Found 229 results for "security authorities"

The search executed in 0.001508371 seconds. That's fast.

Gitana / 4.0 / Data Engine / Authentication / Multifactor Authentication

Multifactor Authentication Cloud CMS supports Multifactor Authentication (MFA) to provide enhanced security for your users and their account credentials. With Multifactor Authentication is enabled for a user, that user will be required to supply a verification code in addition to their username and password. The verification code is delivered to the user's phone or mobile device via SMS, a phone call or an app. The code may also be delivered via a hardware device depending on the kind of provide

Score: 1.7502223

Gitana / 3.2 / Guide / Guide / Text Analysis / Text Analysis Providers / AWS Comprehend

AWS Comprehend Handles the Text Analysis processing of elements in a textual payload using the Amazon Web Service Comprehend Service. The AWS Comprehend Service is described by: accessKey secretKey region Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Comprehend within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by buck

Score: 1.7120471

Gitana / 4.0 / Data Engine / Services / Text Analysis / Text Analysis Providers / AWS Comprehend

AWS Comprehend Handles the Text Analysis processing of elements in a textual payload using the Amazon Web Service Comprehend Service. The AWS Comprehend Service is described by: accessKey secretKey region Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Comprehend within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by buck

Score: 1.7120471

Gitana / 3.2 / Guide / Guide / Narration / Narration Providers / AWS Polly

AWS Polly Handles the generation of a Narration audio file for textual content using the AWS Polly Narration Service. The AWS Polly Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Polly within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketName) within

Score: 1.693506

Gitana / 3.2 / Guide / Guide / Optical Character Recognition / OCR Providers / AWS Textract

AWS Textract Handles the Optical Character Recognition detection and analysis of characters in a binary payload using the Amazon Web Services Textract Service. The AWS Textract Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Textract within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the gi

Score: 1.693506

Gitana / 3.2 / Guide / Guide / Recognition / Recognition Providers / AWS Rekognition

AWS Rekognition Handles the Image Recognition detection and analysis of elements in a binary payload using the Amazon Web Service Rekognition Service. The AWS Rekognition Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Rekognition within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given

Score: 1.693506

Gitana / 3.2 / Guide / Guide / Transcription / Transcription Providers / AWS Transcribe

AWS Transcribe Handles the generation of a Transcription text file for audio content using the AWS Transcribe Service. The AWS Transcribe Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Transcribe within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketNa

Score: 1.693506

Gitana / 4.0 / Data Engine / Services / Narration / Narration Providers / AWS Polly

AWS Polly Handles the generation of a Narration audio file for textual content using the AWS Polly Narration Service. The AWS Polly Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Polly within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketName) within

Score: 1.693506

Gitana / 4.0 / Data Engine / Services / Optical Character Recognition / OCR Providers / AWS Textract

AWS Textract Handles the Optical Character Recognition detection and analysis of characters in a binary payload using the Amazon Web Services Textract Service. The AWS Textract Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Textract within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the gi

Score: 1.693506

Gitana / 4.0 / Data Engine / Services / Recognition / Recognition Providers / AWS Rekognition

AWS Rekognition Handles the Image Recognition detection and analysis of elements in a binary payload using the Amazon Web Service Rekognition Service. The AWS Rekognition Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Rekognition within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given

Score: 1.693506

Gitana / 4.0 / Data Engine / Services / Transcription / Transcription Providers / AWS Transcribe

AWS Transcribe Handles the generation of a Transcription text file for audio content using the AWS Transcribe Service. The AWS Transcribe Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Transcribe within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketNa

Score: 1.693506

Gitana / 3.2 / Guide / Guide / General / Locking

Locking Cloud CMS supports locking of nodes (or content instances). Locking allows content editorial team members to explicitly block other editors from working on content that they're already working on. When a piece of content is locked by a user, all other users in the project who have access to the piece of content will be prohibited from making modifications. They will be able to read the content but they will not be able to save any modifications. Once the lock is released by the user who

Score: 1.669183

Gitana / 4.0 / Data Engine / Nodes / Locking

Locking Cloud CMS supports locking of nodes (or content instances). Locking allows content editorial team members to explicitly block other editors from working on content that they're already working on. When a piece of content is locked by a user, all other users in the project who have access to the piece of content will be prohibited from making modifications. They will be able to read the content but they will not be able to save any modifications. Once the lock is released by the user who

Score: 1.669183

Gitana / 3.2 / Guide / Guide / Docker / Maintenance / Container Hooks

Container Hooks This page describes the configuration of HTTP hooks that can be wired into your container orchestration framework to facilitate container lifecycle events (such as shutdown). Lifecycle Hooks Your container orchestration framework likely supports the ability to signal a running API container when one of the following occurs: A container has finished starting up. A container is about to be shut down. In the Kubernetes world, there are two lifecycle hooks (postStart and preStop). Th

