{"id":3206,"date":"2014-03-14T15:54:59","date_gmt":"2014-03-14T14:54:59","guid":{"rendered":"http:\/\/dhd-blog.org\/?p=3206"},"modified":"2014-03-14T15:54:59","modified_gmt":"2014-03-14T14:54:59","slug":"dasish-online-trainingmodul-zu-authentication-and-authorization-infrastructures-aai","status":"publish","type":"post","link":"https:\/\/dhd-blog.org\/?p=3206","title":{"rendered":"DASISH Online-Trainingmodul zu &#8222;Authentication and Authorization Infrastructures (AAI)&#8220;"},"content":{"rendered":"<p>Das Projekt <a href=\"http:\/\/dasish.eu\" target=\"_blank\">DASISH <\/a>(Data Service Infrastructure for the Social Sciences and Humanities) hat sein zweites Online-Trainingsmodul ver\u00f6ffentlicht, mit dem Thema &#8222;Authentication and Authorization Infrastructures (AAI)&#8220;.\u00a0 Genutzt werden kann es hier:<\/p>\n<p><a href=\"http:\/\/training.dasish.eu\/training\/2\/\" target=\"_blank\">DASISH AAI Training module<\/a><\/p>\n<p>Die englischsprachigen Webseiten bieten mit gesammelten Informationen und Beispielen sowie weiterf\u00fchrenden Links eine Einf\u00fchrung in Themen wie Digital Identities, Access control, Federated Identity Management, eduGAIN, eduroam, Shibboleth etc. Auf derselben Seite ist auch das erste DASISH Trainingsmodul zum Thema &#8222;<a href=\"http:\/\/training.dasish.eu\/training\/1\/\" target=\"_blank\">Access Policies and Licensing<\/a>&#8220; verf\u00fcgbar.<\/p>\n<p>Die Autoren freuen sich \u00fcber Anregungen und Feedback <a href=\"mailto: training@dasish.eu\" target=\"_blank\">per email<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Das Projekt DASISH (Data Service Infrastructure for the Social Sciences and Humanities) hat sein zweites Online-Trainingsmodul ver\u00f6ffentlicht, mit dem Thema &#8222;Authentication and Authorization Infrastructures (AAI)&#8220;.\u00a0 Genutzt werden kann es hier: DASISH AAI Training module Die englischsprachigen Webseiten bieten mit gesammelten Informationen und Beispielen sowie weiterf\u00fchrenden Links eine Einf\u00fchrung in Themen wie Digital Identities, Access control, [&hellip;]<\/p>\n","protected":false},"author":88,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[388,387,389],"class_list":["post-3206","post","type-post","status-publish","format-standard","hentry","category-forschungsinfrastruktur","tag-aai","tag-dasish","tag-foederation"],"_links":{"self":[{"href":"https:\/\/dhd-blog.org\/index.php?rest_route=\/wp\/v2\/posts\/3206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dhd-blog.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dhd-blog.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dhd-blog.org\/index.php?rest_route=\/wp\/v2\/users\/88"}],"replies":[{"embeddable":true,"href":"https:\/\/dhd-blog.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3206"}],"version-history":[{"count":3,"href":"https:\/\/dhd-blog.org\/index.php?rest_route=\/wp\/v2\/posts\/3206\/revisions"}],"predecessor-version":[{"id":3209,"href":"https:\/\/dhd-blog.org\/index.php?rest_route=\/wp\/v2\/posts\/3206\/revisions\/3209"}],"wp:attachment":[{"href":"https:\/\/dhd-blog.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dhd-blog.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dhd-blog.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}