Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following are protocols used for SSO?
Home
Authentication
Which of the following are protocols used for SSO?
asked
Aug 21, 2021
in
Authentication
by
rajeshsharma
Which of the following are protocols used for SSO?
Select the correct answer from below options :
a) OpenID
b) Kerberos
c) SAML
d) OAuth
e) All the above options
sso
sso-protocols
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Aug 21, 2021
by
rajeshsharma
e) All the above options
Related questions
0
votes
Q: What is federated SSO?
asked
Aug 21, 2021
in
Authentication
by
rajeshsharma
sso
sso-federated
0
votes
Q: What is Single Sign-On (SSO)?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
single-sign-on
sso
threat-modeling
0
votes
Q: Which of the following allows the users to login into a several different websites with the same single account ?
asked
Oct 8, 2021
in
DevOps
by
john ganales
sso
single-sign-on
0
votes
Q: What is Single Sign-Off?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#single-sign-off
sso
sso-authentication
0
votes
Q: In a typical "Web SSO" scenario, a secure, transient HTTP cookie can be used to exchange an SSO token between an "identity provider" and a "service provider".
asked
Aug 21, 2021
in
Authentication
by
rajeshsharma
web-sso
http-cookie
identity-provider
0
votes
Q: Based on the network security protocols, which of the following algorithms are used to generate message digests?
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#network-security-protocols
0
votes
Q: What are the protocols used by AJAX?
asked
May 16
in
AJAX
by
john ganales
ajax-protocols
0
votes
Q: What Is Meant By Protocols And What Are The Major Types Are Used In Web Services?
asked
Nov 25, 2019
in
SOAPUI
by
rajeshsharma
#soapui-protocols
0
votes
Q: Which one of the following statements is true about the SSO?
asked
Oct 8, 2021
in
DevOps
by
john ganales
single-sign-on
0
votes
Q: Which of the following is the best approach to use when providing access to an SSO application in a portal?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
sso-application
application-access
secure-programming-practices
+2
votes
Q: Which of the following standard protocols does Keycloak Support?
asked
Jan 1
in
Keycloak
by
GeorgeBell
keyclock
0
votes
Q: Which of the following is a classification of IoT protocols?
asked
Feb 18, 2020
in
Internet of Things IoT
by
MBarbieri
iot-protocols
0
votes
Q: Which among the following protocols has its roots in SOAP and WS-Specifications?
asked
Mar 8
in
Keycloak
by
sharadyadav1986
soap
ws-specifications
root-protocol
0
votes
Q: Which of the following method is the best one to save a password?
asked
Aug 21, 2021
in
Authentication
by
rajeshsharma
save-password
password-authentication
0
votes
Q: A JWT contains which of the following?
asked
Aug 21, 2021
in
Authentication
by
rajeshsharma
jwt
jwt-header
...