Examples of using User's credentials in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
Raised when the user's credentials have been changed.
The process of validating a user's credentials.
The user's credentials are the user name and their password.
Specifies the mechanism that is used to authenticate the user's credentials.
The app saves the user's credentials safely and under encryption in third-party servers.
If the client also has GSSAPIDelegateCredentials enabled, the user's credentials are made available on the remote system.
forward authentication requests to the server that holds the user's credentials.
Always use the authenticated user's credentials when validating access to the network resource.
as they can be printed with the user's credentials and the organisation's logo.
When you use CredSSP authentication, the user's credentials are passed to a remote computer to be authenticated.
the remote computer might not be able to authenticate the user's credentials.
Caution: CredSSP authentication delegates the user's credentials from the local computer to a remote computer.
Specify the user's credentials that are used to connect to the Windows Event Collection Service
the directory-enabled application must present the user's credentials to AD LDS for authentication, or binding.
After the account store verifies a user's credentials, the claims for the user are generated according to the rules of the trust policy.
The Federation Service also provides a Web page that prompts for the user's credentials, such as a user name and password for forms-based authentication.
Because the user's credentials travel via a number of intermediate servers, not under the control of the home institution of the user, it is important that the credentials are protected.
effective than keylogger software because it will acquire the user's credentials even if they are input using virtual keyboard,
As this particular implementation provides only weak protection of the user's credentials, additional protection, such as IPsec tunnels
used to gain access to user data, or used to gain access(with the user's credentials) to the website to which the cookie belongs see cross-site scripting
The account partner is responsible for collecting and authenticating a user's credentials, building up claims for that user, and packaging the claims into security tokens.
The User name and Password boxes are not available if the Always use the authenticated user's credentials when validating access to the network directory
A user's iCloud credentials for a target device are not up-to-date;
This user's security credentials are used when the application is authenticated to access resources.