dju.be | Using NGINX NGINX Reverse Reverse Proxy Proxy for for client client certificate certificate authentication authentication - - start start discussion discussion - - Tutorials Tutorials & & Examples Examples - - openHAB openHAB Community | good authentication, authentication library, user authentication, authentication update, step authentication | photography, light, photographer, lightroom, overflow | 15 |
the-nerd.be | Categories iOS , Local Authentication , Swift , Swift 2 , TouchID , Tutorials Tags authentication , fingerprint , local authentication , sensor , swift , swiftlang , touchid , tutorial 2 Comments on TouchID authentication tutorial for Swift | local authentication, touchid authentication, authentication tutorial, sensor authentication, authentication luckily | swift, october, unity, native, sketch | 13 |
eaglankurek.be | …of a portal site containing links to all applications (web apps, or Windows apps hosted on XenApp), and an access point consolidating various authentication methods and providing federated access. The customer has internal users, but also has employees and associates working at universities spread… | point authentication, authentication method, adf authentication, authentication saml, authentication certificate | kerberos, certificate, technology, process, reply | 12 |
kurek.be | …of a portal site containing links to all applications (web apps, or Windows apps hosted on XenApp), and an access point consolidating various authentication methods and providing federated access. The customer has internal users, but also has employees and associates working at universities spread… | point authentication, authentication method, adf authentication, authentication saml, authentication certificate | kerberos, certificate, process, issue, request | 12 |
palmki.be | Palmki™ scans more than 5 million reference points in the vein structure of your hand with a highly accurate infrared sensor. Once registered, secure and effective identification of a hand palm can be done by just holding your hand in front of our authentication technology. | hand authentication, authentication technology, lock authentication, authentication policy, biometric authentication | identity, verification, access, vein, payment | 11 |
janhos.be | Two IDM connectors ¬†will be installed in the trusted network. These connectors handle AD authentication requests, sync AD users and groups, provide access to the Horizon environment and sync Horizon Pools and assignments. Only outbound connections over TCP port 443 will occur ¬†between these… | kerberos authentication, authentication thing, connector authentication, authentication issue, appliance authentication | vmware, reply, identity, certificate, shortcut | 10 |
secwise.be | Microsoft will effectively begin on October 1, 2022 to turn off basic authentication for exchange ... | basic authentication, authentication exchange, authentication context, access authentication | azure, cyber, journey, maturity, strategy | 6 |
is4u.be | Identity and Access Management Identity Management Access Management Identity Governance Privileged Account Management Multi-factor Authentication Single Sign-On | factor authentication, authentication single, passwordless authentication, authentication planet | identity, access, insight, governance, privileged | 5 |
embassyservice.be | …method that is guaranteed to pick up your documents and to deliver them back to your address. special for Documents legalization, visa, Authentication of documents, Apostille, Travel visas, Door to door service, Embassy Courier services, for all consulates & embassy in Brussels. Document… | visa authentication, authentication document | embassy, delivery, easy, address, secure | 5 |
berneroberland.be | The session cookie is required for authentication, preference tracking, and other necessary functions to fully engage with this website. The name of the session cookie is randomly generated. | cookie authentication, authentication preference | photography, flower, region, hiking, mountain | 4 |
atbash.be | Within the Jakarta family, we have the Jakarta Security API specification which combines the more low-level specifications Authentication and Authorisation. It also makes it easier for the developer to define the requirements without relying on the runtime to perform the setup. Within cloud… | specification authentication, authentication authorisation, application authentication, authentication authorization, authentication event | jakarta, key, java, specification, runtime | 4 |
kieranclaessens.be | At the end of 2015 I got serious about bug bounty and set myself this goal of getting into the wall of fame of the “big four”: Apple, Microsoft, Google and Facebook. Facebook was a though nut to crack but I managed to find a little bug in their text action authentication mechanism which landed me… | text authentication, authentication account, action authentication, authentication mechanism, doc authentication | hacking, story, bug, cyber, challenge | 4 |
