Examples of using Authentication mechanisms in English and their translations into French
{-}
-
Colloquial
-
Official
Compliance of authentication mechanisms;
Authentication Mechanisms Vulnerable to Active Attacks.
Compliance of authentication mechanisms;
Authentication Mechanisms Vulnerable to Passive Attacks.
O A Survey of Authentication Mechanisms[29.
Authentication mechanisms can be used by a state agent.
Auth0 and similar authentication mechanisms.
SIP authentication mechanisms are discussed in SIP[1.
Biometry and other authentication mechanisms.
New authentication mechanisms for information systems.
IDs do not include any type of biometric authentication mechanisms.
Usage of RSVP authentication mechanisms is encouraged.
This does not include any type of biometric authentication mechanisms.
Knowledge of authentication mechanisms(Radius, Tacacs, etc.);
Gauging the relative strengths of different authentication mechanisms.
Support of authentication mechanisms for the connectionless mode.
Exploting the weaknesses of session IDs and authentication mechanisms.
Additional authentication mechanisms are described in[RFC1734.
The second solution proposes e-Passport authentication mechanisms.
Negotiate non-EAP authentication mechanisms, such as PAP or CHAP.
Some extensions also let MediaWiki make use of external authentication mechanisms.
Good knowledge of authentication mechanisms for APIs;
Authentication mechanisms and access guards for configurations.
String If set,lists the authentication mechanisms to consider.
The authentication mechanisms are non-standard and quite idiosyncratic.
Financial companies require tight integration with existing authentication mechanisms.
Disclosing authentication mechanisms are vulnerable to replay attacks.
The simple authentication method of the Bind Operation provides three authentication mechanisms.
All SASL authentication mechanisms are explicitly allowed within LDAP.
Authorized staff utilize multi-factor authentication mechanisms to access data centers.