IDPros / bok-tocLinks
Collaboration on the table of contents for IDPro Body of Knowledge
☆20Updated 2 years ago
Alternatives and similar repositories for bok-toc
Users that are interested in bok-toc are comparing it to the libraries listed below
Sorting:
- This is a public comment environment for the IDPro body of knowledge.☆73Updated 4 months ago
- COmanage Registry☆17Updated this week
- Example demonstrating how to customize PingDirectory, PingFederate and PingAccess Docker containers by applying configuration files☆62Updated last month
- ☆151Updated last year
- ☆44Updated last week
- Proposed standard for an Authorization API☆85Updated last week
- OpenID IPSIE Working Group Repository☆35Updated this week
- ☆14Updated 4 years ago
- Open Policy Agent extension for Authzed SpiceDB☆21Updated 10 months ago
- Containerized version of the Shibboleth IdP running on AWS with AWS Secrets Manager and AWS CodePipeline integrations. You can submit fe…☆29Updated 4 months ago
- Death & The Digital Estate Community Group☆27Updated 3 weeks ago
- Ping Identity Devops Program☆101Updated 3 weeks ago
- Work space for data standards development in Australia under the Consumer Data Right regime☆334Updated 2 weeks ago
- OpenID Shared Signals Working Group Repository☆65Updated last month
- Yubico WebAuthn Starter Kit Project Code☆48Updated 11 months ago
- Official repository of the AWS CloudHSM User Guide (https://docs.aws.amazon.com/cloudhsm/latest/userguide/)☆18Updated 2 years ago
- This is the old location for the FICAM Architecture. New location below.☆25Updated 4 years ago
- The Elevation of Privilege Threat Modeling Game☆336Updated last year
- ☆61Updated last week
- Some examples of using the Cedar language to specify authorization☆95Updated last month
- Sample applications demonstrating how to use the CloudHSM JCE☆46Updated this week
- A code sample demonstrating how to use Azure Active Directory's preview functionality to issue and consume verifiable credentials.☆113Updated 11 months ago
- AWS Encryption SDK Specification☆33Updated last week
- Shostack's 4 Question Frame for Threat Modeling☆129Updated last month
- AWS KMS External Keystore (XKS) Proxy reference implementation☆37Updated 10 months ago
- ☆11Updated 3 years ago
- A Terraform provider to manage Okta resources, enabling infrastructure-as-code provisioning and management of users, groups, applications…☆299Updated this week
- A profile designed for ID Tokens so that they can be issued through OIDC Authorization Servers and having support for cryptographic bindi…☆13Updated 6 months ago
- ☆24Updated last year
- Digital Credentials API☆133Updated this week