Examples of using Password authentication in English and their translations into Russian
{-}
-
Official
-
Colloquial
Open password authentication.
Create users, groups, andiSCSI targets with password authentication.
Open password authentication.
Private areas will require user identification and password authentication to gain access.
Improved password authentication at URL with IP cameras.
SMB Login/password information Optional This is required,if the SMB server requires login/password authentication.
Password authentication is chosen as the object of additional security control.
Whether clients need to use smart card authentication or password authentication, or whether they can use either method.
If the password authentication screen is displayed, enter your password. .
You also minimize the number of passwords that users need to remember, thereby strengthening the security of password authentication to your network.
Although deprecated, Password Authentication Protocol(PAP) is still sometimes used.
The CCID mode is used for PIV smart card and OpenPGP support,while USB HID is used for the one-time password authentication schemes.
Password authentication can be safer for your data in case the recorder is lost.
UltraVNC supports the use of an open-source encryption plugin which encrypts the entire VNC session including password authentication and data transfer.
Specifies whether the server uses the Password Authentication Protocol(PAP) to authenticate remote access and demand-dial connections.
Lamport,“Password Authentication with Insecure Communication”, Communications of the ACM 24.11(November 1981), pp 770-772.
As the maintenance of the United Nations secure communications network involves expertise in different areas such as encryption software and hardware equipment,secure document storage, password authentication, etc., and training would be necessary to ensure that the staff members' skills are up-to-date and fully commensurate with their responsibilities.
Communicating password/authentication policies and procedures to all users helps those users understand and abide by the policies.
We recommend that you avoid the use of Password Authentication Protocol(PAP) because it transmits your user name and password in plain text over the network.
User name and password authentication- Specifies whether to accept the user name and password for authentication. .
In addition, you can use NPS to deploy secure password authentication with Protected Extensible Authentication Protocol(PEAP)-MS-CHAP v2 for wireless connections.
Hardware-based password authentication that limits the number of consecutive wrong password attempts by locking the devices when the maximum number of wrong attempts is reached.
A stringent password and authentication system: each user of the system is assigned a unique user identification and associated password.
Install the Password Synchronization pluggable authentication module.
Enter the proxy server address and the name and password if authentication is required.
We verify account access through both email/password-based authentication and Google Accounts authentication via OAuth 2.0.
ID authentication, data replication authentication and password protection.
Instead of passwords authentication the biometry comes to use.
Basic authentication(password is sent in cleartext).
Provides a location for you to type your password for authentication with the remote network.