Found 229 results for "security authorities"
The search executed in 0.001508371 seconds. That's fast.
Gitana / 4.0 / Data Engine / Authentication / Multifactor AuthenticationMultifactor Authentication Cloud CMS supports Multifactor Authentication (MFA) to provide enhanced security for your users and their account credentials. With Multifactor Authentication is enabled for a user, that user will be required to supply a verification code in addition to their username and password. The verification code is delivered to the user's phone or mobile device via SMS, a phone call or an app. The code may also be delivered via a hardware device depending on the kind of provide
Score: 1.7502223
|
|
Gitana / 3.2 / Guide / Guide / Text Analysis / Text Analysis Providers / AWS ComprehendAWS Comprehend Handles the Text Analysis processing of elements in a textual payload using the Amazon Web Service Comprehend Service. The AWS Comprehend Service is described by: accessKey secretKey region Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Comprehend within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by buck
Score: 1.7120471
|
|
Gitana / 4.0 / Data Engine / Services / Text Analysis / Text Analysis Providers / AWS ComprehendAWS Comprehend Handles the Text Analysis processing of elements in a textual payload using the Amazon Web Service Comprehend Service. The AWS Comprehend Service is described by: accessKey secretKey region Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Comprehend within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by buck
Score: 1.7120471
|
|
Gitana / 3.2 / Guide / Guide / Narration / Narration Providers / AWS PollyAWS Polly Handles the generation of a Narration audio file for textual content using the AWS Polly Narration Service. The AWS Polly Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Polly within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketName) within
Score: 1.693506
|
|
Gitana / 3.2 / Guide / Guide / Optical Character Recognition / OCR Providers / AWS TextractAWS Textract Handles the Optical Character Recognition detection and analysis of characters in a binary payload using the Amazon Web Services Textract Service. The AWS Textract Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Textract within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the gi
Score: 1.693506
|
|
Gitana / 3.2 / Guide / Guide / Recognition / Recognition Providers / AWS RekognitionAWS Rekognition Handles the Image Recognition detection and analysis of elements in a binary payload using the Amazon Web Service Rekognition Service. The AWS Rekognition Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Rekognition within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given
Score: 1.693506
|
|
Gitana / 3.2 / Guide / Guide / Transcription / Transcription Providers / AWS TranscribeAWS Transcribe Handles the generation of a Transcription text file for audio content using the AWS Transcribe Service. The AWS Transcribe Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Transcribe within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketNa
Score: 1.693506
|
|
Gitana / 4.0 / Data Engine / Services / Narration / Narration Providers / AWS PollyAWS Polly Handles the generation of a Narration audio file for textual content using the AWS Polly Narration Service. The AWS Polly Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Polly within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketName) within
Score: 1.693506
|
|
Gitana / 4.0 / Data Engine / Services / Optical Character Recognition / OCR Providers / AWS TextractAWS Textract Handles the Optical Character Recognition detection and analysis of characters in a binary payload using the Amazon Web Services Textract Service. The AWS Textract Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Textract within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the gi
Score: 1.693506
|
|
Gitana / 4.0 / Data Engine / Services / Recognition / Recognition Providers / AWS RekognitionAWS Rekognition Handles the Image Recognition detection and analysis of elements in a binary payload using the Amazon Web Service Rekognition Service. The AWS Rekognition Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Rekognition within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given
Score: 1.693506
|
|
Gitana / 4.0 / Data Engine / Services / Transcription / Transcription Providers / AWS TranscribeAWS Transcribe Handles the generation of a Transcription text file for audio content using the AWS Transcribe Service. The AWS Transcribe Service is described by: accessKey secretKey region bucketName Where the accessKey and secretKey are used to identify an IAM principal who has sufficient authority to invoke AWS Transcribe within the given region. In addition, the IAM principal needs sufficient authorities to read, write and delete an S3 object from the given S3 bucket (identified by bucketNa
Score: 1.693506
|
|
Gitana / 3.2 / Guide / Guide / General / LockingLocking Cloud CMS supports locking of nodes (or content instances). Locking allows content editorial team members to explicitly block other editors from working on content that they're already working on. When a piece of content is locked by a user, all other users in the project who have access to the piece of content will be prohibited from making modifications. They will be able to read the content but they will not be able to save any modifications. Once the lock is released by the user who
Score: 1.669183
|
|
Gitana / 4.0 / Data Engine / Nodes / LockingLocking Cloud CMS supports locking of nodes (or content instances). Locking allows content editorial team members to explicitly block other editors from working on content that they're already working on. When a piece of content is locked by a user, all other users in the project who have access to the piece of content will be prohibited from making modifications. They will be able to read the content but they will not be able to save any modifications. Once the lock is released by the user who
Score: 1.669183
|
|
Gitana / 3.2 / Guide / Guide / Docker / Maintenance / Container HooksContainer Hooks This page describes the configuration of HTTP hooks that can be wired into your container orchestration framework to facilitate container lifecycle events (such as shutdown). Lifecycle Hooks Your container orchestration framework likely supports the ability to signal a running API container when one of the following occurs: A container has finished starting up. A container is about to be shut down. In the Kubernetes world, there are two lifecycle hooks (postStart and preStop). Th
Score: 1.6517248
|
|
Gitana / 4.0 / User Interface / OverviewUser Interface Documentation Welcome to the User Interface Documentation Gitana provides a full user interface that your editorial team and managers use to create, manage and deliver content to the business, applications and web sites. The user interface is secure, role-based and customizable, allowing your development team to cater the editorial experience to the exact needs of end users. Add-ons Embedded Media Modules Projects Security User Interface Workflow
Score: 1.6321822
|
|
Gitana / 3.2 / Guide / Guide / Overview_page Access Policies Actions Antivirus Scanning API API Keys Applications Application Server Attachments Auditing Authentication Binary Files Branches Bulk Import Command Line Conditions Content Modeling Cookbooks Deployment Docker Features Find Forms General GraphQL Integrations Multifactor Authentication Modules Narration Optical Character Recognition Platform Policies Projects Publishing Query Recognition Releases Reports Rules Scripting Search Security Single Sign On (SSO) Supported Stacks
Score: 1.6138098
|
|
Gitana / 3.2 / Guide / Guide / Integrations / PingPing Ping Identity provides security solutions for on-premise and SaaS based applications. Its PingOne product provides Identity and SSO solutions including support for the SAML 2.0 protocol which is supported by Cloud CMS. Cloud CMS provides Single Sign On (SSO) Enterprise support for a variety of Identity Providers using SAML 2.0 and/or JWT. For more information, see Cloud CMS Single Sign On (SSO). To learn more about this, please visit our Cloud CMS / Ping example configuration.