Score: 1.6517248

Gitana / 4.0 / User Interface / Overview

User Interface Documentation Welcome to the User Interface Documentation Gitana provides a full user interface that your editorial team and managers use to create, manage and deliver content to the business, applications and web sites. The user interface is secure, role-based and customizable, allowing your development team to cater the editorial experience to the exact needs of end users. Add-ons Embedded Media Modules Projects Security User Interface Workflow

Score: 1.6321822

Gitana / 3.2 / Guide / Guide / Overview

_page Access Policies Actions Antivirus Scanning API API Keys Applications Application Server Attachments Auditing Authentication Binary Files Branches Bulk Import Command Line Conditions Content Modeling Cookbooks Deployment Docker Features Find Forms General GraphQL Integrations Multifactor Authentication Modules Narration Optical Character Recognition Platform Policies Projects Publishing Query Recognition Releases Reports Rules Scripting Search Security Single Sign On (SSO) Supported Stacks

Score: 1.6138098

Gitana / 3.2 / Guide / Guide / Integrations / Ping

Ping Ping Identity provides security solutions for on-premise and SaaS based applications. Its PingOne product provides Identity and SSO solutions including support for the SAML 2.0 protocol which is supported by Cloud CMS. Cloud CMS provides Single Sign On (SSO) Enterprise support for a variety of Identity Providers using SAML 2.0 and/or JWT. For more information, see Cloud CMS Single Sign On (SSO). To learn more about this, please visit our Cloud CMS / Ping example configuration.

Score: 1.6138098

Gitana / 4.0 / Data Engine / Integrations / Ping

Ping Ping Identity provides security solutions for on-premise and SaaS based applications. Its PingOne product provides Identity and SSO solutions including support for the SAML 2.0 protocol which is supported by Cloud CMS. Cloud CMS provides Single Sign On (SSO) Enterprise support for a variety of Identity Providers using SAML 2.0 and/or JWT. For more information, see Cloud CMS Single Sign On (SSO). To learn more about this, please visit our Cloud CMS / Ping example configuration.

Score: 1.6138098

Gitana / 3.2 / Guide / Guide / User Interface

User Interface Cloud CMS provides a full user interface that your editorial team and managers use to create, manage and deliver content to the business, mobile applications and web sites. The user interface is secure, role-based and customizable, allowing your development team to cater the editorial experience to the exact needs of end users. Add-ons Awareness Dashboard Create/Edit Content Embed Media In CKEditor Favorites Multilingual Image Editor Locking Menu Projects Releases Search Security

Score: 1.6047778

Gitana / 3.2 / Guide / Guide / Docker / Container Services / Amazon ECS

Amazon ECS Amazon Elastic Container Service (ECS) is a fully managed container orchestration service that helps you to more efficiently deploy, manage, and scale containerized applications. It deeply integrates with the AWS environment to provide an easy-to-use solution for running container workloads within Amazon Web Services. For more information on Amazon ECS, please visit https://aws.amazon.com/ecs. Gitana SDK The code and configuration provided here references the samples provided in the G

Score: 1.5977507

Gitana / 3.2 / Guide / Guide / Integrations / Authy

Authy Cloud CMS provides out-of-the-box integration with Authy. Authy connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Authy, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Authy mobile application. This provides an additional security check in addition to the user's password. Authy and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure. For more information, s

Score: 1.5958464

Gitana / 4.0 / Data Engine / Integrations / Authy

Authy Cloud CMS provides out-of-the-box integration with Authy. Authy connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Authy, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Authy mobile application. This provides an additional security check in addition to the user's password. Authy and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure. For more information, s

Score: 1.5958464

The top 3 features that differentiate Cloud CMS from the competition

You have determined you need a Content Management System (CMS) and have begun the daunting task of reducing the number of CMS products to a manageable number to evaluate in depth. Having reached this article you are aware of, or interested in, CMSs that can be described as: Headless CMS, API First, Platform as a Service (PaaS), Decoupled CMS, Cloud-First. I am sure there are more beautiful categorizations and terminology provided by the latest analyst buzz. As much as I may not like the catagori

Score: 1.5561106

Gitana / 3.2 / Guide / Guide / Find

Find The Cloud CMS Find Service lets you discover and retrieve content using combinations of its three primary content retrieval mechanisms. These mechanisms are: Query (powered by Mongo DB) Search (powered by Elastic Search) Traversal (provides Graph Traversal) A "Find" operation provides a way for you to execute a single API lookup that runs one or more of the above and composes them into a single result set. How it Works When you make a "Find" call, you provide a recipe containing at least on

Score: 1.4827148

Gitana / 4.0 / Data Engine / Discovery / Find

Find The Cloud CMS Find Service lets you discover and retrieve content using combinations of its three primary content retrieval mechanisms. These mechanisms are: Query (powered by Mongo DB) Search (powered by Elastic Search) Traversal (provides Graph Traversal) A "Find" operation provides a way for you to execute a single API lookup that runs one or more of the above and composes them into a single result set. How it Works When you make a "Find" call, you provide a recipe containing at least on

Score: 1.4827148