suffix.be | Using ecdsa-sk or ed25519-sk combined with a hardware security key for multifactor SSH authentication. | factor authentication, authentication ssh | ruby, file, linux, arduino, programming | 3 |
deguffroy.be | Sometimes you have the need to connect to a SQL Server (or another resource) in another domain and you have(or want) to use windows authentication. This is possible by using the windows credential manager. Open Credential Manager Go to Windows Credentials Click “Add a Windows credential” Fill in… | windows authentication, authentication domain, window authentication, authentication possible | playground, azure, devops, domain, sql | 3 |
ssobuddy.be | If (parts of) the application needs to know the user's identity, our platform will authenticate the user and let the application know who it's talking to. The authentication process can be as simple or complex as your policies define. Depending on the context, the process may differ: Smartcard… | application authentication, authentication process, smartcard authentication, authentication sense, process authentication | craftsman, access, identity, sure, answer | 3 |
eidcompany.be | e-AuthentifyMe TM A powerful, online authentication solution. User-friendly and requiring a minimum of IT integration, it is designed for websites and applications, company safety etc... | online authentication, authentication solution | electronic, identity, card, answer, subscription | 3 |
mailwijzer.be | The technology to exchange mail has been standardized in 1982. At that time, nobody had expected the massive abuse of e-mail that we face today. Hence, no authentication was defined for the sending of e-mail. This means the recipient of a message can not be sure that the message was truly sent by… | today authentication, authentication send, address authentication, dkim authentication, authentication recipient | recipient, technology, sender, address, authenticity | 3 |
timschaeps.be | AAD-B2C 1 ALM 3 AUTHENTICATION 3 AUTOMATION 2 AZURE 10 AZURE-ACTIVE-DIRECTORY 1 AZURE-ACTIVE-DIRECTORY-B2C 1 AZURE-ARTIFACTS 2 AZURE-DEVOPS 8 BICEP 2 BLOG 3 BOOKS 3 BUILD 3 BUILD-MANAGEMENT 3 CAKE 4 CAKE-BUILD 2 CAKEBUILD 1 CERTIFICATION 4 CLIPBOARD 1 CONTAINERS 1 DATA-ENGINEERING 1 DEVELOPMENT 4… | devops authentication, authentication devrel, alm authentication, authentication automation | azure, devops, productivity, share, build | 3 |
quentinkaiser.be | …was that specific CVE. The CVE description clearly mentions “unauthenticated remote code execution vulnerability in the Networker Client execution service (nsrexecd) when oldauth authentication method is used ”, so I decided to investigate Networker authentication mechanisms by the end of 2020. | oldauth authentication, authentication method, networker authentication, authentication mechanism, router authentication | conference, thing, vulnerability, execution, remote | 2 |
daedeloth.be | The NTAG2x password protection only allows you to set a 4-byte password, so you can’t really call it a security measure. I decided I would use the 4-byte password to discourage users overwriting the tag, but the true authentication would lay in using an SHA-256 HMAC on the content I would write… | specific authentication, authentication mechanic, laravel authentication, authentication form, true authentication | number, drink, card, january, hour | 2 |
thru-ict.be | …to connect to your network. At the same time, unauthorized devices are quarantined or placed in a guest zone. Advanced methods are available to check the health of a workstation such as antivirus version or patch level. Authentication can take place using highly secure methods such as certificates. | strong authentication, authentication network, level authentication, authentication place | network, networking, innovative, technology, access | 2 |
lindseybroos.be | Firebase is part of a growing trend known as "Back-end as a service". Firebase has 8 technologies that are designed to enhance your app development experience, including Firebase authentication, Realtime Database, Cloud Storage, … In this post where are going to look at Firebase authentication… | firebase authentication, authentication realtime, authentication firebase, authentication easy | angular, routing, form, reactive, august | 2 |
arthroclinic.be | When you log in to Control Panel, you will receive an authentication cookie that is used to keep your verified status. The cookie name is preceded by a long, randomly generated string, followed by _identity. The cookie only stores information necessary to maintain a secure, authenticated session… | panel authentication, authentication cookie | orthopaedic, essential, lifespan, category, knee | 2 |
