Examples of using Authentication process in English and their translations into Russian
{-}
-
Official
-
Colloquial
The authentication process is described in sub-appendix 11.
AccountManager starts this service to begin the authentication process.
The authentication process takes about 10 to 20 seconds.
The LDAP Provisioning option can modify the authentication process.
Annotation: A strategy of authentication process modeling is suggested.
The authentication process is examined in authorization request flows of varying intensity.
Watch this short video to see how quick& easy the authentication process can be.
The details of the authentication process vary widely, based on the server technology in use.
Considering an OpenVPN server with a robust key file will protect the connection and secure the authentication process.
There are two stages in the PEAP authentication process between the PEAP client and the authenticator.
The following table describes each mode and its associated management point authentication process.
This mechanism ensures that the mutual authentication process is done in the order specified in sub-appendix 11.
This authentication process needs to be done properly and in the right order in order to confer legitimacy on this lofty goal.
Use this command to complete the second stage of a Two-factor authentication process for the given session.
During the EAP-TLS authentication process, shared secret encryption keys for Microsoft Point-to-Point Encryption(MPPE) are generated.
The signal blocker works in much the same way as the IMSI-Catcher, but after the authentication process it takes the subscriber.
We follow the authentication process, then select the type of our operating system in the"Guide for Public Betas" page. macOS.
Each client connecting to the wireless network goes through a strict authentication process to ensure maximum security.
Cardholder authentication process is based on the security code known only by the owner and develops exclusively on the Visa or MasterCard servers.
Verification of this process will raise article I complications similar to those arising in the authentication process.
During the authentication process, NPS servers send their server certificate to client computers as proof of identity.
Shortcut trusts are one-way or two-way,transitive trusts that administrators can use to optimize the authentication process.
Note that this authentication process only occurs when the drive is first powered on; it does not repeat with each read and write operation.
Additionally, the working group recommended that each registry operator should implement an authentication process to verify the rights holders' standing.
In both cases the registration and authentication process will not work and additional information will be required to"verify identity".
In turn, this file specifies the account type that this authenticator supports,as well as UI resources that appear during the authentication process.
These certificates are used during the authentication process as proof of identity by both clients and NPS servers.
A heap corruption vulnerability was discovered in net-snmp, a suite of Simple Network Management Protocol applications,triggered when parsing the PDU prior to the authentication process.
X wanted to simplify the authentication process for users to access the"cloud", which had to comply with four successive authentications at the time.
The Organization also reported that, on the basis of a list of the minimum elements that an end-use certificate should contain,OSCE participating States exchanged sample end-use certificates, on a restricted website, to facilitate the authentication process by national authorities.