Examples of using An authentication in English and their translations into Russian
{-}
-
Official
-
Colloquial
Svn_auth_set_parameter- Sets an authentication parameter.
Make sure you choose an authentication method that you can ensure the security of, whether it is SMS, Google or email.
Read an overview of how to set up an authentication strategy.
It then sends an authentication request to that partner.
Provides a drop-down list from which you can choose an authentication method.
People also translate
Tobias Brunner found an authentication bypass vulnerability in strongSwan, an IKE/IPsec suite.
From the Configure 802.1X Authentication dialog, select an authentication mechanism.
You will have to enable an authentication method if you want to allow FTP users to access your content.
The final text of article IV(1)(b)does not include an authentication requirement.
At international level, such an authentication service via the mobile phone is only available in 6 other states.
Upon successful verification of the GCM Registration ID and other credentials, an authentication token is returned.
Now, you will receive an authentication code via your preferred method each time you log into your SpectroCoin account.
If you are using the default response rule,select an authentication method, and then click Next.
Oscar Reparaz discovered an authentication bypass vulnerability in iodine,a tool for tunneling IPv4 data through a DNS server.
If the repository that you are trying to access is password protected, an authentication Dialog will show up.
Enable EAP as an authentication protocol on the network access server. For more information, see your network access server documentation.
The"Certificate Profile Identifier"(CPI)delineates the exact structure of an authentication certificate.
They're sending our swatch out to an authentication lab at 11:00 A.M. tomorrow morning.
More‑advanced wireless network security can require one or more certificates and an authentication server.
Proper configuration of selected Service functions,allowing in particular an authentication of a browser session;
If more than one object is returned from the LDAP query with the supplied user name,this is considered an authentication failure.
Each time the network camera is accessed, the browser displays an authentication window and asks for the user name and password.
This interface defines one method, authenticate(),that an adapter class must implement for performing an authentication query.
When the client is about to buy a product on a site,the seller sends an authentication request and authorization transaction to the bank.
Zend_Auth adapters return an instance of Zend_Auth_Result with authenticate() in order to represent the results of an authentication attempt.
Such an authentication system would presuppose that samples of the hand-written signature have been previously analysed and stored by the biometric device.
Should it be the case, the TIR secretariat proposed to replace the scratch lists with an authentication token automatic random number generator.
Johan Olofsson discovered an authentication bypass vulnerability in Stunnel, a program designed to work as an universal SSL tunnel for network daemons.