jenshermans.be | …human-computer interaction in security and, in general, overall security architectures and solutions for challenging applications such as authentication and voting. I was involved in several large research projects and also in applied projects, such as the development of authentication… | application authentication, authentication vote, development authentication, authentication solution | research, secure, friendly, currently, electrical | 2 |
e-we-consult.be | Working as freelance for European Commission Directorate-General Taxation on a large project of authentication, authorizations, delegations and central services protection across member states of the European Union. | project authentication, authentication authorization, central authentication, authentication services | java, orient, technology, european, course | 2 |
freelanceit.be | Troubleshooting and setup of new firewall rules for authentication in other network layers | rule authentication, authentication network, encryption authentication, authentication authorization | network, technical, developer, skills, knowledge | 2 |
nationalstore.be | you will not benefit from this feature and will have to re-authenticate yourself each time you log in to a different client application of the authentication service. Depending on their function, i.e. for marketing or statistic purposes, the cookies may also be kept for an extended time period, but… | pointer authentication, authentication service, application authentication | exhibitor, artist, shall, supermarket, cultural | 2 |
corelan.be | personal details by written request to Corelan. If you decide to get your information removed, you understand and accept that you will lose all access to any resources that require the use of these personal details, such as parts of the website that require authentication. | party authentication, authentication support | exploit, research, class, write, available | 2 |
bugoff.be | Directadmin + LetsEncrypt AH01895: Unable to configure verify locations for client authentication | | package, key, vmware, file, ubuntu | 2 |
micriconsult.be | The industrial apps require a user authentication, either through a simple login mechanism of through an encrypted key. This key is created using registration information such as name and email address. However, at any time a user can unregister, which removes those data from the registration server | user authentication, authentication simple | industrial, general, joomla, airflow, aviation | 1 |
eazysign.be | Zetes eaZyID® is a business identity provider (IDP) solution that allows a natural person to validate & use the public data as stored on the Belgian eID (electronic identity) card as well as an authentication using the PIN code of this eID card. | card authentication, authentication pin | secure, card, electronic, identity, reader | 1 |
arjundu.be | Modified a platform independent HTTPS transport stack to support federated authentication using a proprietary authentication scheme which is slated for use across all our platforms | stack authentication, authentication proprietary, proprietary authentication, authentication scheme | vmware, framework, engineer, technical, spatial | 1 |
sprouttobebrussels.be | HitFile is the best download manager if you download files from online hosting services such as Hotfiles and MediaFire . As a free user, all you need to do is provide a link to a website. The uploader will automatically detect the host and ask if you agree to its terms. If the host hijacks the… | host authentication, authentication hitfile | file, speed, easy, features, unlimited | 1 |
secubear.be | Identities are the keys to your data and need to managed and protected at all cost. To manage this, organisations need to look for Identity governance, privilege account management and strong authentication solutions. | strong authentication, authentication solution | centric, learn, risk, device, privilege | 1 |
db-soft.be | DB-SOFT is an established leader in Firebase development. We can help you navigate Firebase, whether to use Cloud Firestore, Realtime Database or both. To speed development, we use Firebase for features such as user authentication, real-time updates, static hosting, and much more. Whether you want… | user authentication, authentication real | firebase, core, backend, developer, dynamic | 1 |
nawangtendar.be | A simple blog system created with Google Firebase for real time databse, authentication and TextEditor. | databse authentication, authentication texteditor | github, firebase, adobe, view, difference | 1 |
vandyckyorben.be | 9. Then for authentication type the easiest way is to use password make sure to type in the username and the password | | inside, virtual, root, password, command | 1 |
