Примеры использования Authentication key на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Authentication Key lock key or password.
Next, you will be asked to input a second-factor authentication key.
After inputting the authentication key, press"Submit.
Next, you will be asked to input the second-factor authentication key.
Specifies whether the authentication key is sent automatically.
We create trust by assigning every component in the network an authentication key.
The SRP ID and SRP Authentication Key register and authenticate the BlackBerry Enterprise Server on the network.
The SRP ID can be thought of as a login name and the Authentication Key as a password.
You can create a RSA authentication key to be able to log into a remote site from your account, without having to type your password.
There are no clear text secrets anywhere on the drive, just a fingerprint(hash) of the authentication key.
Secure erase-only mode means that the owner needs no authentication key or password to decrypt and read data.
Only the authentication key must be tracked or managed, and it can be securely backed up, replicated and mirrored in disaster-recovery centers.
The system maintains a centralized database of wireless user's access information such as their MAC addresses and authentication keys.
The storage system gets the authentication key from the key management service and sends it to the correct locked drive.
SRP Authorization Key During BlackBerry Enterprise Server installation,the unique Server Routing Protocol Identifier(SRP ID) and SRP Authentication Key must be entered.
Session and authentication keys are contextually bound to the operations which they are semantically required to perform, and may not be exported.
By constantly monitoring the AP status,the switch can establish AP-to-AP roaming for these users without requiring them to re-establish authentication keys.
The authentication key can be changed as often as desired, such as when an administrator leaves the company, without requiring re-encryption.
By constantly monitoring the APs status,the switch can establish an AP-to-AP roaming for these users without requiring them to re-establishing authentication keys.
Regular use of preshared key authentication is not recommended because the authentication key is stored in an unprotected state in the IPsec policy.
When the owner acquires the drive, this embedded encryption key is in clear text form and will remain so until the drive is put in auto-lock mode,where an authentication key is introduced.
When the SED is in normal use, its owner need not maintain authentication keys(otherwise known as credentials or passwords) in order to access the drive's data.
Later, perhaps due to growing concerns over theft, the owner may elect to use the SED in auto-lock mode for the remainder of the owner's use of the drive,by simply creating an authentication key that wraps the existing encryption key. .
SNMPv3 Account- user name, context,authentication protocol, authentication key, privacy protocol, and privacy key for an SNMP version 3 device.
The lifecycle of authentication keys can be managed by the IBM Tivoli Key Lifecycle Manager(formerly Encryption Key Manager), which is a Java-based software program that centrally generates, protects,stores and backs up authentication keys.
In addition to its traditional functions, the storage system also defines secure volume groups,obtains the authentication keys from the key management service and passes the key to the correct drive.
The owner must then establish an authentication key by first entering the SID(Security ID, proof of ownership) from the drive's external label, then setting the authentication key, which is used by the drive to encrypt the encryption key. .
If the BlackBerry Enterprise Server is connected to the BlackBerry Infrastructure andanother server attempts to connect using the same SRP ID and Authentication Key, the BlackBerry Infrastructure drops the connection to the BlackBerry Enterprise Server.
If the two hashes match, the drive is then unlocked, andthe drive uses the authentication key it received from the storage system to decrypt a copy of the encryption key(which was previously encrypted with the authentication key) that's stored in a secure area of the disk.
A data center containing auto-locking Self-Encrypting Drives utilizes akey-management service that stores, manages and serves authentication keys, and a storage system that passes these authentication keys to the correct drive see Figure 3.