Score: 1.6138098
|
|
Gitana / 4.0 / Data Engine / Integrations / PingPing Ping Identity provides security solutions for on-premise and SaaS based applications. Its PingOne product provides Identity and SSO solutions including support for the SAML 2.0 protocol which is supported by Cloud CMS. Cloud CMS provides Single Sign On (SSO) Enterprise support for a variety of Identity Providers using SAML 2.0 and/or JWT. For more information, see Cloud CMS Single Sign On (SSO). To learn more about this, please visit our Cloud CMS / Ping example configuration.
Score: 1.6138098
|
|
Gitana / 3.2 / Guide / Guide / User InterfaceUser Interface Cloud CMS provides a full user interface that your editorial team and managers use to create, manage and deliver content to the business, mobile applications and web sites. The user interface is secure, role-based and customizable, allowing your development team to cater the editorial experience to the exact needs of end users. Add-ons Awareness Dashboard Create/Edit Content Embed Media In CKEditor Favorites Multilingual Image Editor Locking Menu Projects Releases Search Security
Score: 1.6047778
|
|
Gitana / 3.2 / Guide / Guide / Docker / Container Services / Amazon ECSAmazon ECS Amazon Elastic Container Service (ECS) is a fully managed container orchestration service that helps you to more efficiently deploy, manage, and scale containerized applications. It deeply integrates with the AWS environment to provide an easy-to-use solution for running container workloads within Amazon Web Services. For more information on Amazon ECS, please visit https://aws.amazon.com/ecs. Gitana SDK The code and configuration provided here references the samples provided in the G
Score: 1.5977507
|
|
Gitana / 3.2 / Guide / Guide / Integrations / AuthyAuthy Cloud CMS provides out-of-the-box integration with Authy. Authy connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Authy, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Authy mobile application. This provides an additional security check in addition to the user's password. Authy and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure. For more information, s
Score: 1.5958464
|
|
Gitana / 4.0 / Data Engine / Integrations / AuthyAuthy Cloud CMS provides out-of-the-box integration with Authy. Authy connects with Cloud CMS to offer real-time Multi-Factor Authentication. With Authy, users who log in to Cloud CMS are asked to additionally provide a code that is sent to their mobile phone or Authy mobile application. This provides an additional security check in addition to the user's password. Authy and Cloud CMS Multi-Factor Authentication work hand-in-hand to make your content platform more secure. For more information, s
Score: 1.5958464
|
|
The top 3 features that differentiate Cloud CMS from the competitionYou have determined you need a Content Management System (CMS) and have begun the daunting task of reducing the number of CMS products to a manageable number to evaluate in depth. Having reached this article you are aware of, or interested in, CMSs that can be described as: Headless CMS, API First, Platform as a Service (PaaS), Decoupled CMS, Cloud-First. I am sure there are more beautiful categorizations and terminology provided by the latest analyst buzz. As much as I may not like the catagori
Score: 1.5561106
|
|
Gitana / 3.2 / Guide / Guide / FindFind The Cloud CMS Find Service lets you discover and retrieve content using combinations of its three primary content retrieval mechanisms. These mechanisms are: Query (powered by Mongo DB) Search (powered by Elastic Search) Traversal (provides Graph Traversal) A "Find" operation provides a way for you to execute a single API lookup that runs one or more of the above and composes them into a single result set. How it Works When you make a "Find" call, you provide a recipe containing at least on
Score: 1.4827148
|
|
Gitana / 4.0 / Data Engine / Discovery / FindFind The Cloud CMS Find Service lets you discover and retrieve content using combinations of its three primary content retrieval mechanisms. These mechanisms are: Query (powered by Mongo DB) Search (powered by Elastic Search) Traversal (provides Graph Traversal) A "Find" operation provides a way for you to execute a single API lookup that runs one or more of the above and composes them into a single result set. How it Works When you make a "Find" call, you provide a recipe containing at least on
Score: 1.4827148
|