Примеры использования Are authenticated на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
Codes are authenticated.
The computation layer would gain certainty that all users transacting are authenticated and legitimate.
Respondents are authenticated on the system with a username and password.
In addition, the message and sender are authenticated by signing the payload.
In addition to the encryption of traffic between the DirectAccess client and server over the Internet, the end-to-end for selected servers access model alsoensures that communications between the DirectAccess client and internal network servers are authenticated and protected.
Local Windows security principals are authenticated by the local computer.
These streams are 8-bit clean, and are authenticated and secured through the same streaming library that SAM uses, but there is a nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have their own unique I2P destination and their own set of tunnels, keys, etc.
DNSSEC does not provide confidentiality of data; in particular,all DNSSEC responses are authenticated but not encrypted.
Outgoing signals are authenticated as coming from the Task peer(i.e. the sender of the REFER signal).
If shaping or quota rule applies to User Set,it can work only if those users are authenticated by ISA/TMG.
Outgoing signals are authenticated as coming from the current Account; this is the default value.
Accepted community names:Lists the community names whose member SNMP hosts are authenticated to send SNMP requests to this computer.
You can separately configure which VPN types are supported,how users are authenticated and authorized to access the remote access server, and what IP configuration the remote computer receives when it connects.
Your usernames and passwords are saved in your iCloud/ Apple ID account andare available on all Apple devices that are authenticated to the same account.
Determines if certain Enterprise respondents are authenticated if an account holder requires respondents to authenticate. .
It is, however, much more comfortable to have one self-contained application, than looking in the conversationtab's browser WhatsApp Messenger. An interesting thing is that when you are authenticated in desktop application, in the mobile application, at Settings>
Secure dynamic update restricts DNS zone updates to only those computers that are authenticated and joined to the Active Directory domain where the DNS server is located and to the specific security settings that are defined in the access control lists(ACLs) for the DNS zone.
Forwarding Request is configured so thatconnection requests are authenticated and authorized on the local NPS server.
When you deploy 802.1X authenticating switches, wired access allows you to secure your network by ensuring that intranet users are authenticated before they can connect to the network or obtain an IP address using DHCP.
It is, however, much more comfortable to have one self-contained application, than looking in the conversationtab's browser WhatsApp Messenger. An interesting thing is that when you are authenticated in desktop application, in the mobile application, at Settings> Web WhatsApp the"logged in computers"Icon appears in Google Chrome.
The Request sender is authenticated with your Server.
When a user is authenticated via the"login page", a virtual session is created.
When a user is authenticated, the XIMSS module creates a XIMSS session.
DNA is authenticated at every stage.
These e-mails been authenticated?
Once the Software Activation Key is authenticated, the Internet connection is no longer needed.
When he's authenticated the codes, I will make a call and get your diamonds.
In all samples above, the user is authenticated as jsmith, using the jsmith account password.
All inbound network connections must be authenticated or they fail.
Com account, then the LDAP client is authenticated with the following Bind DN.