You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Perforator UI and API provides information that can be useful for hackers.
Controlling access at the network level can be impossible, or defense-in-depth may be desired.
Implementation
Preliminary analysis shows that different standards exist, such as LDAP, OpenID Connect and SAML.
User input is required to decide which of these technologies (or which subset) to adopt.
The text was updated successfully, but these errors were encountered:
Motivation
Perforator UI and API provides information that can be useful for hackers.
Controlling access at the network level can be impossible, or defense-in-depth may be desired.
Implementation
Preliminary analysis shows that different standards exist, such as LDAP, OpenID Connect and SAML.
User input is required to decide which of these technologies (or which subset) to adopt.
The text was updated successfully, but these errors were encountered: