Casdoor · An Open Source UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform supportingOv Over erview view Casdoor is a UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform based on OAuth 2.0, OIDC, SAML, and CAS. Casdoor serves both the web UI and the login requests Casdoor. By entering the correct username and credentials into the login page, Casdoor now knows the identity of the user and is about to send two pieces of information back to the callback URL set in Step casdoor-go-sdk Pr Proovider vider Casdoor is a federated single sign-on system that supports multiple identity providers via OIDC, OAuth, and SAML. Casdoor can also send verification codes or other notifications0 码力 | 825 页 | 58.31 MB | 1 年前3
Hyperledger Fabric 1.1 Documentationthat you may choose to use to generate the certificates and key material to configure and manage identity in your blockchain network. However, any CA that can generate ECDSA certificates may be used. Prerequisites additional help. Key Concepts Introduction Hyperledger Fabric Functionalities Hyperledger Fabric Model Identity Membership Peers Ledger Use Cases Introduction Hyperledger Fabric is a platform for distributed and cloud platforms, but the underlying structure is the same. Unified systems for managing the identity of network participants do not exist, establishing provenance is so laborious it takes days to clear0 码力 | 422 页 | 4.84 MB | 1 年前3
Hyperledger Fabric 1.2 Documentationpermissionless blockchain technologies are unable (presently) to deliver. In addition, in many use cases, the identity of the participants is a hard requirement, such as in the case of financial transactions where Know-Your-Customer specifically architected to have a modular architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries that you may choose to use to generate the certificates and key material to configure and manage identity in your blockchain network. However, any CA that can generate ECDSA certificates may be used. Prerequisites0 码力 | 497 页 | 6.59 MB | 1 年前3
Hyperledger Fabric 1.3 Documentationpermissionless blockchain technologies are unable (presently) to deliver. In addition, in many use cases, the identity of the participants is a hard requirement, such as in the case of financial transactions where Know-Your-Customer specifically architected to have a modular architecture. Whether it is pluggable con- sensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries MSP Implementation with Identity Mixer: A way to keep identities anonymous and unlinkable through the use of zero-knowledge proofs. There is a tool that can generate Identity Mixer credentials in test environments0 码力 | 367 页 | 4.95 MB | 1 年前3
Hyperledger Fabric 1.3 Documentationpermissionless blockchain technologies are unable (presently) to deliver. In addition, in many use cases, the identity of the participants is a hard requirement, such as in the case of financial transactions where Know-Your-Customer specifically architected to have a modular architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries MSP Implementation with Identity Mixer: A way to keep identities anonymous and unlinkable through the use of zero-knowledge proofs. There is a tool that can generate Identity Mixer credentials in test environments0 码力 | 528 页 | 6.85 MB | 1 年前3
Hyperledger Fabric 1.4.9 Documentationpermissionless blockchain technologies are unable (presently) to deliver. In addition, in many use cases, the identity of the participants is a hard requirement, such as in the case of financial transactions where Know-Your-Customer specifically architected to have a modular architecture. Whether it is pluggable con- sensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries Service Providers (MSP): Starting with v1.4.3, node OUs are now supported for admin and orderer identity classifications (extending the existing Node OU support for clients and peers). These “organizational0 码力 | 483 页 | 7.48 MB | 1 年前3
Hyperledger Fabric 1.4.8 Documentationpermissionless blockchain technologies are unable (presently) to deliver. In addition, in many use cases, the identity of the participants is a hard requirement, such as in the case of financial transactions where Know-Your-Customer specifically architected to have a modular architecture. Whether it is pluggable con- sensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries Service Providers (MSP): Starting with v1.4.3, node OUs are now supported for admin and orderer identity classifications (extending the existing Node OU support for clients and peers). These “organizational0 码力 | 483 页 | 7.48 MB | 1 年前3
Hyperledger Fabric 1.4 Documentationpermissionless blockchain technologies are unable (presently) to deliver. In addition, in many use cases, the identity of the participants is a hard requirement, such as in the case of financial transactions where Know-Your-Customer specifically architected to have a modular architecture. Whether it is pluggable con- sensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries Service Providers (MSP): Starting with v1.4.3, node OUs are now supported for admin and orderer identity classifications (extending the existing Node OU support for clients and peers). These “organizational0 码力 | 483 页 | 7.48 MB | 1 年前3
Hyperledger Fabric 1.4 Documentation
permissionless blockchain technologies are unable (presently) to deliver. In addition, in many use cases, the identity of the participants is a hard requirement, such as in the case of financial transactions where Know-Your-Customer specifically architected to have a modular architecture. Whether it is pluggable con- sensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries and cloud platforms, but the underlying structure is the same. Unified systems for managing the identity of network participants do not exist, establishing provenance is so laborious it takes days to clear0 码力 | 461 页 | 7.37 MB | 1 年前3
Hyperledger Fabric 2.0.1 Documentationpermissionless blockchain technologies are unable (presently) to deliver. In addition, in many use cases, the identity of the participants is a hard requirement, such as in the case of financial transactions where Know-Your-Customer specifically architected to have a modular architecture. Whether it is pluggable con- sensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries and cloud platforms, but the underlying structure is the same. Unified systems for managing the identity of network participants do not exist, establishing provenance is so laborious it takes days to clear0 码力 | 533 页 | 8.37 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100













