Examples of using Authentication using in English and their translations into Portuguese
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Perform authentication using the& HTTP; Basic method.
NET SFTP Library supports public key authentication and private key authentication using passphrases.
Authentication using PAM to verify user's password.
IIS offers two types of authentication using client certificate mapping.
Authentication using Google when running on Google App Engine requires skipping the web2py login form, being redirected to the Google login page, and back upon success.
In the same way that Touch ID revolutionized authentication using a fingerprint, Face ID revolutionizes authentication using facial recognition.
Secure Hub also refreshes most MDX policies stored in Endpoint Management for the installed apps when a user's Citrix Gateway session renews after authentication using Citrix Gateway.
Psk-Provides authentication using a specified preshared key.
Smartcard Authentication- User Validation for connections now supports authentication using a Smartcard PIN as well as the existing remote login support.
LDAP LDAP Authentication using LDAP works very much as in the previous cases.
Mmpolicy-Main mode policy qmpolicy-Quick mode policy actioninbound-Action for inbound packets actionoutbound-Action for outbound packets kerberos-Provides kerberos authentication if'yes' is specified psk-Provides authentication using a specified preshared key rootca-Provides authentication using a specified root certificate, attempts to map the cert if certmap: Yes is specified, excludes the CA name if excludecaname: Yes is specified.
The steps for configuring authentication using a form are the same as for the basic login configuration, except that you specify the login and error pages you created.
Install different types of authentication using the Add Role Services Wizard from Server Manager.
Instead, perform initial authentication using the user name and password supplied by the user, and then use a short-lived, service-specific authorization token.
Citrix ADC integration with Endpoint Management also supports authentication using a combination of client certificate authentication and another authentication type, such as LDAP or RADIUS.
Rootca-Provides authentication using a specified root certificate, attempts to map the cert if certmap: Yes is specified, excludes the CA name if excludecaname: Yes is specified.
Psk-Provides authentication using a specified preshared key.
Rootca-Provides authentication using a specified root certificate, attempts to map the cert if certmap: Yes is specified, excludes the CA name if excludecaname: Yes is specified.
Rootca-Provides authentication using a specified root certificate.
ESET Secure Authentication uses its own streamlined management console accessible via a web browser.
Authentication uses the OAuth protocol and is implemented with security checks.
The authentication uses a cookie stored in the file.
For client certificate authentication, use Sign.
XenMobile client properties true Enables Touch ID for offline authentication use cases in iOS.
Defines the method of authentication used for accessing update files.
This is the authentication used by your service provider.
To enable authentication, use the following command to add the remote computer to the list of trusted hosts for the local computer in WinRM.
ESET Secure Authentication uses its own streamlined management console accessible via a web browser.