Examples of using Authentication methods in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Windows Authentication Methods.
Some services are enabling easier authentication methods.
Avoid using authentication methods based on IP addresses alone.
Electronic signature and authentication methods.
Other authentication methods may reduce performance of your Wi-Fi network.
Electronic signature and authentication methods.
Multiple authentication methods, including PAM, LDAP and SQL.
Cross-border use of electronic signature and authentication methods.
(d) A range of authentication methods in use.
Currently, fraudsters can easily dodge existing authentication methods.
Rather, it's one of many authentication methods working together to maximize security.
PostgreSQL offers a number of different client authentication methods.
The Blogger API supports three authentication methods: AuthSub, ClientLogin and OAuth.
Currently, fraudsters can easily get around existing authentication methods.
There are three supported authentication methods: crc, md5 and sha1.
Part Two Cross-border use of electronic signature and authentication methods.
Support different authentication methods of database servers such as GSSAPI authentication. .
Cross-border use of electronic signature and authentication methods(continued).
Support different authentication methods of database servers such as GSSAPI authentication. .
Part Two Cross-border use of electronic signature and authentication methods(continued).
Biometric authentication methods have been widely used to control financial transactions and access to secure areas.
Best practice on passwords and other authentication methods should be followed.
Creating multiple authentication methods increases the chance that a common method between two computers can be found.
SOCKS5 is the latest version of the SOCKS protocol andadds various authentication methods.
Kubernetes has several built-in authentication methods that it supports.
Log or/var/log/secure: store authentication logs,including both successful and failed logins and authentication methods.
In this section, we will look at how each of these authentication methods works and how that information is encoded into a SOAP message.
Legal incompatibilities may arise because the laws of different jurisdictions impose different requirements in relation to the use andvalidity of electronic signature and authentication methods.
For more information about the available second authentication methods, see Dialog Box: Add or Edit Second Authentication Method. .
The lack of common standards for cross-border recognition of electronic signatures andother authentication methods is considered to be a significant impediment to cross-border commercial transactions.