MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Electronic authenticationFederated identityIdentity providerAccess tokenIdentity managementEmail authenticationAuthentication protocolKnowledge-based authenticationAuthenticationTrusted third partyDigital identityPublic key certificateCross-domain solutionAuthorizationMessage authenticationCredential managementChain of trustExtended validation certificatePersonal identifierLoginInformation security managementComputational trustMutual authenticationClaims-based identityCode signingPre-boot authenticationAttribute-based access controlMulti-factor authenticationForefront identity managerAuthentication serverDiscretionary access controlDecentralized identifierTrademarkSecurity assertion markup languageData integrityDigital signature forgeryProof of authorityAsset integrity management systemsAuthenticated encryptionHardware security moduleComputer securityComputerized system validationDomain-validated certificateInformation assuranceCertificate signing requestElectronic signaturePublic key infrastructureTrust boundaryAuth-codeOnline identity managementDigital asset managementComputer access controlSecurity associationFacial recognition systemSelf-sovereign identityDigital walletAdvanced electronic signatureTrust anchorDatabase securityClient certificateDevice fingerprintCryptographic protocolKey signing partyCertificate authoritySecure telephoneSecure access moduleCyber-security regulationMaster data managementRsa securidCertification practice statementLogical access controlMandatory access controlPersonal identification numberTransaction authentication numberService providerCryptographic key typesCertificate transparencyNetwork access controlAudit trailIpsecForward secrecyFile integrity monitoringSession idIso/iec 6523Basic access authenticationNetwork level authenticationDigital cardGoogle authenticatorPrincipalSoftware tokenProcess validationSoftware testabilitySecurity engineeringCloud computing securitySmart contractTake-grant protection modelKey exchangeOauthChange controlMetadata standard