Примеры использования Authentication methods на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Inbound Authentication Methods.
Click the Constraints tab, and then click Authentication Methods.
All other authentication methods are disabled.
The XMPP module supports all available SASL authentication methods.
Supported data authentication methods(SDA, DDA, CDA);
Aspects for consideration of electronic authentication methods 10.
What other authentication methods would you like to see supported?
Deploy components for authentication methods.
In some authentication methods empty passwords were accepted.
Deploy components for authentication methods.
Built-In authentication methods are integral parts of the FTP server.
Allows chaining of authentication methods.
Deploying authentication methods with the same type creates a security vulnerability.
This method works only with Clear Text authentication methods.
Specifies the authentication methods that are used to establish the VPN.
Users without client certificates can use other authentication methods.
Custom authentication methods are implemented through an installable component.
It also supports file transfers,chat functionality and various authentication methods.
Any authentication methods specified in Second authentication are ignored.
However, most of these bodies now use client authentication methods, as described below.
These authentication methods can be enabled or disabled, but cannot be removed from the FTP server.
Setting transactional limits or additional authentication methods could make sense.
To change the authentication methods used by this rule, select the Authentication tab.
For each rule, you must also specify filter actions, authentication methods, and other settings.
On the Authentication Methods tab, select the appropriate method or click Add to add a new method. .
The LDAP module allows users to employ all authentication methods supported with the CommuniGate Pro Server.
Compatibility of the eTIR legal framework with national legal requirements:survey on electronic authentication methods.
Use impersonation with other IIS authentication methods or set up an arbitrary user account.
Authentication methods are configured on the Authentication Methods tab of the Edit Rule Properties or Add Rule Properties property sheets.
For more information about creating and using authentication methods, see IPsec Authentication. .