Examples of using Authentication mechanism in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
Authentication mechanism.
There is no additional authentication mechanism.
The authentication mechanism is Extended Authentication. .
Make use of coordinated or mutually accepted authentication mechanisms;
Triple mutual authentication mechanism(ISO/IEC DIS9798-2).
This did not take place- as each Member State adopted its own authentication mechanism.
V5 adds an authentication mechanism for additional security.
Provides a set of daemons to manage access to remote directories and authentication mechanisms.
Network firewalls, harddrive encryption, authentication mechanisms and organizational measures e. g.
If the authentication mechanism is implemented in software only, the access is prone to dictionary attacks.
An LDAP client authentication requestfails when the Digest-MD5 SASL subsequent authentication mechanism is used.
X- refers to IEEE standard providing authentication mechanism for devices wishing to attach to a LAN or WLAN.
An LDAP client authentication request fails when the Digest-MD5 SASL subsequent authentication mechanism is used Email Print.
The Commission authentication mechanism, as well as the Captcha, represent important measures towards protecting the consultations against manipulations.
As companies wake up to the risk of getting hacked,adding a physical second factor authentication mechanism will only become more attractive to them(and individual users, too).
Since 24 July 2018, an authentication mechanism(EU login) is required from the respondents to the public consultations published to the‘Have your say' portal.
Deny SMB sessions without extended security- Extended security can be used during the SMB session negotiation in order toprovide a more secure authentication mechanism than LAN Manager Challenge/Response(LM) authentication. .
The EESC is of the opinion that there should be more debate on the risks to e-procurement by the Commission andMember States before a decision is made that the authentication mechanism to e-procurement should be tied to advanced electronic signatures.
(c) the authentication mechanism, through which the natural or legal person uses the electronic identification means to confirm its identity to a relying party;
Identification should include the digitalidentification of a data subject, for example through authentication mechanism such as the same credentials, used by the data subject to log-in to the on-line service offered by the data controller.
If a two tier authentication mechanism is adopted does it so follow that the higher level of authentication is based on an advanced electronic signature or should a less complex but secure authentication mechanism be adopted?
You must not use any means to bypass or disable any encryption, security, or authentication mechanism for the Authorised Systems or to gain unauthorised access or to interfere with any account, service, hardware, software or network connected to the PSN.
It is crucial that authentication mechanisms for payment transactions are designed from the outset to include the necessary measures to ensure compliance with data protection requirements.
PAM decouples applications from the authentication mechanism, making it possible to upgrade the authentication system without recompiling or rewriting the applications.
The authentication mechanism implements security controls for the verification of the electronic identification means, so that it is highly unlikely that activities such as guessing, eavesdropping, replay or manipulation of communication by an attacker with high attack potential can subvert the authentication mechanisms. .
As different services may support different authentication mechanisms, SSO may internally translate and store different credentials compared to what is used for the initial SSO login.
The decision to standardise the authentication mechanism to an appropriate level of security, today, cannot be taken in isolation of the investment made by Member States in authentication mechanisms at both national and/ or service level.