Examples of using Key usage in English and their translations into Russian
{-}
-
Official
-
Colloquial
The key usage report consists of two tables.
For more information, see Key Usage.
For encryption key usage, the following options are available.
Save the number of the key in speakphone memory for the key usage. .
If no key usage is specified, the certificate can be used for any purpose.
Cause: The cryptographic service provider(CSP) does not match key usage settings or does not exist.
For signatures, key usage can be limited to one or more of the following purposes.
Application policies are sometimes called extended key usage or enhanced key usage. .
Unknown key usage(OLD), where OLD is defined as a set of available identifiers.
Cause: Private keys will not be archived when the key usage for the certificate template is set to Signature.
Key usage is a restriction method and determines what a certificate can be used for.
Kaspersky Security Center shows the details of only one key added on each SVM in the key usage report.
Key usage is a restriction method that determines what a certificate can be used for.
The computer certificate you configure on the RRAS server must have eitherthe Server Authentication or All-Purpose enhanced key usage(EKU) property.
The key usage report shows information about virtual machines that are protected with the use of keys. .
The computer certificate for the NPS server orVPN server is configured with the Server Authentication purpose in Extended Key Usage(EKU) extensions.
Any certificate with client authentication extended key usage(EKU) can be used as a federation server proxy client authentication certificate.
A third issue, with no CVE id, is the missing detection of the critical flag for the TSA extended key usage under certain cases.
You have the ability to find out key usage statistics, such as visitor counts, memory use, the total use of bandwidth and much more.
If a cryptographic provider supporting elliptic curve cryptography(ECC)is used, a stand-alone CA will honor every key usage for the ECC key. .
Because some implementations of public key infrastructure(PKI) applications cannot interpret application policies,both application policies and enhanced key usage sections appear in certificates issued by a Windows Server- based certification authority(CA).
The Extensions tab allows an administrator to define specific application policies, issuance policies,certificate subject types, and key usage attributes for a certificate template.
To support SSTP or IKEv2 certificate-authenticated VPN connections, you must install a computer certificate with the Server Authentication orAll-Purpose Enhanced Key Usage(EKU) property installed on your RRAS server.
The IEEE 802.15 task group 4b was chartered to create a project for specific enhancements and clarifications to the IEEE 802.15.4-2003 standard, such as resolving ambiguities, reducing unnecessary complexity,increasing flexibility in security key usage, considerations for newly available frequency allocations, and others.
Key words: usage of Internet network, active education, roles of lecturer, roles of student, higher education, post-graduate studies.
Tracking and analysing site usage is a key tool in improving navigation and usability of a web site.
In addition to higher usage, another key finding of the outlook is that customers' purchase plans are lower in all regions.
Key words: degradation and unreasonable land usage, violated lands, delimitation.
Due to their fl exible usage they are key components of modular production line solutions or highly-compatible basic modules in automated production processes.
Reform of the legislative framework, policies towards improvement in the scope and reach of programmes, andvarious operational issues targeting the efficiency of resource usage, are key thrusts behind activities at a national level.