영어에서 Authenticating 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Authenticating art?
Provide a password to use when authenticating.
Authenticating with Ampache.
Kubectl handles locating and authenticating to the apiserver.
Authenticating users on the ProxySG.
They handle locating and authenticating to the apiserver. example.
Authenticating the names of Carter's assassins.
It handles locating the apiserver and authenticating. Run it like this.
Authenticating Your Transcript/ Degree/ Diploma.
Kerberos is a system for authenticating users and services on a network.
Authenticating Facebook uploads for details.
The QID also provides an option for authenticating login on QNAP mobile apps.
See Authenticating Facebook uploads for details.
Auth- A cross-platform API for authenticating users and storing their accounts.
Authenticating with public key"imported-openssh-key".
The user no longer needs to enter a password when authenticating from that device.
Identity Crisis: Authenticating Users in Today's Changing Environment.
Offline authentication is a method of automatically authenticating without internet connection.
After authenticating the PIN, Secure Hub downloads the certificates.
The second mode is a Tunnel Mode for authenticating and encrypting the entire IP packet.
The present invention relates in general to a system and method for authenticating software.
Tool for authenticating the kubectl users with OpenId Connect.
However, that the HTTP and FTP options do not support local authenticating proxies.
Database for authenticating modem and ISDN connections and for tracking connection time.
Handle all the low-level details of communication with the server, including authenticating with Google.
Authenticating a system to meet network requirements may not be required but is often recommended.
Digital certificates can be kept in registries so that authenticating users can look up other users' public keys.
This usually means authenticating over SSL and continuing to use SSL until the session ends.
However, it was limited to unlocking the device, using the App Store,using iTunes, and authenticating the iCloud keychain only.
This is a simple method for authenticating standalone computers or any computers that are not using the Kerberos V5 authentication protocol.