vesalius.be | In a second phase (some weeks), we will consider giving the collaborators of the VDIC partners who are outside their network, full access to the whole content of the library, through authentication with a login, thus making a VPN connection unnecessary. This is possible provided that the different… | library authentication, authentication login, organisation authentication, authentication possibility | library, material, access, book, traditional | 1 |
timmcca.be | Identified a vulnerability in our authentication system, constructed a mathematical model to analyze the risk of compromise, and proposed mitigation solutions | vulnerability authentication, authentication system | university, khan, technology, engineer, graduate | 1 |
rubdos.be | The net effect is an anonymous authentication system: users can prove their permission level, without disclosing who they really are, all while the servers are ensured that only privileged users can access sensitive data. | anonymous authentication, authentication system | thought, encryption, messaging, knowledge, docker | 1 |
vizion-web.be | I implemented a Kong Gateway API, Keycloak for the authentication part, two web interfaces (thanks to the Angular framework) and two REST APIs. (See the diagram to understand their use) | keycloak authentication, authentication web | java, course, transaction, thank, goal | 1 |
intensec.be | Secure your complete environment by using single sign-on with adaptive multi-factor authentication. | | upright, identity, access, governance, coffee | 1 |
mind.be | Security audits, Authentication, Confidentiality, Integrity, Remote upgrade mechanisms, etc… | audit authentication, authentication confidentiality | mind, embedded, learn, low, level | 1 |
atticstudios.be | If authentication is required or desired, this would preferably allow LDAP integration. This will allow access to everything with one single account, the Attic Member account. | | attic, pi, automation, raspberry, member | 1 |
neurovetncb.be | You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. | currently authentication, authentication credentials | old, revision, permission, currently, credentials | 1 |
diddens.be | You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. | currently authentication, authentication credentials | old, revision, valid, permission, currently | 1 |
eccbelgium.be | Online payments are now more secure than ever thanks to the mandatory use of two-factor authentication. But what exactly does this mean? | factor authentication, authentication exactly | purchase, european, guarantee, telephone, warranty | 1 |
licentiepromo.be | Of course! We encourage all our customers to register their email address and register their specific Microsoft Office product key via Microsoft activation to ensure authentication and tracking of their authentic software products. We guarantee the authenticity and proper functioning of the license. | activation authentication, authentication tracking | license, cheap, legal, device, immediately | 1 |
vinzz.be | This configuration redirects all requests to its https equivalent and will also work with password protected directories. Authentication is performed over SSL, never over http. | directory authentication, authentication ssl | react, typescript, june, tech, proximus | 1 |
go4ict.be | Discover the possibilities of the AntumID. Discover blockchain authentication of DigiByte. | blockchain authentication, authentication digibyte | soap, lite, official, php, possibility | 1 |
cblue.be | …to the needs of its customers. Thus, the most frequent adaptations that we carry out are related to the ease of management of the platform (link to an authentication system, interfacing with the end customer's systems, making custom reports, etc.) and adapting the capacity of the infrastructures. | link authentication, authentication system | network, infrastructure, dedicated, delivery, virtual | 1 |
primoris.be | As your reliable source for training Ciboris is offering you a free webinar on methodologies to combat food fraud in fruit and fruit juices. SGF International e.V. and Ciboris are collaborating to tackle one of the more difficult cases in fruit juice authentication: detection of peach puree in… | juice authentication, authentication detection | bulgaria, analysis, sample, reliability, contaminants | 1 |
365bythijs.be | As a lot of organizations are moving to the cloud, security becomes more and more important. While a most organizations have already enabled multifactor authentication, protecting your administrator accounts is … Continue Reading Require Device Compliance for the non-primary user | multifactor authentication, authentication administrator | azure, automation, intune, logic, key | 1 |
