영어에서 Authentication information 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
If authentication information is needed.
Interface 900 may be configured to receive user authentication information.
Please enter authentication information for %1.
Such data mayinclude information about your hardware and software environment, username or other authentication information.
Authentication information associated with the AWS account owner.
The remember password feature stores all required authentication information in the cookie itself.
The authentication information of the user is sent to the second social-networking service.
That instance will have to know your API authentication information consisting of your account username and API key.
Main authentication information(iris, face) registering devices(access control system or PC camera) can be selected.
In either case, to be authenticated, the first user may provide authentication information to the second social-networking site.
At block 1670, authentication information of the user is sent to the second social-networking service.
The third party card provider typically at this time requires authentication information to activate and/or load the stored value card.
The Upload Manager then initiates the Upload Server Authentication process[1020] to connect to the Central Network Server[1025] and provides valid authentication information.
Please enter authentication information for: Server %1 Share %2.
In the process of signing on to a first social-networking site, a user may provide authentication information to the first social-networking site server 1204.
At step S952, this authentication information is read out to execute the authentication process.
Moreover, the switch supports 802.1X authentication, which is used in conjunction with a RADIUS server to require some authentication information before access to the network is allowed.
We may also collect authentication information(for example, to verify that you are an authorized credit card holder).
Moreover, the switch supports 802.1X authentication, which is used in conjunction with a RADIUS server to require some authentication information before access to the network is allowed.
In some embodiments, the user may enter authentication information at a user interface, such as interface 900, that is presented at a first social-networking site.
The most interesting capability exposed by both XmlHttpRequest and Access Control is the ability to make« credentialed» requests that are aware of HTTP Cookies and HTTP Authentication information.
Credentials are the authentication information that must be provided to allow you access to external data.
Recording and archiving“all significant events concerning the use and management of user identities and secret authentication information” and protecting those records from“tampering and unauthorized access.”.
For example, authentication information included in a sighting message may include secret codes, certificates, or hash data that is shared between the proximity broadcast receiver and the central server 120.
General User and Device Data Collected by Software In connection with its core enterprise mobility management functions, the Software collects user and device data such as the following:Identity and Authentication Information.
A SQL Server credential is an object that is used to store authentication information required to connect to a resource outside of SQL Server.
Requests with credentials The most interesting capability exposed by both XMLHttpRequest or Fetch and CORS is the ability to make"credentialed" requests that are aware of HTTP cookies and HTTP Authentication information.
Apps that use the Workspace ONE SDK collect and transmit certain data back to VMware, such as identity and authentication information and device information as described above, as well as crash reporting data and analytics data as described below.
If you login or register on any of our websites using credentials of a third party social media network such as Facebook or Twitter,you authorize us to collect your authentication information, which is generally limited to your name/username, e-mail address.
Where a rogue CSM attempts to mimic CSM 420(even providing a user interface that prompts the user to input authentication information), the rogue CSM would not be able to definitively determine what visual credential the user previously selected, and thus is unlikely to present to the user that user's particularly selected visual credential during CSM registration.