暴雪vp破解版

暴雪vp破解版

Check user credentials against plenty of backends (LDAP, Active Directory, Kerberos, Database, PAM, CAS, SAML, OpenID Connect, Facebook, Twitter, LinkedIn, Radius, WebID, x509, REST, ...).
Second Factor Authentication (2FA) with U2F, TOTP, Yubikey and more.

暴雪vp破解版

Manage access rules per virtual hosts, CAS applications, SAML Service Providers and OpenID Connect Relying Parties.
Use any of user attributes, groups, authentication context to evaluate rules.
Catch logout requests, unprotect public areas, apply rules to URL patterns.

暴雪vp破解版

Push user identity in access logs.
Browse opened sessions live.
Display login history (success and failures).




暴雪vp破解版

Portal, Manager and Handler

安卓手机改ip地址软件

暴雪vp破解版

Usage of Handler Service Token

安卓手机改ip地址软件

暴雪vp破解版

Standard protocols and identity gateway

暴雪vp破解版

CAS v1, v2 and v3
Attributes sharing
Access rules

暴雪vp破解版

SSO, SLO and AA
Metadata import and export
Discovery Protocol (WAYF)

暴雪vp破解版

Authorization Code, Implicit and Hybrid flows
ID Token HS and RS signatures
Extra claims definition