Примеры использования Authentication mechanisms на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Attacks targeted to authentication mechanisms.
Authentication mechanisms used by ONC RPC are described in RFC 2695, RFC 2203, and RFC 2623.
OS/400 systems The user profile authentication mechanisms are used.
Strong authentication mechanisms will be used at critical points with encryption as appropriate for communication of critical financial data.
Unix-based systems The passwd and shadow or other OS-supported authentication mechanisms are used.
Where other authentication mechanisms are used(for example, physical or logical security tokens, smart cards, certificates, etc.), use of these mechanisms must be assigned as follows.
OpenVMS systems The supplied user name and password strings are converted to uppercase, andthen the OpenVMS authentication mechanisms are used.
When a trust exists between two Active Directory forests, the authentication mechanisms for each forest trust the authentications that come from the other forest.
The holder submits the declaration by electronic means to the Customs office of departure, making reference to a guarantee issuedby a Guarantee Chain, using authentication mechanisms.
In Debian LTS(squeeze),the fix for CVE-2015-5600 in openssh 1:5.5p1-6+squeeze7 breaks authentication mechanisms that rely on the keyboard-interactive method.
Switch DES-3810 Series supports authentication mechanisms such as 802.1X, Access Control Web-based interface(WAC) and Access Control MAC-based, easy deployment.
Finally, the proposed convention called on States to take a non-discriminatory approach to authentication mechanisms as implemented in other countries.
People relying on keyboard-interactive based authentication mechanisms with OpenSSH on Debian squeeze(-lts) systems are recommended to upgrade OpenSSH to 1:5.5p1-6+squeeze7.
The holder submits the advance cargo information by electronic means to the Customs office of departure, making reference to a guarantee issuedby a Guarantee Chain, using authentication mechanisms.
Switch The DES-3810 supports authentication mechanisms such as 802.1X, access control to Web-based interface(WAC) and Access Control MAC-based, providing ease of deployment.
This authentication mode lets you manage client registration and authentication at the application level,instead of relying on the authentication mechanisms provided by the operating system.
The DGS-3120 Series supports authentication mechanisms such as 802.1X, Web-based Access Control(WAC), and MAC-based Access Control(MAC) for strict access control and easy deployment.
Chapter 2.1.2.4.2, stipulates“that the holder submits the declaration by electronic means to the Customs office of departure, making reference to a guarantee issuedby a guarantee chain, using authentication mechanisms.
It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL.
Examine authentication policies andprocedures to verify that procedures for using authentication mechanisms such as physical security tokens, smart cards, and certificates are defined and include.
Authentication mechanisms such as 802.1X, Web-Based Access Control(WAC), MAC-Based Access Control(MAC), or a combination; provide extra flexibility for client identity control.
The survey on the use of electronic signatures in the framework of the eTIR project confirmed that most countries require the use of electronic signatures or other authentication mechanisms for the transmission of advance cargo information.
Windows NT token- based applications may be used by Windows users from the local realm or from any realm that is trusted by thelocal realm- that is, only by users who can log on to the computer with Windows NT token- based authentication mechanisms.
Finally, the Expert Group requested the secretariat to redraft a proposal to include international declarations mechanisms in the eTIR Reference Model for its next meeting,underlining that a realistic proposal should be based on authentication mechanisms(e.g. user/password) and trusted system-to-system information exchanges(e.g. Virtual Private Network), rather than on electronic signatures.
Assignment(FIA_UAU.4.1) Identified authentication mechanism(s): any authentication mechanism.
The authentication mechanism for the URL Group can be set at this point.
From the Configure 802.1X Authentication dialog, select an authentication mechanism.
The combination of the first andsecond factors raises the authentication mechanism in terms of security.
By default, Windows Authentication(the most secure authentication mechanism) is enabled.
There were given examples of realizing message exchange between the client andthe server as well as the authentication mechanism used in the project.