wybaillie.be | Melego identified a major security breach in Joomla. The Joomla Gmail Authentication plugin permits pasword harvesting and needs improvement | gmail authentication, authentication plugin | category, value, future, gap, available | 1 |
glaude.be | Pico is not blogging software - but makes it very easy for you to use it as a blog. You can find many plugins out there implementing typical blogging features like authentication, tagging, pagination and social plugins. See the below Plugins section for details. | like authentication, authentication tag | file, theme, directory, header, meta | 1 |
favoriete-prijs.be | …authorisation, current virus software), access controls (individual employee access authorisation via personal accounts, identification and authentication requirements), disclosure controls (constant supervision and guidance to authorised personnel, no local storage of data, recording of all data | identification authentication, authentication requirements | declaration, address, processing, purpose, provision | 1 |
m2tec.be | First we set security by user. This is in the part authentication. If you search for “security”, the second time you wil find: | user authentication, authentication security | php, mysql, function, sudo, java | 1 |
hdelva.be | Do you have NGSI-LD data you want to make public, but the thought of having to manage a rate limiting and authentication service is holding you back? Consider publishing your data through a read-only view of cacheable data fragments. Clients can use these to answer any NGSI-LD query you may have… | rate authentication, authentication service | ghent, semantic, university, slide, research | 1 |
jvm.be | 6.2. You may not probe, scan or test the vulnerability of the site or any network connected to it, nor breach the security or authentication measures on the site or any network connected to it. You may not reverse look-up, trace or seek to trace any information on any other user of or visitor to… | security authentication, authentication measure | jvm, law, property, intellectual, firm | 1 |
dbt-advies.be | Your website backoffice can be protected with a Two-Factor Authentication (2FA) for your password (recommended), or with a reCaptcha plugin. | factor authentication, authentication password | domain, unlimited, month, price, plugin | 1 |
uprightsecurity.be | Secure your complete environment by using single sign-on with adaptive multi-factor authentication. | | upright, identity, access, governance, coffee | 1 |
approach.be | How can integrating an SSO login with Microsoft Azure AD simplify the authentication process? | ad authentication, authentication process | approach, cyber, secure, threat, identity | 1 |
kicktracker.be | The website uses an external authentication platform called Auth0 . Any e-mailadres you use to logon will be securely stored on their server. | external authentication, authentication platform | tabletop, stl, file, printing, board | 1 |
nobleprog.be | Identity management (11) Central Authentication Service (CAS) (1) Services Annuaires (6) LDAP (1) OpenLDAP (2) OpenDJ (1) Active Directory (AD) (1) FreeIPA (1) 389 Directory Server (2) Okta (1) Hyperledger Indy (1) OpenAM (1) | central authentication, authentication service | apache, programming, framework, computing, linux | 1 |
ibrahims-collectibles.be | Ibrahims Collectibles certifies most US, world, and ancient coins, tokens, and medals. The certification process consists of authentication, grading, attribution, and encapsulation in plastic holders. | process authentication, authentication grading | wishlist, view, quick, banknote, pricing | 1 |
belnet.be | Steve Colin (Coordinator of the eServices Unit of the Digital Campus of the Haute-Ecole Condorcet) recently produced a manual to help you implement Office 365 authentication by configuring Shibboleth IdP v4.x on Debian-Ubuntu Linux (with Apache2 + Jetty9). This specific configuration is available… | office authentication, authentication shibboleth | belnet, network, member, corporate, career | 1 |
keysec360.be | Detects successful and unsuccessful logins outside the expected countries, known malicious IP addresses and adversaries, exposing unauthorized authentication activity. | unauthorized authentication, authentication activity | vulnerability, package, continuous, endpoint, device | 1 |
broodbaar.be | Identifies and authenticates users who chose remember-me authentication to log in to the system. This cookie is only created for users who deliberately chose to us this option. | user authentication, authentication system | delivery, bread, submarine, away, visit | 1 |
