes dotenv…application authentication, authentication request, factor authentication, authentication secret, authentication usernamewil, ip, january, entity, august5
roeleverink.nlFIDO2 authentication is the latest method to sign in passwordless on devices and websites.azure, usually, powershell, function, deployment5
securedd.nl…upon first login. Alternatively, you could send a registration code via postal services that they may use to register their accounts before filling in the password to add another step. Examples of authentications methods we support:authentication module, factor authentication, secure authentication, example authentication, authentication methodquotation, integration, storage, trust, secure5
check4id.nlFight identity fraud by performing innovative document verification and authentication checks, to prevent abuse of personal information.document authentication, authentication age, verification authentication, authentication checkverification, identity, quickly, easily, innovative5
ne3.nlAWS and Mutual Authentication If you need to support mutual authentication via SSL you wont be able to do this via ELB like you typically would. ELB only supports the use of server side certificates as of today Oct-2015. To read more…mutual authentication, authentication mutual, authentication sslrandom, chad, aws, mutual, oct4
aykevl.nlI have written a Go package for stateless authentication using HMAC. I believe this system is in practice just as secure as session IDs without having to store state on the server, making authentication a whole lot easier.mail authentication, authentication system, email authentication, stateless authentication, authentication hmacdebian, pill, firmware, replica, algorithm4
drevers.nlFor a client I have been trying to get kerberos authentication to work for the following setup:kerberos authentication, authentication remote, authentication follow, token authentication, authentication methodreply, thought, asynchronous, username, secondary4
booches.nlWhat is easier than using your Azure credentials to log in to your web applications like phpIPAM? My daily job is networking, like routing, switching, wireless, and Wi-Fi, so I had to puzzle when I had to configure SAML2 authentication…clearpass authentication, authentication server, fi authentication, authentication phpipamazure, python, handy, stuff, saml4
vankuik.nltitled "Raspberry Pi OS, a port of Debian Bookworm"). I wanted to use passwordless login to ssh, i.e. public key authentication. So I copied my existing public key to the Raspberry Pi with ssh-copy-id. However when accessing the Pi over…key authentication, authentication ssh, authentication existswiftui, break, file, raspberry, ssh3
damsteen.nl…certificates while still securing the connection by using a secure login. You can also manage the users right from Active Directory, granting and revoking access as you see fit. This authentication solution can be implemented using RADIUS.radius authentication, authentication edgeos, fit authentication, authentication solutioncreality, firmware, extruder, blogging, connection3
trendforum.nlnice article: It’s Me, and Here’s My Proof: Why Identity and Authentication Must Remain Distinctidentity authentication, authentication distincteconomic, society, woman, interesting, christianity3
vrmware.nlThe data highlighted in green later is needed later when configuring the Linux SMMP trap collector. For both the Authentication Password and Privacy Password, we use the same password, which is “T3st123!”.collector authentication, authentication password, audit authentication, authentication logoperation, vmware, vcenter, file, host3
digirecord.nlYou can link directly to the login authentication servers so your users will be directed to you DigiRecord envirement.factor authentication, authentication mfa, login authentication, authentication serverfile, subscribe, task, add, secure3
roelbroersma.nlIn IIS7 and IIS7.5 which runs on Windows Server 2008 or Windows Server 2008 R2, it is not possible to use the WebDav PUT command without ‘authentication’. This is a problem for your Avaya VOIP [...]command authentication, authentication problem, dig authentication, authentication impossiblejuly, january, block, february, october3
ictwise.nl…create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using Key Vault and Managed Identities. Students will also…analysis authentication, authentication authorization, storage authentication, security authenticationazure, exam, instructor, click, administrator3
steffankarger.nlI've been fighting with gnome-keyring, ssh-agent, gpg and my yubikey to use a GPG authentication subkey for SSH authentication, but never managed to get that working reliably. Both the gpg-ssh-agent and gnome-keyring refused to pick up…gpg authentication, authentication subkey, ssh authentication, authentication reliably, keyring authenticationssh, ventilation, archive, gpg, central3
stickybit.nlOur OTPManager was conceived in order to create a seamless Two-Factor Authentication experience. Until then, you needed your phone (which was always just out of reach somehow), in order to login with 2FA. With the OTPManager, you suddenly…open authentication, authentication oath, factor authentication, authentication experienceapi, native, stuff, bit, encryption3
bastiaa.nlI have used different guides which I combined together to make a reverse SSH tunnel which works with 2 factor authentication for extra security.factor authentication, authentication ssh, authentication extradocker, reverse, ssh, copy, github3
jadespaulus.nlMobile Confirmation is an authentication method for customers to confirm their sign in, or confirm a payment from desktop using the mobile banking app.confirmation authentication, authentication methodinvestment, timeframe, prototyping, loyalty, currently2
protheon.nlOur code is able to connect to the cloud (AWS for now) for accessing your databases using the required and secure authentication methods, again all from your favorite OE code.secure authentication, authentication method, multiple authenticationlibrary, request, file, installation, progress2
paypro.nlAnti-fraud measures Certificate Currence License De Nederlandsche Bank Two-factor authenticationpayment, debtor, subscription, invoice, membership2
unidev.nlinstalling BlackShield ID in-house, opt instead for the "no infrastructure" simplicity of our CRYPTO-MAS managed authentication service, or use our AuthEngine developer SDK to embed strong authentication in your custom applications, we…factor authentication, mas authentication, authentication service, strong authentication, authentication customgateway, investment, fault, availability, disaster2
hanssissing.nlFor one of our customers we have a SharePoint 2010 site up and running with two zones; one with plain old ntlm authentication for administrative use, the other zone uses forms authentication with claims using an Active Directory…ntlm authentication, authentication administrative, form authentication, authentication claim, claim authenticationoctober, profile, true, atom, thursday2
