Примеры использования Authentication protocol на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
Specifies the authentication protocol.
EAP-TLS is the original, standard wireless LAN EAP authentication protocol.
Although deprecated, Password Authentication Protocol(PAP) is still sometimes used.
Judging by the name of the function,it is associated with a network authentication protocol.
Challenge Handshake Authentication Protocol(CHAP).
Advanced Encryption Services(AES 128 and 256) support for the Kerberos authentication protocol.
You should use this authentication protocol only if you must support PAP remote access clients.
The basic level is based on the Challenge Handshake Authentication Protocol(CHAP).
RFC 1994 describes Challenge-Handshake Authentication Protocol(CHAP), which is preferred for establishing dial-up connections with ISPs.
The method isa SASL method and requires"immediate" parameters in the authentication protocol command.
Specifies whether the server uses the Password Authentication Protocol(PAP) to authenticate remote access and demand-dial connections.
This service also uses the OpenVPN security protocol butwith an AES 256-bit encryption and SHA512 authentication protocol.
Enable EAP as an authentication protocol on the network access server. For more information, see your network access server documentation.
While we're at it,I would like to create a two-stage authentication protocol for any future changes.
If Use any authentication protocol option is selected, delegation is allowed with any available authentication protocol. .
These security settings will determine which challenge/response authentication protocol is used for network logons.
Select CHAP(Challenge Handshake Authentication Protocol) to restrict iSCSI access to initiators that supply the correct account name and password.
When required to run the task, the Task Scheduler service will use the“Service-for-User”(S4U) extensions to the Kerberos authentication protocol to retrieve the user's token.
The Lightweight Extensible Authentication Protocol(LEAP) method was developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard.
Use this tab to specify whether encryption is required and the authentication protocol that is used to exchange credentials.
If you are using the MS-CHAP v2 authentication protocol, you cannot manipulate the User Name attribute if the connection request policy is used to forward the RADIUS message.
When it is enabled, IKE must reauthenticate identities,increasing overhead for domain controllers when the Kerberos V5 authentication protocol is used for authentication. .
If you want to use Challenge Handshake Authentication Protocol(CHAP) authentication when connecting to the target, select the CHAP login information check box.
To keep data secure while it is in transit between sites,RPC over IP replication uses both authentication(with the Kerberos version 5(V5) authentication protocol) and data encryption.
Addison discovered that Jasig phpCAS,a PHP library for the CAS authentication protocol, did not encode tickets before adding them to an URL, creating a possibility for cross site scripting.
A public key certificate should be used in situations that include Internet access, remote access to corporate resources,external business partner communications, or computers that do not run the Kerberos V5 authentication protocol.
One need not venture far for the examples,- Kerberos, encryption of Microsoft Office documents, PPTP VPN,NTLM authentication protocol, SysKey, EFS encryption in Windows 2000, RNG implementations in Windows 2000/XP/Vista.
If you are using the MS-CHAP v2 authentication protocol, you cannot manipulate the User Name attribute if the connection request policy is used to forward the RADIUS message.
The key negotiation protocol in 802.11i specifies that, for 802.1X-based authentication, the client is required to renegotiate its key with the RADIUS orother authentication server supporting Extensible Authentication Protocol(EAP) on every handoff, a time consuming process.
SNMPv3 Account- user name,context, authentication protocol, authentication key, privacy protocol, and privacy key for an SNMP version 3 device.