robonaut.be | …include a new Gateway API with request validation, a new TypeScript CLI that communicates with this API, a shared logger library and an authentication service. I created an end to end pipeline shared across all components that enforces a standard way of versioning, testing and releasing. I… | library authentication, authentication service | engineer, stack, native, pipeline, research | 1 |
contractza.be | Betrust N.V. is specialized in providing services related to digital signatures, authentication, archiving and delivery of documents, and more … | signature authentication, authentication archiving | book, integration, thank, form, real | 1 |
actiefinsurances.be | WordPress uses these cookies to store your authentication information. Their use is limited to the administrator console area. | cookie authentication, authentication information | insurance, preferences, anonymous, setting, function | 1 |
robvankeilegom.be | …Connect was born: an online Laravel application with an API behind it. The API, which is also a Laravel application and uses the passport package for authentication, is used to store all data as a single sign-on provider. This way the API can be easily integrated in other (existing) applications. | package authentication, authentication data | laravel, developer, present, skills, stack | 1 |
hontaiyoshinryu.be | Hontai Yōshin Ryū is a traditional jujutsu school, also incorporating the long staff, the short staff, knife, short sword, long sword and rope bindings. It is a Kobudō (old budō) or KORYŪ (old tradition; old school), member of the Nihon Kobudo Kyokai, which is owned by the Nippon Budokan. The… | | branch, characteristic, practice, hour | 0 |
uitaan.be | Congratulations , you have successfully installed simpleSAMLphp. This is the start page of your installation, where you will find links to test examples, diagnostics, metadata and even links to relevant documentation. | | português, indonesia, magyar, federation, administrator | 0 |
lathuy-wallaert.be | If you are an experienced Joomla! user, this Joomla site will seem very familiar but also very different. The biggest change is the new administrator interface and the adoption of responsive design. Hundreds of other improvements have been made. | | joomla, category, administrator, form, sample | 0 |
artrobin.be | An old tree reminds me of an old man who, rested, and relieved of the weight of his responsibilities, takes root and becomes discreet; calm, with his hair blowing in the wind, he contemplates and lets himself be contemplated. | | tree, appointment, desire, responsibility, root | 0 |
linuxnasm.be | …won't find what you're looking for here. Yet assembly language is not really dead, understanding the workings of higher programming languages, debuggers, even hardware (down to the CPU) make it interesting to learn assembly language. All programs are made and tested on Debian 10 buster (should… | | linux, assembly, language, python, file | 0 |
jefferies.be | …variables within Apex , it will incorporate a lot from previous blog posts but I will try and point you toward these other posts when necessary. Lets Begin: We start off by creating a simple GET table that pulls through our substitution variables from Planning, I covered this in an older post… | basic authentication | oracle, access, march, share, june | 0 |
mybenefit.be | Welcome to the MyBenefit application. | european authentication | safely, supplementary, method, european, secure | 0 |
ecerium.be | Ecerium operates for developers and companies by providing high-end digital solutions. Based on our own microservices platform, better known as “Ecerium Elements” . | authentication element | thank, financial, custom, easy, invoice | 0 |
salvia.be | Externe links… Media gallery… | | gallery, manage, device, agree, decision | 0 |
blogregister.be | 4. At the top of your screen you can horizontally scroll through your images and tap on multiple images to attach to your email. When you have selected your desired screenshots, tap on the Mail icon to proceed. | | record, domain, command, follow, head | 0 |
spryng.be | SMS Gateway Service ✔ SMS Gateway ✔ SMS API ✔ Bulk SMS ✔ SMS Service ✔ 24/7 Support ✔ 100% Delivery Guarantee ✔ 100% Reliable & Safe! | sms authentication | gateway, healthcare, delivery, logistics, guarantee | 0 |
hensondesign.be | One glance at the Henson Design collection will tell you that the designers certainly pulled out all the stops when creating this line of luxury beds and matrasses. Henson Design combines an innovative view of ergonomics and ease of use with sophisticated and stylish design. The result is… | | mattress, find, accessories, advantage, luxury | 0 |
alexvanderbist.be | At Spatie, we host several packages on a private composer packagist server using Satis. In the first of this two-part blog series we'll take a look at how we're distributing these packages by hosting our own private Composer repository using Satis and how you can do that too. | satis authentication, authentication laravel | laravel, june, migration, lot, repository | 0 |