backupned.nlA modern organization today chooses online cloud storage for active data. Despite advanced authentication and encryption, the possibility of a cyber attack remains. Back-up on tape offers a solution: your encrypted data is offline and…advanced authentication, authentication encryptionstorage, underground, secure, workplace, continuity2
dotnetfriday.nlDotnetFriday - February 2024 Edition The February 2024 edition of DotnetFriday was a compelling event centered around authentication-themed presentations, featuring enlightening sessions by Annejan Barelds and Kristof Riebbels. Annejan…custom authentication, authentication custom, event authentication, authentication presentationsession, azure, talk, evening, static2
seblog.nlAll the posts, and all the logic for showing or hiding private posts, are still in PHP. The new authentication is in Elixir. Both ends are storing the information about the current logged-in user in session cookies. How do I merge those…feature authentication, authentication big, new authentication, authentication elixirvim, git, file, command, yak2
ksoeteman.nlKERI, an open protocol for identifiers Published in Dutch on Tweakers Authentication is the big problem on the Internet. There is no portable authentication layer in the Internet protocol, like…tweakers authentication, authentication big, portable authentication, authentication layerleave, mijn, header, opposite, bike2
enable-u.nlUse authentication services as a generic component in the ICT architecture? That’s possible!integration, enable, manage, innovative, architecture2
binsec.nlContext Beginning October 2022, Microsoft started disabling basic authentication protocols (EAS, POP, IMAP, RPS, EWS, OAB, Autodiscover and Outlook) in randomly choosen Microsoft 365 tenants. The ...attack authentication, authentication policy, basic authentication, authentication protocolctf, write, investigator, thought, society2
talkingsecurity.nlA new episode of Talking Security with Stefan van der Wiele (Senior Program Manager Azure AD @ Microsoft) about Azure Active Directory. We talked about Azure AD, going into a Passwordless world, MultiFactory Authentication, Fido Security…multifactory authentication, authentication fidoepisode, talk, min, azure, devsecops2
thomwiggers.nlRecently, I have computed the sizes and measured the performance of post-quantum TLS (both PQ key exchange and post-quantum authentication). In these experiments, I have examined combinations of Kyber, Dilithium, Falcon, SPHINCS+-(sf)…quantum authentication, authentication experimentquantum, cryptography, publication, thesis, phd2
apirapi.nl• Senior developer in a Scrum team responsible for development, infrastructure and releases of the gateway between end-users (web + apps) and the telecom provider BSS. Implemented custom authentication, authorization, caching, security…custom authentication, authentication authorization, factor authentication, authentication dataarchitecture, role, summary, domain, automation2
greengrape.nlWe’ll check your e-mail authentication setup and ensure all authentication protocols are properly configured. A proper setup is the foundation of companies that send e-mails in bulk.authentication audit, mail authentication, authentication setup, setup authentication, authentication protocolreputation, career, proper, engagement, subscriber2
tomwerf.nlapache authentication availability bestand cache cluster configuration database disk download fast-cgi file ftp html ip linux log logfile munin mysql netwerk network opcode password performance php plugin printer rdp remote reset security…apache authentication, authentication availabilitydisk, usage, uncategorized, vmware, file2
sharp-id.nl"Brought lots of knowledge about the Azure platform especially related to authorization and authentication"modern authentication, authentication authorizationidentity, azure, sharp, integration, port2
ajtech.nlUsually when running software workload (e.g. script or container-based applications) an identity is involved for authentication and access resources. Software workload running inside Microsoft Azure can use a Service Principal or…resource authentication, authentication authorization, identity authentication, authentication accessazure, devops, identity, git, api2
2azure.nlFrom within the Azure API Manament portal there is a default authentication option for your API consumers. The better option is to configure a connection with an Azure B2C tenant. This will enable you to enforce MFA and conditional access…id authentication, authentication manual, default authentication, authentication optionazure, manual, entra, gateway, file2
remonpel.nlThe first hurdle is getting the WordPress REST API to function. Oh, wait, you need a nonce ?! Well, thank you WordPress for this ‘security’-measure. For everything else in WordPress the authentication cookies you get when logging in to…api authentication, authentication problem, wordpress authentication, authentication cookieapi, handy, git, sense, author2
abcbusinesscoaches.nlImplement Security Protocols. Employ stringent security protocols like two-factor authentication, watermarking, and audit logs. Conducting frequent security assessments is vital for upholding the VDR security.factor authentication, authentication watermarkinginvestor, collaboration, secure, efficiency, perspective1
remcorakers.nlAuthentication in Tridion 2011 SP1 can be done several ways; you can use local Windows accounts, install Tridion with an Active Directory…automation, graphql, ldap, profile, powershell1
stefandejager.nl…insight in the steps which need to be taken (and by whom to complete) in order to start using our product. It works by communicating with the API of our CRM package and leveraging the same authentication method as our product does.package authentication, authentication methodinfrastructure, automation, stack, enthusiast, task1
knausclub.nlCredit card payment integration prioritizes security. Payment processors employ robust encryption and authentication measures to protect sensitive cardholder data. This safeguards both businesses and customers from potential security…encryption authentication, authentication measurepayment, benefit, vehicle, pre, sacrifice1
angulartraining.nlWe teach all things Angular. From the first component to full blown applications with dataservices, live API's, authentication and complex forms.api authentication, authentication complexangular, advanced, typescript, theory, exercise1
ilsantijhuis.nlAfter working about a year and half as Software Engineer I was given the opportunity to grow my career and become a Team Lead at Gamesys. My team was responsible for AAA (Authorization, Authentication and Access-Control), the login…authorization authentication, authentication accessresume, microservice, responsible, january, interest1
