Examples of using Authentication requests in English and their translations into Russian
{-}
-
Official
-
Colloquial
Authentication requests must first travel a trust path between domain trees.
The UDP port that is used by the RADIUS server for incoming RADIUS authentication requests.
You can forward authentication requests, accounting requests, or both to each remote RADIUS server group member.
A trust path is a series of trust relationships that authentication requests must follow between domains.
It receives authentication requests from RADIUS clients(NAS), verifies the supplied credentials and accepts or rejects these requests. .
The WS-Federation specification identifies two sources of identity and authentication requests across trust realms.
With this configuration, all authentication requests are directed to the load balancer, which forwards the request to either connector as appropriate.
If the External Authentication program is not running,all External Authentication requests are rejected.
Sites also provide a way for site-aware clients to target authentication requests, directory searches, and other operations against a domain controller in the same site or in a nearby site.
SID history data that contains SIDs from any domain other than the trusted domain is removed from authentication requests that are made from the trusted domain.
In this design, federation servers route authentication requests from user accounts in Tailspin Toys to Web-based applications that are located in the network of Online Retailer.
A one-way, shortcut trust that is established between two domains in separate domain trees can reduce the time that is necessary to fulfill authentication requests- but in only one direction.
They provide the identification required to forward authentication requests to the server that holds the user's credentials.
These servers route authentication requests from user accounts in other organizations(in Federated Web Single-Sign-On(SSO) designs) or from clients that can be located anywhere on the Internet(in the Web SSO design).
A trust path is the series of domain trust relationships that authentication requests must traverse between any two domains.
If a forest trust is a two-way trust, authentication requests that are made in either forest can reach the other forest. For more information, see Understanding When to Create a Forest Trust.
To configure a connection request policy thatspecifies which NPS or RADIUS server group processes authentication requests, see Connection Request Policies.
With this configuration, NPS can forward authentication requests to any RADIUS server, and users with accounts in untrusted domains can be authenticated.
For example, when a one-way, shortcut trust is established between domain A anddomain B, authentication requests that are made in domain A to domain B can use the new one-way trust path.
When this option is enabled,the Server rejects all authentication requests that send passwords in the clear text format over insecure links.
Shortcut trusts effectively shorten the path that authentication requests travel between domains that are located in two separate domain trees.
To specify NPS orother RADIUS servers to which authentication requests are forwarded, see Remote RADIUS Server Groups.
After you create the federation trust, users who are located in the account partner organization can send authentication requests successfully through the federation trust to the AD FS-enabled Web server in the resource partner organization.
The RODC then forwards the authentication request to a writable domain controller.
In the following example, a RADIUS authentication request is sent.
Enter the code into the login prompt on the screen or approve the authentication request.
If this optional element value is"data", and a denied-response is received for an authentication request, the function returns a response attribute dictionary(see below) with an additional Error element.
When the client is about to buy a product on a site,the seller sends an authentication request and authorization transaction to the bank.
Any Kerberos-aware application, including most security services,relies on time synchronization between the computers that are participating in the authentication request.
If this optional element value is not"data", and a denied-response is received for an authentication request, the function returns an error string.