<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://securite-applicative.dufau.re/docs/authentification/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/https/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/failles/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/intro/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/intro/grands-principes/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/failles/intro/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/failles/serveur/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/failles/client/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/failles/cookies/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/failles/synthese/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/https/fonctionnement/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/https/pratique/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/principes/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/java/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/js/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/ldap/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/tomcat/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/oidc/oidc/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/oidc/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/oidc/oidc-java/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/oidc/oidc-js/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/oidc/keycloak/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/authentification/saml/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/contributors/clement-dufaure/</loc><lastmod>2020-10-06T08:50:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/</loc><lastmod>2020-10-06T08:50:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/contributors/</loc><lastmod>2020-10-06T08:50:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://securite-applicative.dufau.re/docs/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>