jeroenvanroon.nlEvent 1057 – RD Session Host Server has failed to create a new self signed certificate to be used for RD Session Host Server authentication on SSL connections. The relevant status code was Object already exists.server authentication, authentication sslnetscaler, january, powershell, azure, internal1
getfinom.nlOpening an account is easy. We stay constantly informed of account access and activity, with 2-factor authentication. I'm really satisfied with the service!factor authentication, authentication satisfypayment, fee, transaction, limit, invoice1
checkingall.nl…and social background information from dozens of sources, eg Cadastral Registers, Company House, directorships, authentication ID card, scores of three different credit agencies, watch and sanctions lists, bankruptcy, insolvency and…directorship authentication, authentication idreport, employment, pre, pricing, background1
rsmdashboard.nlwho have been granted access to the restricted pages of this dashboard wil be able to use the functionalities of this platform. Information and functionalities will only become visible after logging in using the ErAS authentication service.eras authentication, authentication servicersm, metric, report, restrict, convenience1
fastchip.nlTwo Factor Authentication has been added. Each user can decide to enable this on their profile.factor authentication, authentication usermanual, firmware, vehicle, calibration, browse1
dutchregistry.nlCertifications - Legalizations - Notarizations - Apostilles - Consular and Ministerial Authentication - Othersregistry, report, editor, certification, legalization1
avikopotato.nlThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.cookie authentication, authentication navigationpotato, variety, progress, harvest, figure1
bizgo.nlThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.cookie authentication, authentication navigationnotification, automatically, title, handy, enterprise1
stienos.nlThis code was part of a school assignment for the BACHELOR study System & Network Engineering at the University of Applied Sciences Amsterdam (HVA-SNE-Implementation). The assignment was to create a two-factor authentication system for a…factor authentication, authentication systemaws, elasticsearch, template, multiple, resource1
stlb.nlFor some time i have been searching for a good self-hosted password manager that saml authentication but also is not to expensive. […]manager authentication, authentication expensivehomelab, october, tuesday, couple, colocation1
passkeep.nlSecure your account with Multi-factor authentication, Multi-factor authentication is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an…factor authentication, authentication multi, authentication method, authentication mechanismpricing, secure, advanced, click, speed1
nickys-beauty-and-nails.nlBoosted Security: As technology progresses, so do the protection determines implemented by mobile online casinos. We can expect also more powerful encryption and authentication procedures to ensure the safety and security of gamers’…encryption authentication, authentication proceduregambling, enterprise, establishment, player, bride1
kilala.nl…the endpoints. All of the code needed for GraphQL and two different REST implementations. And even a bit of authentication and authorization! Heck, appendix C of the book turns out to have exactly what I was looking for when I wanted…bit authentication, authentication authorizationexam, api, oauth, certification, vendor1
merlijnvanveen.nlThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.cookie authentication, authentication navigationauthor, dual, analyzer, array, operation1
maartenbuma.nlPassword-based authentication Without any authentication parameters, password-based authentication is used with a random password created for you. Azure CLI: az ad sp create-for-rbac –name ServicePrincipalName… Lees verder » How to create…password authentication, authentication parameter, authentication randomazure, enthusiast, bicep, terraform, devops1
cadet.nlThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.cookie authentication, authentication navigationeaster, united, registration, calendar, youth1
limotaxiamsterdam.nlThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.cookie authentication, authentication navigationexecutive, transfer, hourly, comfortable, vehicle1
pay-and-play-casinos.nlThe main advantage is that iDeal does not charge a fee for transactions made. In Pay N Play casino iDeal, deposits are processed in minutes, and two-factor authentication provides excellent security for money transactions.factor authentication, authentication excellentpayment, player, gambling, registration, money1
gijs-de-jong.nlNote on security If you decide to enable SSH, remember to change the default password! Preferably you disable password-based authentication and instead setup key-based authentication. See the of...password authentication, authentication insteadraspberry, programming, interesting, cli, gui1
apexsecurity.nlWe are also in close contact with our technology partners, who are one by one market leaders in their field. Whether it concerns network security, awareness training, multi-factor authentication, pen testing, SIEM, networkperformance…factor authentication, authentication penresilience, assessment, calculation, hassle, slide1
bas-w.nlOpen Source backend in 1 file with realtime database, authentication, file storage and admin dashboard.database authentication, authentication fileframework, bunch, filesystem, flexible, file1
jurgenmols.nl…of 1.9% is charged, but this is lower than Neteller's. Personal data protection is provided by two-factor authentication. Deposits are made instantly, but withdrawals can take up to 2 days. Keep in mind that individual casinos do notfactor authentication, authentication depositpayment, player, wager, money, currency1
reac.nlProtect your casino and your customers with our highly secure system, featuring advanced encryption, authentication and fraud prevention measures to ensure safe and fair gaming for all.encryption authentication, authentication fraudhall, player, intelligence, ahead, innovative1
erikvangeer.nl…seattle to olympic national park ferry , ncaa division 3 women’s lacrosse statistics ,Related: two factor authentication fortnite , george hamilton today photos , nordic, alpine and mediterranean , scorpio health horoscope , coalingafactor authentication, authentication fortnitemodelling, ergonomic, swimsuit, shape, paper1
rickvanderzwet.nlEmailApplicationServerInJail Sendmail, MySQL,Cyrus SASL Authentication, Cyrus IMAP, Roundcube web-based email client.sasl authentication, authentication cyruspreference, timeline, overview, stuff, openstreetmap1
dezwart-ict.nlConfiguration Manager has limited support for Cryptography: Next Generation (CNG) certificates. Configuration Manager clients can use PKI client authentication certificate with private key in CNG Key Storage Provider (KSP). With KSP…client authentication, authentication certificatedevice, configuration, release, profile, guard1
