Examples of using Authenticating in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Authenticating with your second factor.
Whoever's in the back's authenticating the program.
Authenticating Users with a SAMI Identity Provider.
Is this your job? Authenticating rare books?
For more information about constructing this header, see Authenticating Requests.
Appendix B: Authenticating Requests AWS Signature Version 2.
The resolver is now capable of authenticating DNS queries.
Technology authenticating citizens and/or companies common PKI environment.
They offer two alternate methods for authenticating your secret communication.
A method of authenticating a user, based on a secret shared between client and server.
Our legal basis is our legitimate interest in authenticating our users.
We use cookies for authenticating and maintaining secure sessions for logged-in users.
AWS CodeBuild supports Signature Version 4, a protocol for authenticating inbound API requests.
When authenticating your cURL calls with the-u or--user parameter, you can specify an email address and a password.
There was an error authenticating with the server: %1.
For detailed information about REST authentication, see Signing and Authenticating REST Requests.
Lower operating costs by authenticating consumers by their voice.
BER/DER encoding is applied in digital certificates, which are used for authenticating a user to a host.
Application security, including authenticating devices and users and verifying application authenticity.
There are also no standards for reliable data sources or for authenticating the approval networks.
After authenticating a user, you can retrieve other information about the user in the user pool, as shown in the following example.
One of the most common use case for PKIs is that of authenticating employees and devices against a company's IT infrastructure.
For example, you will note that while using some features of the TitaniumBay.com web site you will need to submit a password orsome other type of authenticating information.
From the universal use of the seal in ratifying and authenticating documents, and the writers of the OT and of the NT have derived a rich variety of figures.
If the API Keys Enabled box is checked, allmembers of that subscription will be able to create and use API Keys for authenticating with Work Item connectors.
HTTPS The HTTPS protocol is used for encryption and for authenticating communication between the web server(network camera) and browser(client PC) on the Internet.
Chen's team suddenly no longer has to deal with candidate lists andelections but with authenticating signatures and advising initiative committees.
The message broker is responsible for authenticating your devices, securely ingesting device data, and adhering to the access permissions you place on devices using policies.
When using custom authentication,a custom authorizer is responsible for authenticating your devices and providing an AWS IoT/IAM policy to authorize actions in your account.
The account partner is responsible for collecting and authenticating a user's credentials, building up claims for that user, and packaging the claims into security tokens.