Examples of using Authentication credentials in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Authentication credentials required.
The end goal of the attack is theft of authentication credentials.
You can change authentication credentials only on a WSUS server, not from a remote administration console.
These methods are not appropriate for sensitive data, such as authentication credentials.
Use the Edit Anonymous Authentication Credentials dialog box to change the account that IIS uses to access your sites and applications.
Allows the use of alternate authentication credentials.
Keep your devices safe and help themstay protected from malware attacks with our exclusive security chip that stores end users' authentication credentials.
A logic issue exists in Directory Services's verification of authentication credentials allowing a local attacker to bypass password validation.
To register to the Service, the user(the" User") shall complete theregistration process available on the Website and obtain their personal authentication credentials.
These options are also helpfulwhen Subversion has already cached authentication credentials for you, but you know they aren't the ones you want it to use.
For example, accepting authentication credentials(including a purported identity), performing queries against the authentication service, and returning results are common to Zend_Auth adapters.
ECS_ENGINE_AUTH_DATA, which contains the actual authentication credentials.
A client which insists on not transmitting authentication credentials in cleartext might, for example, be configured such that the value of this option is digest;
Fortunately, the Subversion client has a remedy for this-a built-in system for caching authentication credentials on disk.
Because the docker login command contains authentication credentials, there is a risk that other users on your system could view them this way.
To cancel an account,the Customer needs to send an e-mail or support ticket to our Sales Department and provide any authentication credentials requested by Net JA.
Displays the Edit Anonymous Authentication Credentials dialog box where you can set the security principle that anonymous users will use to connect to the site.
The 401 status code indicates that the HTTP request hasnot been applied because it lacks valid authentication credentials(usually username and password) for the target resource.
A remote attacker with valid authentication credentials could exploit this vulnerability to crash the Informix database server or execute arbitrary code within Informix database server process.
When creating a link to a remote file from variousapplications including Konqueror, the resulting URL may contain the authentication credentials used to access that remote resource.
If the account is valid and the authentication credentials are correct, the server uses the dial-in properties of the user account and network policies to authorize the connection.
Simulating communications from a website or service of another entity in order tocollect identity information, authentication credentials, or other information from the legitimate users of that entity's service;
It was discovered that ceph-deploy, a utility for deploying Red Hat Ceph Storage, would create the keyring file with world readable permissions,which could possibly allow a local user to obtain authentication credentials from the keyring file.
Using malware, DNS cache poisoning or other means to redirect a user to a website or other service that simulates a service offered by a legitimate entity in order tocollect identity information, authentication credentials, or other information from the legitimate users of that entity's service;
The Linksys WVC54GC wireless video camera insecurely sends initial configuration information over the network, which can allow a remote, unauthenticated attacker to intercept video streams,access wireless network authentication credentials, modify the device firmware, or cause a Denial-of-Service(DoS) to the video camera.
There's a known exploit in the authentication credential.