icthouse.nl…18 Type II and PCI, adhering to the strictest industry regulations. We train our staff on HIPAA best practices on behalf of our healthcare clients. We incorporate and maintain advanced monitoring, anti-malware, and authentication tools.malware authentication, authentication tooldecade, healthcare, transformation, difference, networking1
vcdx.nl…domain was auto discovered during the installation of vCenter Single Sign On. To use other external domains for authentication you need to add your external domains as ‘Identity Source’ in the SSO Configuration, see KB2035510 . When using…domain authentication, authentication externalvsphere, host, vmware, esxi, vcenter1
flowio.nlTwo factor authentication with one-time-passwords, secured connections by SSL and in-reversible password managementfactor authentication, authentication timesidebar, fleet, icon, inventory, connection1
lazyadmin.nlConditional Access Policies allow you to fine-grain your access control in Microsoft 365. It allows you to control from which devices, or locations users can access your resources, and specify what methods of authentication are required…method authentication, authentication gettingpowershell, unifi, sysadmin, device, entra1
cpro.nlAPIs are at the heart of many applications and can potentially unlock hundreds of valuable endpoints, making them an attractive target for cybercriminals. API security assessments help ensure that API security requirements are met, such…access authentication, authentication encryptionwireless, assessment, vulnerability, penetration, comprehensive1
microcloud.nlWelcome to part 2 of the Azure VPN blog, here you can find part 1. This part of the blog explains how to configure Azure VPN with Always ON and Azure Active Directory authentication and MFA. This will allow Modern Managed Azure AD Joined…directory authentication, authentication mfaazure, powershell, progress, snapshot, exchange1
michaelwaterman.nlIn the intricate realm of modern digital communication, trust and security form the bedrock upon which data integrity, confidentiality, and authentication rest. Public Key Infrastructure, commonly referred to as PKI, stands as an elegant…confidentiality authentication, authentication restpki, directory, cryptographic, length, algorithm1
peopleflows.nlBiometric authentication gives the users full control to store and use data for all sorts of services! Your face is the key, use it.biometric authentication, authentication uservault, employee, visitor, pass, biometric1
tekmi.nl…The peculiarity of this project was that it looked like a typical CMS, yet it didn't use any database. It didn't store any data either, since everything, including authentication and forms content was coming from an external REST API.data authentication, authentication formsymfony, api, stack, objective, situation1
geselecteerde-winnaar.nl…software), access controls (individual employee access authorisation via personal accounts, identification and authentication requirements), disclosure controls (constant supervision and guidance to authorised personnel, no local storage…identification authentication, authentication requirementsprotection, processing, declaration, purpose, provision1
redstorm.nl…with advanced GWT sites. Requests to destination, "deep-web" websites, pass their intermediate servers and authentication layers so access to destination sources is performed "under the hood" in a unified manner. No need for any otherserver authentication, authentication layerfederated, advanced, ability, external, engine1
jarnovdbrink.nlVulnlab Chain - Intercept Intercept is a hard rated chain which contains two machines WS01 and DC01. The chain starts with forced authentication using a file upload to grab a users hash. Using this...chain authentication, authentication filechain, azure, rich, write, minimal1
audio4forensics.nlWe offer tailor made solutions for Audio Enhancement, Speech Intelligibility improvement, Audio Authentication to name a few. We don't stop at just improving your audio data, we deliver a suitable solution.audio authentication, authentication audioforensic, enhancement, qualify, authenticity, analysis1
miraclecash.nlWe employ multi-factor authentication, encryption, and regular security audits to safeguard your account.factor authentication, authentication encryptionmiracle, rate, commission, uk, germany1
betaalvereniging.nlForeign web shop not always ready for mandatory double authentication of payments with Dutch credit cards.double authentication, authentication paymentpayment, association, task, report, annual1
nn8.nlNew publication: UbiKiMa: Ubiquitous Authentication Using a Smartphone, Migrating from Passwords to Strong Cryptography [ 2013-11-08 ]ubiquitous authentication, authentication smartphonepublication, channel, mqtt, covert, implementation1
broweb.nlCustom week project planning. Direct edit, Direct calculation, Full mobile version! Up until 6 deadlines for each member of a project. Register leave, sickness, study or other non work hours. Authentication by Cloud providers. Created…hour authentication, authentication cloudwebapplication, jquery, improvement, study, sickness1
kapytein.nl…Customer Data Cloud (or Gigya) is an identity and access management platform, which allows customers to have authentication and authorization features implemented across their application. This is not vulnerability in SAP's Gigya…customer authentication, authentication authorizationtakeover, capture, flag, path, domain1
site-helper.nlCreating e-mail accounts , setting a catch-all address , forwarding , autoresponders , vacation messages , mailing lists , filters , MX records , webmail , SMTP authentication.domain, file, subdomain, frontpage, statistics1
peterstreef.nl…of the different roles and their corresponding access levels, organizations can implement robust security mechanisms and authentication protocols to safeguard sensitive data and maintain data integrity throughout the API ecosystem.mechanism authentication, authentication protocolapi, integration, coordination, collaboration, consideration1
freddejonge.nlRecently I’ve tested the FortiOS 7.0 and I was wondering about the SAML connection towards Azure for login via Microsoft and the use of Multifactor Authentication. I have noticed there are some improvements. How ever, some features or…multifactor authentication, authentication improvementfortigate, azure, vmware, leave, exchange1
matthijslangenberg.nlBecause I had taken a layered approach in writing the JavaScript library, developers could also choose to customize the user experience. The React front-end code was separated from a small core library which handled authentication…library authentication, authentication websocketemployee, electronic, healthcare, medication, nurse1
3ldn.nlIt is not allowed to send plaintext passwords ‘over the line’. This is a security requirement, even when using HTTPS connections with mutual authentication and a cipher.mutual authentication, authentication cipherconfiguration, dependency, february, default, note1