ethiopianembassy.be | Diplomats and staff members of the Embassy of Federal Democratic Republic of Ethiopia in Brussels visited the Royal Palace of Brussels, today, the […] | document authentication, authentication service | embassy, ethiopia, ambassador, ethiopian, late | 0 |
weseman.be | By combining years of experience with the constant demand for innovative solutions Wesemann is a wealth of specialist knowledge. Through this knowledge Wesemann designs solutions that tailor-fit the customers’ needs. Innovation is one of the core activities for Wesemann and so we like the… | | frontpage, power, energy, industrial, supply | 0 |
vanlaere-webdesign.be | From a previous assignment I was looking for an image slider. Unfortunately, not all of them are easily customizable. So, I was wondering if I could build an one from scratch. The main idea was to make the images fold like if you would turn a page of a book. The biggest challenge here was… | | developer, features, player, designer, resume | 0 |
everdis.be | everdiS offers business consultancy services in the field of telecommunication networks. Specialized in the generation, transportation and management of rich contents, we do integrate those flows into a strengthened security architecture. everdiS will handle the complexity of things to deliver new… | vpn authentication, authentication access | network, telecommunication, rich, general, transportation | 0 |
mshelp.be | Seems that quite a lot of people have already experienced some kind of error with the CRM Outlook client. Today was one of those days again where I experienced an error. I did a clean install of the CRM 2011 Outlook client and connected to the CRM 2011 on premises environment. All seemed to be… | user authentication, authentication automatic | report, error, sample, appointment, custom | 0 |
malaika4wc.be | For example, by donating one or more birth sets to a vulnerable woman in Nsambya or Kampala, you support at least 2 women: you donate something to the young mother and her child and you create work for another vulnerable woman who works in our sewing workshop. Isn't that wonderful! | | woman, child, gallery, sewing, vulnerable | 0 |
fbruynbroeck.be | “Young developer who is willing to learn but also has a lot to offer. I am equipped with life skills, sense of timing and responsibility that makes me an asset.” | user authentication, authentication acs | presentation, azure, analysis, october, conference | 0 |
beonit.be | Analysis & development, from scratch or diving in an existing code factory. We evolve mainly in the Java world and every web related technologies. | favorite authentication, authentication provider | sign, technology, favorite, simplicity, craftmanship | 0 |
aaronclaes.be | I am a Full Stack web developer on a journey in the digital world! Some of my Favorite Frameworks and programming languages to work with are React, Express js and Mongoose. | | developer, stack, framework, journey, react | 0 |
jamaica-brussels.be | Embassy of Jamaica and Jamaica Mission to the European Union - Jamaica Embassy, Brussels – | apostille authentication, authentication application | embassy, consular, european, notice, june | 0 |
lebaanthai.be | The Thai Restaurant Le Baan Thai in the Patershol of Ghent is the reference for fine Thai dining and Thai take-away in Ghent. | | away, ghent, reference, dining, view | 0 |
computercentrale.be | …Blade… Tower… Rackmount… Barebone… Notebook Accessories… Notebook Bags… Dockings & Port Replicators… | | accessories, power, phone, network, card | 0 |
mdkapsalon.be | Info… Privacy… View Privacy… | | view, manage, device, agree, decision | 0 |
onohaittoryu.be | Print… Email… NL… Home… Ono-Ha Ittō Ryū… Keiko (Training)… In Belgium… Location and practice hours… | | branch, practice, hour, picture | 0 |
iot-arcsom.be | français… | arcsom authentication | connectivity, privilege | 0 |
seanvanloon.be | SVL Consulting… Work Experience… Certification… Hobbies… Contact… Scroll For More… Back to… | vce authentication, authentication server | engineer, network, certified, azure, industry | 0 |
redboxconsulting.be | This document describes how to integrate a PeopleSoft system with Synology LDAP server. This is kind of a weird combination as PeopleSoft is mainly used in bigger enterprises, while Synology LDAP server is a very limited directory product, which you are more likely to find in a small business. So… | | consulting, oracle, gnome, leave, ldap | 0 |
akala.be | We create elegant & responsive web application to target your audience. We made a bunch of User Interface (UI) from Customer Service Portal to CRM. | user authentication, authentication access | coming, soon, theme, spectacular, wp | 0 |
