Theseus - Selaus asiasanan mukaan "authentication"

    • Active Directory autentikointi ja auktorisointi 

      Vo, Van (2021)
      Opinnäytetyössä tehtiin selvitys ja toteutus Combitech Oy:lle liittyen Active Directory - autentikointiin ja -auktorisointiin. Tavoitteena oli selvittää ja tuottaa esimerkkitoteutus, jossa web-sovellukseen voidaan ...
    • Authentication in Web Applications 

      Wu, I-En (2023)
      The goal of this thesis is to explore web service authentication methods in the context of modern web applications. As web services continue to be integral components of today's digital landscape, the need for simple but ...
    • Authentication mechanisms for a web developer 

      Cao, Quang Tri (2023)
      Advancement in web development technologies has brought forth the appearance of complete standalone web applications. They are known as single page applications (SPA) which are executed completely in the browser and only ...
    • Contactless payments with inherence: Strong customer authentication and biometrics 

      Hartoneva, Marko (2020)
      Consumers in Finland can make payments simply by showing their card to the reader. For bigger amounts, a strong customer authentication is required. Typically, the authentication is done by inserting chip card to reader ...
    • CYBER DEFENSE EXERCISES IN XAMK VIRTUAL LABORATORY 

      Himel, Syed (2022)
      The purpose of this study was to research the current best practices of cyber defense and the possible ways to implement them in a virtual lab environment. The thesis will add value to the commissioner virtual lab by ...
    • Cybersecurity : Secure code with code auditing 

      Thapa, Bishal (2023)
      The purpose of the thesis was to illuminate the factors related to cyber security focusing on secure coding with code auditing process. These factors included the risk and vulnerabilities in the software, how the vulnerabilities ...
    • Defending Azure Active Directory: Pass-Through Authentication Attacks and Countermeasures 

      Syynimaa, Nestori (2023)
      Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management system used by 90 per cent of Fortune 500 organisations. Pass-through Authentication (PTA) is one of the hybrid authentication ...
    • Developing An End-To-End E-Commerce Web Solution With Next.js 

      Tran Nguyen, Thuy Hien (2023)
      This thesis work aimed to develop a cutting-edge e-commerce application with two views; an admin view for managing data anda user view for making e-commerce possible. The application was implemented using Next.js, Tailwind ...
      Rajattu käyttöoikeus / Restricted access / Tillgången är begränsad
    • Development of a Sports Management API 

      Jakobsson, Jan (2023)
      The purpose of this thesis is to develop an API with REST services that can be used to administer ice hockey leagues and aggregate statistics. The application is developed in Java with the Quarkus framework, and compiled ...
    • Exploring technological practices in development of HR CV management tool 

      Alam, Safiul (2024)
      The purpose of this thesis was to develop and implement CVHUB, an internal tool for managing employee CVs, replacing the older CVTOOL system. The aim was to provide enhanced functionality, improved security, and a better ...
    • Firebase 

      Tram, Mai (2019)
      Firebase is a development platform launched in April 2012 and acquired by Google in 2014 as an solution for back-end developer. The feature combination in Firebase accelerates the cloud database integration automatically ...
    • Implementing passwordless identity and access management system for a web application 

      Pietilä, Joonas (2024)
      Autentikointi ja auktorisointi ovat keskeisiä käyttäjänhallinnan mekanismeja monille internetin välityksellä tarjottaville palveluille. Käyttäjien autentikointi on perinteisesti perustunut salasanojen käyttämiseen, johon ...
    • Kehitysympäristön autentikoinnin modernisointi 

      Ylä-Kauttu, Simo (2024)
      Tämä insinöörityö käsittelee Microsoft Multi-Factor Authentication (MS MFA) -järjestelmän käyttöönottoa CGI Suomi Oy:n DevLabs-kehitysympäristössä. DevLabsin käyttö edellyttää VPN-ratkaisua. Nykyisessä tunnistautumisprosessissa ...
    • Overview of IoT Security Challenges, Authentication, Encryption and Blockchain Solution 

      Pham, Chinh (2019)
      The modern world is experiencing a new industrial revolution, known as industry 4.0, where machines, storage systems and other production facilities are capable of operating, exchanging information and triggering actions ...
    • Privileged access management model for a managed service provider 

      Tuononen, Heikki; Tuononen, Heikki (2023)
      Managed service providers operating as administrators in multiple customer environments need well-defined and secure means of providing access to their employees. The distinctive characteristic of a service provider’s ...
    • Privileged Accounts Protection with Multi-factor Authentication 

      Suokas, Anssi (2023)
      Identity protection for securing digital environments is of paramount importance to all companies using digital infrastructure. This thesis was a study of building the recommendations for improving the protection of ...
    • Protection of the frontend and backend using Azure Active Directory authentication 

      Konstantinov, Roman (2023)
      The thesis sought to find and implement the methods that Azure Active Directory platform provides to secure web applications. The main point is to find effectiveness of such methods as well as understand advantages and ...
    • Secure Sharing of Files 

      Upreti, Roshan (2024)
      The thesis explores the development and analysis of a secure file-sharing system within Enterprise Resource Planning (ERP) systems, focusing on Two-Factor authentication (2FA) to enhance security. It addresses the need for ...
    • Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management 

      Sizov, Nikita (2024)
      In collaboration with Nixu Corporation, this research focuses on unraveling the critical role of Privileged Access Management (PAM) and Identity and Access Management (IAM) in fortifying organizational cybersecurity. ...
    • The computer network security implementation in an enterprise project 

      Pukelyte, Ilona (2021)
      The main purpose of this thesis is to investigate existing information security technologies and implement these elements into a computer network. The project has two main parts: research and implementation. Each part ...