Examples of using To authenticate users in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
Analytics also uses Google Accounts to authenticate users.
To authenticate users and prevent fraudulent use of credentials;
Zoetis uses both passwords and usernames to authenticate users.
LSASS is used to authenticate users locally and also in client-server environments.
Secret file, or alternatively add the following option to authenticate users via PAP from the/etc/passwd file.
Security cookies used to authenticate users, prevent fraudulent use of login credentials, and protect user data from unauthorized parties.
Our security system includes protocols to authenticate users and to restrict access.
Before proceeding, verify that you have installed the RADIUS Server component of ESET Secure Authentication andcan access the RADIUS service that allows external systems to authenticate users.
We use an advanced Verisign SSL to authenticate users and data transfers.
We use these cookies to authenticate users and protect user data from unauthorized parties.
However, since the default login/password sequencedoes not occur it is necessary to authenticate users using either PAP or CHAP.
Select to configure your server to authenticate users who log on with a valid client certificate.
It not only stores access rights in the form of license entries,but also private keys which can be used to authenticate users instead of username/password combinations.
It will open a window with a form to authenticate users, however, so you can create a new account, you will need to follow the link"Create account".
The server provides authentication,authorization and accounting services using RADIUS and EAP protocols to authenticate users and then account for time and billing use of network services.
We use security cookies to authenticate users, prevent fraudulent use of login credentials, and protect user data from unauthorized parties.
CAS gives users access to multiple applications using a singlesign-on and allows web applications to authenticate users without giving them access to user passwords.
SSID 24 months We use security cookies to authenticate users, prevent fraudulent use of login credentials, and protect user data from unauthorized parties.
However, please note that if you opt out or adjust your browser to block all cookies(including essential cookies,such as cookies to authenticate users and prevent fraudulent use of user accounts), this may affect your visiting experience.
For instance,we use cookies to distribute requests among multiple servers, to authenticate users, and to determine what features of the site they can access, verify the origin of requests, keep track of information about a user's session and determine which options or pages to display in order for the site to function.
Digest authentication uses a Windows domain controller to authenticate users who request access to content on your server.
Description: Security cookies from Google to authenticate users, prevent fraudulent use of login information and protect user data from access by unauthorised persons.
If you plan to use your LDAP server to authenticate users, this tools may be very useful.
Com SSID 24 months We use security cookies to authenticate users, prevent fraudulent use of login credentials, and protect user data from unauthorized parties. analytical.
This scheme requires that a campus be able to authenticate users for access to a CGI script running on a web server.
Before your TMG Server can use the ESA Server to authenticate users via RADIUS, it must be set up as a RADIUS client on the ESA Server.
Before your Cyberoam® device can use the ESA Server to authenticate users via RADIUS, it must be set up as a RADIUS client on the ESA Server.
Google Analytics HSID,SID Functionality 2 years Security cookies used to authenticate users, prevent fraudulent use of login credentials, and protect user data from unauthorized parties.
APISID- Description: Security cookie from Google(here YouTube) to authenticate users, prevent fraudulent use of login information and protect user data from access by unauthorised persons.".
Pindrop, as one example, is creating and tracking“audio fingerprints” for security applications,specifically fraud prevention(to authenticate users and to help weed out imposters based not just on the actual voice but on all the other aural cues we may not pick up as humans but can help build a picture of a caller's location and so on).