bitpatroon.nlSjoerd is a good all-round developer who has the ability to quickly track down bugs in PHP code and fix them. He can quickly take in and apply newly gained knowledge about testing and programming best practices. He can integrate systems…system authentication, authentication systemlandscape, api, realm, cohesive, integration1
wfhessentials.nl…software installed and access to systems you'll need. Set up any new apps, accounts, passwords, and multifactor authentication required by your company. Make sure your internet connection is strong. Have chargers and accessories ready to…multifactor authentication, authentication companyremote, productivity, lighting, break, payment1
wouterj.nlAt SymfonyWorld Winter 2021, I talked about using the new Symfony authentication system in your applications in Symfony 6. We discussed the important changes to the Security component, what we tried to improve with each change, and how…symfony authentication, authentication systemsymfony, csrf, css, vulnerability, native1
doc-access.nlDoc-access is an online authentication system for websites that are only accessible to medical professionals.online authentication, authentication systempassport, charge, accessible, completely, transparent1
eurdashboard.nlwho have been granted access to the restricted pages of this dashboard wil be able to use the functionalities of this platform. Information and functionalities will only become visible after logging in using the ErAS authentication service.eras authentication, authentication servicemetric, report, currently, statistics, intelligence1
vander-vegt.nlCreate a full blow webserver with real or simulated content and support for binary files and authenticationwindow, file, bit, archive, dll1
pabstit.nl– bugfix when authentication fails: proper notification and user is redirected to Account screenbugfix authentication, authentication properjuly, august, release, notification, roster1
appartement-amsterdam-beach.nlPico is not blogging software - but makes it very easy for you to use it as a blog. You can find many plugins out there implementing typical blogging features like authentication, tagging, pagination and social plugins. See the below…like authentication, authentication taggingfile, directory, header, config, plugin1
unixinfo.nlDefault Ports: Server: Authentication: Port: SMTP Server (Outgoing Messages) Non-Encrypted AUTH 25 (or 587) Secure (TLS) StartTLS 587 Secure (SSL) SSL 465 IMAP Server [...]server authentication, authentication portjanuary, august, july, file, february1
devoorkant.nlWe know how to apply modern standards like oAuth 2.0, SSL, (Client Side) Certificates and PKI Encryption. From experience, we can choose from a number of solutions and concepts to provide you with the best (federated) authentication and…federated authentication, authentication authorizationintegration, solid, mid, banking, enterprise1
peterbeverloo.nlWork on the Chrome-based Android WebView continues and support for displaying fullscreen video has been implemented , with in-page video support pending. The Remoting application for Android now supports paired authentication and had some…android authentication, authentication uichromium, api, css, animation, author1
novaris.nlWe offer a complete range of reliable and affordable solutions for software security (ROCKEY Software Protection) and advanced internet security and authentication (ePass).security authentication, authentication epassinnovative, positioning, wireless, analysis, growth1
pay2wash.nlComplies with AVG legislation. Additional security, such as 2-factor authentication, is optional and even mandatory for administrators.factor authentication, authentication optionallaundry, automation, innovative, secure, technician1
whatsecurity.nlRFC 7672 : SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) ↩dns authentication, authentication entitybend, adjustable, oct, internal, connection1
midnightblue.nlWouter is known for breaking several proprietary in-vehicle immobilizer authentication ciphers used by major automotive manufacturers as well as co-developing the world's fastest public attack against the Hitag2 cipher.immobilizer authentication, authentication ciphermidnight, firm, domain, vulnerability, physical1
svenordelman.nlFor my study I needed to do an internship which I was planning to do it abroad. I found a company specialized in SMS and two factor authentication, which had their main office in Malaysia. I spend there 6 months working on software that…factor authentication, authentication mainstudy, nodejs, programming, rule, malaysia1
stollielab.nlFor some time i have been searching for a good self-hosted password manager that saml authentication but also is not to expensive. […]manager authentication, authentication expensivehomelab, october, deployment, networking, docker1
mijnslachtofferzaak.nlLogging in is currently only possible via DigiD; foreign authentication (eIDAS) is not accepted. There are two ways to log in using your DigiD.foreign authentication, authentication eidasvictim, overview, crime, prosecution, violent1
hawa.nlRecently a program developed in cooperation with SMELT and AstraZeneca is live. The online module uses SSL and SMS authentication for extra security and can be used by pharmacist allong side their own systems. There are different projects…sms authentication, authentication extrasql, reference, patient, pharmaceutical, enterprise1
renevanbalen.nlI recently received a couple of questions on how to make a self-signed certificate for server authentication. I have been using self-signed certificates for some time now, mainly in test environments. You can use self-signed certificates…server authentication, authentication selfcertificate, vmware, february, reference, root1
oksolution.nl…out, and upon this user sheet being finalized an user is created in our Active Directory. Their privileges and authentication are set, as is their group membership, and other user properties. With this tool you can also control the…privilege authentication, authentication groupinternship, react, create, semester, powershell1
remcovandiermen.nlCurrently there are companies that are investigating the way of passwordless authentication . But the moment you go completely passwordless, you run into the same obstacles....passwordless authentication, authentication momentlicense, availability, workstation, device, directory1
ltgi.nlYou are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in.currently authentication, authentication credentialswidth, visit, revision, permission, credentials1
innato.nlThis website uses cookies to manage authentication, navigation, and other functions. Please click the 'I agree' button if you agree that we can place these types of cookies on your device. You can reverse your decision at any time.cookie authentication, authentication navigationmanufacture, chemistry, joomla, nav, notice1
wcds.nlWhat are the benefits of using Laravel? Well, for starters, it makes Web application development faster and more efficient. With useful features such as routing, authentication and database management, Laravel can help you build a…routing authentication, authentication databaseoptimization, domain, registration, reliable, css1
