Examples of using Authentication of users in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Authentication of users for a secured login;
Information Cards are used for identity management on the internet and authentication of users to web sites.
Authentication of users for a secured login;
The only function of Kerberos is to provide the secure authentication of users and servers on the network.
Authentication of users is not performed by the service, i.
This criterion appliesonly when the software is enforcing authentication of users using passwords, such as server-side web applications.
Authentication of users with remote access cryptographic techniques, VPN solutions.
The"eID-Service" provides services for the secure electronic identification and authentication of Users and legal persons.
Access management: authentication of users via charge card RFID.
Serves the easy connection of Across Clients to the Across Server and the authentication of users against the Server.
Secure authentication of users and administrators is especially important for cloud and web applications.
Many parties are interested in the unique identification and authentication of users who access electronic services.
Cross-border identification and authentication of users will gradually become possible over the next few years via the interoperability of eIDs.
More information about the technical background of the authentication methods can be obtained on page Authentication of users.
In combination with the certificate-based authentication of users, an optimal access protection is therefore guaranteed for centrally stored information.
Institutions Directory Services Windows is an IT Center-supervised service for the authentication of users in a network.
Devices equipped with ELATEC modules allow the authentication of users irrespective of the transponder technology utilised by the end customer's existing RFID environment.
At the beginning of 2009, it was decided by Euronics touse the JAVA chip in future for the secure authentication of users by means of the Novell Client on the Novell eDirectory and on the Microsoft Active Directory.
As the AD Kerberos infrastructure is used for the authentication of users in this mode, it is essential that the system times of UCS and the AD domain controller are synchronized with a tolerance of 5 minutes.
In future, the functions for the certificate-based authentication of users on the IT systems and the digital signature and encryption of documents will be provided by the Java chip.
The digital certificates, which are necessary for the 2-factor authentication of users of the network, are requested via an interface to Microsoft Windows Server 2003 Enterprise CA Certificate Authority.
It could allow remote attackers to hijack the authentication of arbitrary users under certain conditions.
The implementation of the access rights and the authentication of the users is managed with a central directory service of the company.
We developed the first application enabling the authentication of printer users using a card reader- the predecessor of the current Print Roaming module.
Save and retrieve encrypted documents√ Exchange of documents betweenauthenticated users√ the management of the key pairs of a user√ Authentication of foreign users.