Приклади вживання Authentication information Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Providing Authentication Information.
Online registration information(such as your password and other authentication information).
We may collect authentication information.
Whenever possible, register your computerto avoid having to re-enter challenge questions and other authentication information with each login.
Please enter authentication information for %1.
Online registration information(for example, your password and other authentication information on the site);
Please enter authentication information for: Server= %1 Share= %2.
Because the browser always first sends the whole uploaded file to the server andthen get the authentication information, it would send the file twice.
Describes how authentication information may be obtained from the Directory;
With the TUV logo, not only to guarantee the quality and safety factors of products,but also provide other authentication information, such as human engineering etc….
To give the browser the authentication information first, the file_op.
Additional mechanisms MAY be used, such as encryption at the transport level or via message encapsulation,and with additional header fields specifying authentication information.
Unauthorized access- using the User Authentication information by the third party.
Remember authentication information(when you created an account on the site and logged in);
The widget accepts the user's authentication request,displays the actual authentication information, provides the possibility of authentication through popular social networks.
We may also collect authentication information(for example, to verify that you are an authorized credit card holder).
Kerberos session tickets contain a unique session keycreated by the KDC to use for symmetric encryption of authentication information and data transferred between the client and server.
HTTP/1.1 allows a client to pass authentication information to and from a proxy via the Proxy-Authenticate and Proxy-Authorization headers.
Here is were the users choose or are assigned an ID and password or other authentication information that allows them to access to information and program within their authority.
Defines three ways in which applications may use this authentication information to perform authentication and describes how other security services may be supported by authentication. .
The options in the Network configuration tab can be used to change the lookup method for the browse list and to make& smb4k;send authentication information when querying the workgroup master browsers. If you want to adjust the behavior of Samba programs(such as nmblookup 1, net 8, or smbclient 1), see the Samba section.
If an application is run in client/server mode and authentication information is sent across the network in clear text, this same authentication information can probably be used to gain access to other corporate resources.
Users select or assign IDs and passwords or other authentication information to allow them to access information and programs within their scope of authority.
Users will beable to connect through the application without providing any additional information after initial authentication.
You can find more information about additional authentication methods by contacting the bank that issued your card.
Two-factor authentication involves providing extra information before logging in- for example, an access code sent by text message.
(a) ensure that the procurement is conducted using information technology systems and software,including those related to authentication and encryption of information, that are generally available and interoperable with other generally available information technology systems and software; and.