lijstvlam.nl…the Strategic Housing Pan), or about issues that we as employees encounter in our daily work (2FA / Two-factor authentication); we always try to think critically and constructively, based on the conviction that university management and…factor authentication, authentication criticallycouncil, employee, candidate, election, participation1
plasticsurgeryresearch.nlYou are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in.currently authentication, authentication credentialssurgery, lab, width, revision, permission1
jointak.nlCertiEye® is a company-owned proprietary anti-counterfeit solution that is impossible to copy. It allows for instant end-user authentication via a smartphone making it the perfect anti-counterfeit and brand protection solution.user authentication, authentication smartphonegarment, sustainability, certification, career, weave1
woutergrutter.nlAt Learning Valley, I have learned new technologies such as React, 3D rendering in the browser, integrated tools and authentication.engine, unreal, resume, currently, player1
cloudsecurityblog.nlOf course Multi Factor Authentication would have solved the problem, but is not always easy to implement through the whole organisation in a short time.factor authentication, authentication problemlab, session, july, command, exploit1
wardvissers.nl22, 2024, to addresses this issue related to a memory leak in the Local Security Authority Subsystem Service (LSASS). This occurs when on-premises and cloud-based Active Directory domain controllers service Kerberos authentication requests.kerberos authentication, authentication requestvmware, vsphere, esxi, host, exchange1
martijnfoto.nl- IP IP Authentication Authentication or or Password Password Authentication Authentication available.ip authentication, authentication password, password authentication, authentication availablemovie, cheap, ugg, buy, prescription1
patrickzegels.nlDeploying Microsoft Enterprise Mobility Suite Identity and Access Management Maximize Engagement with Dynamics 365 Portals Microsoft Intune Core Skills Managing Authentication Using Microsoft Passport SharePoint for Your Classroom…manage authentication, authentication microsoftazure, dynamic, identity, legacy, nav1
kaperschip.nlI simply copied the .BIN file into the utility folder and ran the executable with the right parameters (in an elevated command prompt, just to be sure). Since it's a local KCS connection, there are no authentication or network transfer…connection authentication, authentication networkhomelab, esxi, powershell, clone, file1
vecore.nlAll data is securely stored in the cloud, using advanced encrypted connections, two-factor authentication and data encryption.factor authentication, authentication dataconfiguration, progressive, far, wish, vehicle1
yrams.nl…How to prevent fraud? How to detect fraud? Phishing-Attack-detection Malware-Attack-detection Strong user authentication with digital fingerprint device Domain-Attack-detection CyberCrime-Compliance Brand-Compliance…user authentication, authentication digital, customer authenticationfinally, employee, consumer, difference, contribution1
adamssystems.nlSFTP is a functional part of SSH which replaces the behavior of FTP in a secure fashion. This is great on AIX for transferring files, batch job uploads and downloads, and much more secure using SSL on the wire and with a variety of…variety authentication, authentication optionssh, secure, adventure, default, hash1
lansolutionsbv.nl…VoIP cloud… VoIP centrales… VoIP Support… Touchscreens… Narrowcasting…enterprise, exchange, host, remote, op0
knowledgeandtechnologyjoyfullyengaged.nlPrivacy…license0
loonadministratievoormkb.nlPrivacy…license0
ru.nlCurrent students and staff members can find information about services and facilities they may need while studying or working at Radboud University in the sections for students and employees.factor authentication, authentication mfaprogramme, assessment, facility, study, grant0
bartvanegmondhovenier.nlHome… Test 2… instagram…bad authentication, authentication data0
kipusoep.nlUsing Umbraco with VS2010 … and masterpages, jQuery vsdoc, dotless, SquishIt Welcome all to this magnificent blogpost about using Umbraco 4.5 with Visual Studio 2010 and everything you’ll need to know about some other tools! 😉 First…reply, january, july, iis, jquery0
watb.nlPrivacy…license0
teamkatje.nlPrivacy…license0
johnbraun.nlMutation testing is a great tool to analyze and increase the reliability of your test suite. This post highlights the concepts of Mutation Testing, how to get started using Infection PHP, and how to use mutation tests in your CI workflow.mutation, package, cypress, fake, progress0
bloter.nlPrivacy…license0
continyou.nlYour local ICT service provider. System and network management for SMEs in the Nijmegen region. ContinYou would like to help you.step authenticationregion, manage, sme, endpoint, connection0
copac.nlWe develop and implement information security policies & procedures based on commonly used standards like NIST or ISO 27001 & 27002. These policies and procedures are aimed to provide in a higher security level are derived from the…identification authenticationrisk, assessment, customizable, affordable, centrally0
seksmisbruik.nlPrivacy…license0
korsultancy.nl…of security projects for many clients in both the public and the private sector. Most projects focused on development and implementation of security solutions or services involving digital signatures or identity and access management.identity, infrastructure, broad, signature, certificate0
sshn.nlWe are there for students who would like to live on their own. Students that are looking for a private place, a home during college years. And who would like to experience a pleasant long or short stay in Nijmegen & Arnhem. Of course, we…factor authenticationssh, rent, stay, pleasant, rental0
sevenp.nlWe allow you to focus on what you do best. We are passionate about improving your efficiency. You design your own workspace, we make life easy.identification authenticationworkspace, azure, infrastructure, productivity, manage0
switchmail.nl© 2022 Switchmail - By ID Control Solutions. All Rights Reserved.strong authenticationsecure, archive, encryption, request, easily0
worldofmk.nlhome 1… home 2… home 3… home 4… home 5… home 6… home 7… home 8… home 9…clothes, woman, notice, hummingbird, secure0
ems-soft.nlSign up… Get authentication…authentication code0
nuttelozeinvestering.nlPrivacy…license0
4gproxy.nl4G Proxy is the leading provider of proxies to access websites and content that are blocked in your area. Our proxies let you unlock the internet with ease.proxy, ip, speed, pricing, automatic0
aprilmayjune.nlPrivacy…license0
roadcaptain.nlBored with the standard Zwift routes or fed up with having to navigate using Zwift Companion? RoadCaptain let's you design the route you want and will act as your personal road captain in Zwift and handles navigation for you!secure authenticationbuilder, elevation, ascent, highlight, profile0
