All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
linkedin.com
#systemdesign #authentication #oauth #jwt #distributedsystems #backenddevelopment #softwarearchitecture #dotnet | Tarun Paul
System Design – Authentication Systems (Who Are You, Really?) Authentication is not “login and done”. It’s about establishing trust in a distributed system. Get this wrong, and everything else is meaningless. 🧠 Why authentication is hard 🔐 Security is non-negotiable 🌍 Works across services & devices 🔁 Tokens expire & rotate ...
1 month ago
Related Products
Authentication Scheme Properties Dialog
Fido2 Ctap Authentication Scheme
List of HTTP Authentication Scheme
#Authentication Methods
Multi-Factor Authentication MFA Tokens & Passcodes | Cisco Duo
duo.com
5 months ago
Understanding Authentication: MFA, SSO, OAuth, OpenID & More!
YouTube
Mar 5, 2025
Top videos
4:11
Aadhaar authentication is required for the beneficiaries of Gruha Jyoti scheme, free electricity up to 200 units for domestic consumers in Telangana. | IFB News
Facebook
IFB News
46 views
Feb 17, 2024
1:21
Aadhaar Face Authentication is an enabler of PM Internship scheme and is facilitating easy registration of students. PM Internship Scheme will bridge gap between classroom learning and industry expectations. Simple 4 step process via PM Internship App: · Register · Create profile · Apply for internship · Join #AadhaarFaceAuth #PMInternshipApp | Aadhaar
Facebook
Aadhaar
38.3K views
11 months ago
1:10
42K views · 1.8K reactions | Software Engineering: Authentication Authentication is one of the most annoying but also critical skills to have as a software engineer. Quick explanation of 3 different types: basic auth, session auth, and jwt auth. If you want a video on JWTs and how they work, I have another one on my page. #coding #programming #authentication #csmajors #softwareengineer | Arjaythedev | Facebook
Facebook
Arjaythedev
61.8K views
2 weeks ago
Authentication Protocols
6:08
Kerberos - authentication protocol
YouTube
Sunny Classroom
508.7K views
Jul 9, 2017
7:01
#40 Kerberos - Authentication Protocol, Working with diagram|CNS|
YouTube
Trouble- Free
334.7K views
Jan 2, 2022
19:19
Kerberos authentication protocol explained | Shield Classroom | ManageEngine
YouTube
ManageEngine IAM and SIE
870 views
Feb 22, 2024
4:11
Aadhaar authentication is required for the beneficiaries of Gruha Jyot
…
46 views
Feb 17, 2024
Facebook
IFB News
1:21
Aadhaar Face Authentication is an enabler of PM Internship scheme
…
38.3K views
11 months ago
Facebook
Aadhaar
1:10
42K views · 1.8K reactions | Software Engineering: Authenticat
…
61.8K views
2 weeks ago
Facebook
Arjaythedev
7:44
Authentication Protocols: Definition & Examples
771 views
Jul 5, 2022
Study.com
2:08
What is CHAP?
Sep 29, 2021
techtarget.com
4:07
Implementing Authentication
Dec 13, 2017
teamtreehouse.com
Two Factor Authentication with Flask
Oct 11, 2016
miguelgrinberg.com
Create a Custom Authentication and Authorization Scheme in Oracle A
…
Aug 29, 2017
blogspot.com
Dimitri Gielis
0:26
9K views | Introducing SITAA: Scheme for Innovation and Techn
…
2K views
3 weeks ago
Facebook
MeitY Startup Hub
0:57
After the commencement of the Aadhaar card scheme in India in 2
…
51 views
Jan 10, 2024
Facebook
ItzEazy.Com
IETF backs new cryptographic scheme to battle the effects of spam
May 24, 2007
arstechnica.com
Using JWTs for Authentication in RESTful Applications
5 months ago
dev.to
6:51
Authentication Explained | Types of Authentication in Cybersecurity
22 views
1 month ago
YouTube
SIR_MAGIC
A Matrix for Systematic Selection of Authentication Mechanisms in Ch
…
Apr 26, 2021
acm.org
12:54
Digital signature
627.9K views
Dec 5, 2019
YouTube
Abhishek Sharma
2:27
Token Based Authentication
203.3K views
Jun 6, 2016
YouTube
Udacity
5:07
"Basic Authentication" in Five Minutes
203.1K views
Aug 10, 2021
YouTube
OktaDev
5:10
Oracle APEX - User Authorization Schemes
23K views
Oct 17, 2018
YouTube
Oracle APEX BD
12:10
Chapter 9, part 3, Information Security: Principles and Practice
8K views
Jul 20, 2011
YouTube
Mark Stamp
3:28
3D Password
41.6K views
Oct 25, 2007
YouTube
LeProf
12:17
Digital Signature Algorithm (DSA) in Network Security
78.6K views
Sep 17, 2020
YouTube
Chirag Bhalodia
4:34
HOW TO: Setup Kiosk mode for Google Chrome (Niagara 4)
9.4K views
Jan 14, 2020
YouTube
OnesightTV
14:48
13 Using WebClient to make API calls - Spring Boot Microservices
…
402.7K views
Feb 14, 2019
YouTube
Java Brains
24:16
How to Make Custom User Authorization Schemes in Oracle
…
8.8K views
Jul 9, 2021
YouTube
jABER IT
0:41
OAuth 2.0 Authorization Code Grant Flow
41.9K views
May 26, 2017
YouTube
Authlete
14:21
Digital Signature Standard Algorithm | With Solved Example
…
41K views
Apr 20, 2017
YouTube
Quick Trixx
4:32
Customizing Oracle Access Manager Login Pages
11.4K views
Nov 8, 2019
YouTube
Oracle Learning
2:49
How Encryption Works - and How It Can Be Bypassed
264.1K views
Mar 4, 2016
YouTube
The Wall Street Journal
1:30
Union Minister Nitin Gadkari falls unconscious during national anth
…
26.3M views
Dec 7, 2018
YouTube
DNAIndiaNews
See more videos
More like this
Feedback