{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:31:31Z","timestamp":1730208691833,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1109\/cloudnet55617.2022.9978777","type":"proceedings-article","created":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T18:50:52Z","timestamp":1671216652000},"page":"277-281","source":"Crossref","is-referenced-by-count":0,"title":["LemonLDAP::NG A Full AAA Free Open Source WebSSO Solution"],"prefix":"10.1109","author":[{"given":"Christophe","family":"Maudoux","sequence":"first","affiliation":[{"name":"CNAM\/Cedric,Paris,France"}]},{"given":"Selma","family":"Boumerdassi","sequence":"additional","affiliation":[{"name":"CNAM\/Cedric,Paris,France"}]}],"member":"263","reference":[{"year":"0","key":"ref31","article-title":"LemonLDAP::NG - Web Single Sign On and Access Management Free Software"},{"year":"0","key":"ref30","article-title":"Firewall Bouncer &#x2014; CrowdSec"},{"year":"0","key":"ref10","article-title":"How Does RADIUS Work?"},{"year":"0","key":"ref11","article-title":"Kerberos: The Network Authentication Protocol"},{"year":"0","key":"ref12","article-title":"OpenLDAP, Main Page"},{"year":"0","key":"ref13","article-title":"Active Directory"},{"year":"0","key":"ref14","article-title":"OAuth 2.0 &#x2014; OAuth"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAFS.2018.8913384"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SBRC.2014.37"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-803843-7.00050-8"},{"year":"0","key":"ref18","article-title":"What are Time Based One Time Passwords (TOTP)? &#x2014; Security Encyclopedia"},{"year":"0","key":"ref19","article-title":"What is FIDO U2F?"},{"year":"0","key":"ref28","article-title":"Preauth - Zimbra :: Tech Center"},{"year":"0","key":"ref4","article-title":"OW2 Projects - LemonLDAP::NG (lemonldap-ng.WebHome)"},{"year":"2021","key":"ref27","article-title":"IBM Documentation"},{"key":"ref3","first-page":"170","article-title":"Impl&#x00E9;mentation de l&#x2019;authentification &#x00E0; double facteur dans la solution de SSO AAA LemonLDAP::NG 2.0","author":"maudoux","year":"0"},{"year":"0","key":"ref6","article-title":"LemonLDAP NG \/ lemonldap-ng &#x2022; GitLab"},{"year":"2018","key":"ref29","article-title":"What Are Cross Domain Cookies and How Do They Work"},{"year":"0","key":"ref5","article-title":"Worteks - Expertise Open Source"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT51068.2021.9418203"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1703","DOI":"10.3390\/s22051703","article-title":"Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study","volume":"22","author":"chatterjee","year":"2022","journal-title":"SENSORS"},{"year":"0","key":"ref2","article-title":"The uWSGI project &#x2014; uWSGI 2.0 documentation"},{"year":"0","key":"ref9","article-title":"Index - GnuPG wiki"},{"article-title":"LemonLDAP::NG","year":"2010","author":"guimard","key":"ref1"},{"year":"0","key":"ref20","article-title":"Let&#x2019;s get started with your YubiKey"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2013.6718522"},{"year":"0","key":"ref21","article-title":"CAS - Home"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3233\/JHS-190606"},{"year":"0","key":"ref23","article-title":"SAML Explained in Plain English &#x2014; OneLogin"},{"year":"0","key":"ref26","article-title":"LL::NG as federation protocol proxy &#x2014; LemonLDAP::NG 2.0 documentation"},{"year":"0","key":"ref25","article-title":"OpenID Connect explained"}],"event":{"name":"2022 IEEE 11th International Conference on Cloud Networking (CloudNet)","start":{"date-parts":[[2022,11,7]]},"location":"Paris, France","end":{"date-parts":[[2022,11,10]]}},"container-title":["2022 IEEE 11th International Conference on Cloud Networking (CloudNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9978662\/9978738\/09978777.pdf?arnumber=9978777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:36:46Z","timestamp":1673897806000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9978777\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cloudnet55617.2022.9978777","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]}}}