champignonsleague.nlPrivacy…license0
516noord.nl51.6 Noord B.V. supports organizations in the assessment, recommendations, design, implementation and management of security aspects within their local or cloud-based IT environment.factor authentication, authentication lastpassprogress, cisco, leak, plain, billion0
iamsecurity.nlAuthentication… Authorisation… Auditing… Identification…identity, authorisation, auditing, identification, secret0
blimped.nlWelcome to this crossover between blog and braindump. Blogs of others have been super important during my work. This site is me returning the favor. The blogs will be about Microsoft 365, Azure, SharePoint, SharePoint Framework (SPFx)…azure, retention, powershell, function, cli0
kbhost.nlKBHost Proudly powered by WordPressid authentication, authentication navisionenable, disable, file, add, shortcut0
orhun.nl…developer who is interested in software and hardware. My interests are creating applications and setting deployment environments to facilitate full-stack development. In addition I have a strong interest in new available techniques.docker, interest, pipeline, endpoint, actuator0
rapidlogistics.nlMake running your webshop smooth and easy. We integrate your Shopify or e-commerce platform with our warehousing system so you can keep track of inventory, orders, and fulfilment. We offer a tailored service for every business. Eliminate…director authentication, authentication ebaylogistics, rapid, fulfil, sustainability, motion0
universalgradingservices.nlHoe werkt het?… Over UGS… Contact… Grade mijn kaarten… Services… Standard…grading, universal, ug, het, hoe0
tekkopstraat.nlPrivacy…license0
opzoutenmetjeonzin.nlPrivacy…license0
ediport.nlPrivacy…license0
wordpress-en-plugin-onderhoud.nlWordPress and Plugin maintenance - JVH hosting - We maintain WordPress websites and WordPress plugins with our SLA: backups, uptime monitoring, Security, performance checks, 404 link monitoring, vulnerability checking and more ..factor authenticationplugin, report, vulnerability, file, force0
scanid.nlScanID is your Total Solution Provider for all applications and solutions in the field of Product and Personal Identification, Identity Documents, Barcoding and 2D Imaging systems.verification authenticationverification, reader, identification, identity, swiss0
friendsoflittleyus.nlFriends of Little Yus operates forging nodes for Ark, Solar, Qredit and Compendia blockchains.identification authentication, authentication blockchainstat, mqtt, delegate, validator, proposal0
wonnacareforkids.nlLorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore.bad authentication, authentication datasit, amet, adipisicing, dolor, tempor0
bloots.nlPrivacy…license0
melp.nlHow to get a FreeBSD web development box running as a Virtual Machine in Windowspassword authentication, authentication sshpackage, bash, python, composer, wrong0
link-to-art.nlAs a passionate art collector for decades, I have built up extensive experience and an international network in the art world. I founded Link to Art in 2012.artwork, jesus, collector, jenkins, extensive0
zinias.nl© Zinias 2001 - 2022innovative authentication, authentication solutioninnovative, secure, emulator, kernel, report0
explicitselection.nl…B2B relationships. Due to regulatory and standardization requirements, it can be complex to introduce new digital financial products and integrate them within the existing ecosystem. We can help you present your product and your unique…selection, explicit, regulatory, implementation, collateral0
ramonddevrede.nl…be supported. Especially the compatibility was a concern. At my father’s office they went to Unix mini computers and data center towards the PC with a local network. Back then, this was the future. Dumb terminals with a connection to a…unifi, ubiquiti, device, connection, commodore0
trans-ix.nlTrans-iX is an ICT service provider for Managed Services, Cloud Services, Infrastructure Projects, Support & Helpdesk Services, consulting and advisory.infrastructure, manage, advisory, consulting, productivity0
timgoes.nl…my internship and summerjob at Enversed, I learned quite alot about designing a VR-game for a large usergroup. The skills I developed during developing the VR-games mentioned in my portfolio above, gave me quite a good perspective on how…player, automatically, reference, unity, fellow0
ikbengraagmijngeldkwijt.nlPrivacy…license0
optisec.nl…for both experienced and inexperienced people and opens the door to any specialization. Both penetration testers and security managers benefit greatly from CISSP, as it provides insights into the entire field of information security.identy authenticationcertified, cissp, official, domain, topic0
virtualnomad.nlStreamline your IT application deployment game with the latest buzz: deploying Win32 apps using the new Microsoft Store app. This marks a key shift as Win32…authentication requestadd, azure, guest, deployment, january0
sudosandwich.nl…the newest technologies such as containers and cloud whilst retaining total understanding the fundamentals. He provides great leadership to his team and is the go to person for many things. Great leader, great engineer and great colleague.openldap authentication, authentication accessadministration, configuration, byte, architecture, devops0
vtam.nl…as much as possible with the tool of my choice Powershell. One of the first things you want to configure after you have deployed Aria Automation is a Cloud Account and a Cloud Zone; in my case a vSphere Cloud Account. From the API...automation, powershell, vsphere, operation, esxi0
cloudguide.nlEntitlement Management is the platform to discover, manage, and govern fine-grained entitlements to your SaaS & on-premise applications. It’s now available within Okta’s Identity Governance product (OIG).mfa authentication, authentication authorizationaccelerate, identity, workplace, collaboration, compliance0
yice.nl…provider and the data centers, but also for ourselves. The ISO 27001 certification makes a significant contribution to the professionalism of our services and to customer confidence in the information security of the GRC platform YICE.factor authentication, authentication appcompliance, gdpr, framework, license, storage0
mcpr.nlPR is in our DNA. Getting you visibility in the media is what we do best. But – being a full-service agency – you can also rely on us for an accurate positioning, marketing campaigns, websites, social media, copywriting, and design. We…leader authentication, authentication solutionround, campaign, audience, target, identity0
locktar.nlan extension to the Azure AD. Just as you would do with the regular Azure AD. You can imagine that if there is a big Azure AD and there are many applications connected to it. So Microsoft decided that an extension belongs to an application.azure, graph, validator, attribute, debug0
