16%
30.11.2020
will be based on state-of-art authentication with Active Directory Authentication Library (ADAL) and OAuth 2.0 [3].
Getting Started with Exchange Web Services
Since Exchange 2007, Microsoft has recommended
16%
27.09.2021
controller to an isolated test lab. Do not copy the IP addresses
; then, I only had to intervene with the VM's network settings manually and configure local loopback address 127.0.0.1 as the primary DNS server
16%
21.08.2014
-Server/Path …. You could also specify a tape device or Samba file server:
BACKUP_URL=tape:///dev/nst0, ...
BACKUP_URL=cifs://Samba-Server/Path ...
If ReaR authenticates according to CIFS/Samba, the administrator
16%
05.12.2014
Intune enterprise account. Later in the Intune integration wizard sequence, you will be prompted to state which mobile endpoint platforms you want to support. The choices are Windows Phone 8.0/8.1, Windows
16%
17.06.2017
source license (Apache 2.0) in an irregular series of versions every few months. In early 2017, version 1.13 saw the 13th release appear since version 1.0 was published in June 2014.
In early March
16%
14.08.2017
and lsof tools to view TCP port 80 and also check the internal eth0 interface IP address, which reports that IP address 172.17.0.2 is bound.
I used the networking tools in Figure 6 to check
16%
07.04.2022
the number of desired container machines to be created. The names of the created container machines are a combination of the cluster name, the machines name, and the count index starting from 0. The image
16%
20.06.2022
that can be deployed on both 4G and 5G technology. A 5G campus network is designed to meet special requirements (e.g., to allow Industry 4.0 [1] applications to communicate). The market for 5G campus
16%
20.06.2022
.4'
02 services:
03 keycloak:
04 container_name: keycloak
05 image: quay.io/keycloak/keycloak:17.0.1
06 ports:
07 - 8080:8080
08 environment:
09 - KEYCLOAK
16%
02.08.2022
because access tokens in the OAuth 2.0 standard are usually only valid for one hour, after which you need to obtain a new token, which involves an in-depth reappraisal of the access context. At the end