Examples of using Authentication method in English and their translations into Russian
{-}
-
Official
-
Colloquial
Authentication method blocked.
Select the SMTP authentication method.
Authentication method of dynamic code challenge- response.
To configure the authentication method in IIS.
The CommuniGate Pro FTP module supports the GSSAPI authentication method.
Choose authentication method.
Click Enabled, andthen select the authentication method.
Determine the authentication method you want to use.
Select this option to configure any available authentication method.
Specifies the authentication method for the proxy server.
Provides a drop-down list from which you can choose an authentication method.
Next, configure the authentication method in IIS.
The CommuniGate Pro Server supports the special SessionID Authentication method.
Choose the authentication method, and if necessary, enter the password.
Add or Edit Second Authentication Method.
In Select Authentication Method, select Smart Card or other certificate.
Your CommuniGate Pro Account has the Kerberos Authentication method enabled.
Apple's Face ID authentication method is considered to be quite secure and sophisticated.
The CommuniGate Pro Server supports the Kerberos authentication method.
Use this page to choose the authentication method for your ACS database.
The CommuniGate Pro Server supports the Client Certificate authentication method.
AUTHTYPE: This key specifies the authentication method to access proxy server.
If you do not specify users or computers,you can use any authentication method.
In the European Union, this authentication method could also be an issue in Germany.
Click Next through the wizard until you reach the Authentication Method page.
In Select a network authentication method, select Microsoft: Protected EAP(PEAP).
If you are using the default response rule,select an authentication method, and then click Next.
In Select a network authentication method, select Microsoft: Smart card or other certificate.
Prevents an unauthorized server from negotiating the least secure authentication method.
You have successfully selected your authentication method and enabled it for login.