sandermaijers.nlI’m happy to speak with you online. Do note, however, that I prefer to not use Facebook and Google-controlled media for personal communication, and I don’t check them out very regularly. I don’t like some of LinkedIn’s practices either.appointment, presentation, academic, handle, official0
yicapital.nlGet on board and check our new Subway theme! It brings you a modern boxed layout with a broad range of options for customization .bad authentication, authentication dataicon, gradient, ambient, animate, typography0
besje.nlPrivacy…license0
rohill.nl…secure and cyber-safe networks, Rohill offers a unique proposition that allows for full control for MVNOs, while governments maintain national control and cyber-security is ensured. Discover Our Solutions Over 450 networks delivered…acceptance, vertical, infrastructure, critical, rapidly0
codeasaservice.nlOur software engineering consultants are experts in different areas of work. They are here for software advice, strategy, specifications and design, enabling you to build better & secure (online) products.secure, accessibility, requirements, lifecycle, suitable0
kornblum.nlWe are learning to setup our website in WordPress by having a 31 hour course. So expect new test content on a regular base. I am so excited.uncategorized, docker, raspberry, setup, excited0
wimtenbrink.nlPrivacy…license0
fluxxus.nlAs I explain in my book with test example 8 in chapter 8, the testability framework – or actually the test toolkit – does not provide for layout testing, only dataset testing. Those who bought both the 1st and 2nd edition of my book might…automation, central, report, refactoring, july0
winfred.nlIn some cases, the requirement is to bring up a FortiSwitch in FortiLink mode, but the FortiSwitch is not directly connected to the FortiGate.aaa authentication, authentication login, login authentication, authentication local, authentication tacacsfortigate, ip, uncategorized, authorization, default0
sionkerk.nlPrivacy…license0
chanelexpert.nlexperience with collecting, buying, selling and studying vintage Chanel items. We combine this experience with a keen eye for detail, extensive knowledge of materials, a large interest in the history of the brand Chanel and countless hourssummary, bag, authenticity, accessorie, jewellery0
svdgraaf.nlYou can find more information on LinkedIn and reach me on Github , Twitter or email , or come say hi at a meetup.basic authentication, authentication customserverless, talk, github, resource, cloudformation0
realtime-dashboard.nl…Tiles… Profile… Feed… Forum… Forum - Post… Meetups… Meetups - Post… Finance…invoice, profile, transaction, notification, conversation0
dirxml.nlWe hope this information provides you a helping hand when you are involved in any project.identity, oauth, saml, ltd, documentation0
qnetwork.nlBack-up… Managed Services… Two factor authentication… Hosting… High…factor authenticationmodular, manage, availability, compliance, workplace0
spryng.nlSMS Gateway Service. ✔ SMS Gateway ✔ SMS API ✔ Bulk SMS ✔ SMS Service ✔ 24/7 Support ✔ 100% Delivery Guarantee ✔ 100% Reliable & Safe!sms authenticationgateway, api, healthcare, logistics, reliable0
oi-services.nlweb design PHP framework content application builder cck themes icons joomla design icon illustrations wordpress cms CSS JS themebad authentication, authentication datasit, amet, adipisicing, dolor, tempor0
gazoraad.nlPrivacy…license0
gridshore.nlA weblog about software engineering, Architecture, Technology an other things we like.elasticsearch, architecture, journal, august, frontend0
hart4technology.nlOur data security solutions are available for every operating system and with varying degrees of security - even for the secure retention of confidential data at government level. We provide high-quality protection for e-mails , laptops…fido authentication, factor authentication, authentication mfa, passwordless authenticationsecure, port, storage, physical, kingston0
visumpro.nlVisumPro offers additional services like photo service and filling out application forms.legalization, trajectory, selection, russian, federation0
dewitweb.nlAzure DevOps gives you the option to use ‘Git‘, this the same version control system I used in my previous post about adding version control… Read More » Database Version Control in Azure DevOpsfactor authentication, authentication resetazure, enthusiast, sql, visual, devops0
visahq.nlVisa services in Netherlands: view travel visa requirements for citizens of Netherlands to any country in the world and apply for visas online.requirements, citizen, applicant, russia, arabia0
nerdieworks.nlIt’s no secret that companies are collecting vast amounts of user data. They say data has become more valuable than gold. My problem with the current business model of many great “free” services, is that you can’t opt out by paying a…certificate authentication, authentication traefiktraefik, devops, redirect, certificate, slash0
sjorsvanheuveln.nlAdd the OpenLiteSpeed logo to your web site if you'd like to help us promote the server.click, resource, file, documentation, installation0
smeenkzorginnovatie.nlLorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore.bad authentication, authentication datasit, amet, adipisicing, dolor, tempor0
freekpaans.nlLast week I blogged about my experiences doing a geth fast sync. The last thing I did back then was start a full sync on the same hardware. Things took a bit longer: whereas the fast sync completed in about 8 hours, the full sync took a…apache authentication, authentication openidsync, uncategorized, opinion, block, anatomy0
dejagermc.nlThe Home Feeder app for Google Assistant. Allows for voice control of Home Feeder.user authenticationfeeder, gitlab, grafana, advanced, household0
idealis.nlPleasant and affordable living in rooms at Idealis, the largest housing organisation for students in Wageningen and Ede.factor authenticationidealis, rent, housing, affordable, pleasant0
allsync.nlProtect your personal and work files with end-to-end encryption & Dutch privacy.unlimited, file, device, encryption, storage0
clemensmol.nlCode snippets, opinions and bookmarks mostly about Frontend Development and User Experience. JavaScript, CSS3, PHP, CentOS, Plesk.sasl authentication, authentication failureinteresting, dig, failure, ssh, selector0
marinusit.nl…the task of coming up with suitable solutions and realizing them in the customer’s landscape. He started at the same moment that the development team was formed. One of his tasks was to help set up a smoothly running development process.factor authentication, authentication solutionidentity, azure, task, smoothly, architecture0
openonderwijsapi.nlOf course each school, college, or university can develop their own APIs, but this is a time-consuming and costly process. That is why the Open Education API, known in Dutch as the ‘Open Onderwijs API’ (OOAPI), was created. The OOAPI…identification authentication, authentication authorizationapi, institute, educational, response, description0
conplacer.nlPrivacy…license0
foxboom.nlPrivacy…license0