loginhelp.be | We therefore advise you to use another browser such as Microsoft Edge (if you are using Windows 10) or Mozilla Firefox . | authentication solution, eid authentication, authentication certificate | useful, certificate, edge, mandate, role | 0 |
eishinryu.be | This is the home page of the classical Japanese swordsmanship school Muso Jikiden Eishin Ryu , Belgian Branch headed by Wout Verschueren, 7 th dan Renshi Eishin Ryu, direct student of Tanaka Sensei, 9 th Dan Hanshi ZNIR and Patrick Fehr 8 th Dan Kyoshi ZNIR and 8 th Dan Eishin Ryu. | | iaido, branch, manage, device, agree | 0 |
it4smb.be | S'identifier… favourites 0… Audio - Consumer… Audio Accessories… Clock Radios… Headsets & Microphones… | | accessories, cable, storage, networking, network | 0 |
budts.be | A while ago, after reading about some of the meetups organized by VimBerlin and VimLondon, I started wondering if there would be any interest in a similar group for Belgium / Antwerp. Today I asked the question on Twitter and I'd like to ask it here again: Would there be any … | ssh authentication, authentication pgp | writing, vim, meetup, pgp, today | 0 |
resoasbl-luxembourg.be | Pmtic… Table conversation… L'antenne d'Arlon… Rgpd… Contact… FIC - AOC… Pmtic-Formation… View Privacy… | | conversation, view, manage, device, agree | 0 |
linguix.be | Why Linguix is your best choice! | authentication procedure | translation, interpretation, revision, arabic, morocco | 0 |
chpconsult.be | The Founder-Manager of ChP Consult is Christophe Promper whose experience is based upon more than 20 years of expertise in the field of Aerospace and Defense. | | chp, official, coupling, founder, industry | 0 |
rsdata.be | …Phone System Cards & Components… Phone System Software… Carrier Transport Equipment… Multiplexors… | | accessories, device, cable, supply, power | 0 |
piru.be | An overview of the illustration and animation work of Zologie's Pieter Rubberecht (Piru). | | animate, vector, sentence, library, editorial | 0 |
philippevandenberg.be | One of the first professionalised artist foundations in Europe, the Philippe Vandenberg Foundation generously keeps the legacy of Philippe Vandenberg mobile. | | artist, paper, exhibition, oil, research | 0 |
devopsku.be | Since a vanilla Kubernetes Cluster does not provide any Edge-Loadbalancer or an SSO-Component, we are going to provide documentation on how to setup the whole cluster including an Edge-Loadbalancer and other useful tools (eg. SSO Components). An initial set of Helpers are: | central authentication, authentication server | kubernetes, devops, stack, setup, jenkins | 0 |
dvoituron.be | To deploy a website, an Azure function or a WebJob in Azure, via Azure DevOps, the easiest and most efficient way is to use the Azure Web App Deployment task. | blazor authentication, authentication cookie | visual, azure, sql, devops, git | 0 |
bitcon.be | Some time ago I replaced my HPE 3PAR 7400 array in my homelab with a new HPE Nimble storage array HF20. HPE 3PAR had an interesting feature called Direct Attach aka FlatSAN, that allows to connect your 3PAR array directly to the Virtual Connect modules inside a C7000... | passport authentication, authentication update | storage, networking, edge, synergy, space | 0 |
netxpert.be | Our partners are very important in helping us to achieve our goals and make our solutions work. | | infrastructure, advisory, premise, certified, custom | 0 |
esolutions.be | © 2000 - 2015, E Solutions BVBA - Larenbroekstraat - 9450 Haaltert - Belgium - tel.: +32 (0)9 277 91 48 | Site Map | Company | Careers | strong authentication | infrastructure, network, identity, career, demonstration | 0 |
embassyofliberia.be | FROM THE Benelux The Embassy of Liberia to the Benelux Countries and the European Union... | document authentication | embassy, passport, republic, tourism, ambassador | 0 |
gitelespetitestetes.be | Then you're on the right place! We rent a cottage (with garden) for six persons. We are officially recognized by the Walloon government of tourism as a 'gîte rural'. For more details and pics, you can navigate by using the menu. On a smartphone, click on the three horizontal stripes at the top… | | booking, origin, present, hiking, region | 0 |
michielsioen.be | Smart home display Putting IoT to use… Mutual SSL authentication on .NET Core Tracking down issues on… | ssl authentication, authentication core | lot, interesting, thing, january, problem | 0 |
salesagentsplatform.be | Nederlands… click here to use it.… direct sales… | | | 0 |
saltswitch.be | SALT Switch is an e-cigarette that offers supreme smoking experience but with much less harm than traditional tobacco products | faq authentication, authentication wholesale | salt, smoking, tobacco, puff, edition | 0 |