Példák az Authentication methods használatára angolul és azok Magyar nyelvű fordításai
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
IIS 6.0 F1: Authentication Methods.
Authentication methods(can require username and password accessibility).
Dialog Box- Authentication Methods.
EAP is an authentication framework which supports multiple authentication methods.
Avoid using authentication methods based on IP addresses alone.
When using social media authentication methods.
Two authentication methods- Email authentication and Answer security questions.
Allows chaining of authentication methods.
If other authentication methods fail, ssh prompts the user for a pass- word.
Configure the relevant VPN Authentication Methods.
Custom authentication methods are implemented through an installable component.
EAP is an authentication framework that can support multiple authentication methods.
This reapplies the BitLocker authentication methods and deletes the clear key.
What will happen to the well-known SMS and GateKeeper authentication methods?
All authentication methods available with Internet Banking can also be used for Mobile Banking except for chipcards.
This only affects particular versions of the software, when used with these authentication methods.
OpenSSH can use many authentication methods, including plain password, public key, and Kerberos tickets.
The new authentication method will replace our SMS and GateKeeper authentication methods.
The use of common data structure, formats and authentication methods for describing qualifications would support this objective.
Popular Apple analyst, Ming-Chi Kuo made a bold prediction thatiPhones in 2021 will have two biometric authentication methods.
We have seen much better authentication methods than passwords, yet too many Web sites still use password-based log-ins.
Users with client certificates can be mapped;users without client certificates can use other authentication methods.
With Adobe Sign, multiple authentication methods can be applied to guarantee the identity of people signing documents.
Secure Socket Tunneling Protocol(SSTP) and Internet Key Exchange version 2(IKEv2)-based virtual private networks(VPNs) use certificate-based authentication methods.
Creating multiple authentication methods increases the chance that a common method between two computers can be found.
Printing, copying and scanning starts only after the user has logged in at a selected device,using different authentication methods according to security requirements.
Project Server 2010 supports two authentication methods for its users(Windows authentication and forms-based authentication). .
EAP provides authentication methods that use security devices, such as smart cards, token cards, and crypto calculators.
Project Server 2010 supports two authentication methods for its users(Windows authentication and forms-based authentication). .
L2TP employs user-level PPP authentication methods and computer-level certificates with IPSec for data encryption.