Examples of using Authentication data in English and their translations into Korean
{-}
- 
                        Colloquial
                    
- 
                        Ecclesiastic
                    
- 
                        Ecclesiastic
                    
- 
                        Programming
                    
- 
                        Computer
                    
We recommend that you check your authentication data.
Authentication_Data Authentication data specific to the Authentication_Type being used.
Security capabilities include authentication, data encryption, and containerization.
The Authentication Data field contains the integrity check value(ICV).
The router details include SSID, authentication data, and configuration data. .
An optional Header element that contains application-specific information such as authentication data.
The value is included in the Authentication Data calculation, but is otherwise ignored by the recipient.
Set of blockchain-based modules and components, including Authentication, Data Storage, Open API etc.
Note that the access authentication data can be associated with the device group in a number of different ways.
We use Secure Socket Layer(SSL) technology for mutual authentication, data encryption and data  integrity.
In order to specify authentication data, navigate to ESET NOD32 Antivirus Advanced setup> Connect to LAN as.
Other similar contact data  may be IP address of used computer and files of specific authentication data we agree to use.
Login credentials and security authentication data(including certificates, domain information, login and logout dates and times, usernames, enrollment IDs, etc.).
Servers can also notify clients whether"credentials"(including Cookies and HTTP Authentication data) should be sent with requests.
On computers, unlinking removes authentication data and provides the option to delete local copies of files the next time the computer comes online.
If security is to be emphasized, although not strictly required, it is desirable that the access authentication data be changed when members are removed from the domain.
In most cases that we have observed,the group performed tasks related to searching for vulnerabilities, gaining persistence on various hosts, and stealing authentication data.
If authorization for the specified folder is required, authentication data must be supplied in the User name and Password fields.
Other possible identification data  include, for example, information about the IP address of the computer used, and files of specific authentication data we agree to use.
COMPLETE SECURITY Using open standards cryptography for user authentication, data encryption and data  integrity verification, FASP assures complete security of business-critical digital assets.
We recommend that you check the update settings-the most common reason for this error is incorrectly entered authentication data or incorrectly configured connection settings.
Otis may also collect geographic location data,  and other security authentication data from your personal computing device or telephone that will grant access to a facility or Otis equipment installed in a building.
Google Chrome users on Windows are advised to disable automatic downloads in the web browser to protect authentication data against a new threat discovered recently.
Flexible Storage Options Protect your user authentication data with backups secured by strong in-flight and at-rest encryption and stored in up to five locations, including local disks, NAS, SAN, tape, as well as proven and secure Acronis Cloud Storage.
Why use this policy: The WiFi policy lets you deploy WiFi network details, such as the SSID, authentication data, and configuration data,  to a managed device.
The message may advise the user of client computer 12a-12n that authentication data could not be validated, and invite the user of client computer 12a-12n to re-submit the authentication data.
If the computed message digest value and received message digest value match in event 510,the received authentication data has not been altered or corrupted, and event 514 is carried out.
Similarly, excluding payment forms, you must never collect or enter any"Sensitive Authentication Data", as defined by the PCI Standards(including CVC or CVV2) into any fields in the Services.
An application implements a CallbackHandler and passes it to underlying security services so that they may interact with the application to retrieve specific authentication data, such as usernames and passwords, or to display certain information, such as error and warning messages.
McAfee Complete Data  Protection—Advanced uses full-disk encryption, authentication, data loss prevention, and access controls to safeguard sensitive information at rest, during use, and in motion.