Skip to content

XAware Community

Get the Flash Player to see this player.
Flash Image Rotator Module by Joomlashack.
XAware 5.6
Need Help
Webinars and Events
Advanced Tutorials
Webinars and Events

You are here: Home arrow Blogs

Category >> security

trusted computingTCGsecuritynew projectsIF-MAP 25 Jun 2008 7:11 AM
avatar
XAware IF-MAP Project by frankh Comment (0)

On April 28, after two years of development, the Trusted Computing Group (TCG) released IF-MAP with the intention of garnering industry adoption and utliization.

"IF-MAP provides a standardized framework for network and security devices to publish device state data--such as IP address, authentication, or virtually any meaningful information--to a central repository that can b

[Read more...]


securityLDAPjaashttpauthorizationauthenticationaccess control 18 Apr 2008 6:14 AM
avatar
Securing XAware Services by kvandersluis Comment (0)

XAware uses Spring Security (formerly called the Acegi project) to control access to XAware-based services invoked over HTTP.

 

XAware's security model includes authentication and access control. A user is authenticated with a user name and password, and is allow

[Read more...]



Get the Flash Player to see this player.
Flash Image Rotator Module by Joomlashack.
Commercial
Free Training
QuickStart Packages
Image 4 Title
Image 5 Title

Polls

Which data source and BizComponent combinations do you most frequently use?
 

Blogs

Recent Entries

Visit XAware.com