Примеры использования An authentication на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Zend_Auth adapters return an instance of Zend_Auth_Result with authenticate() in order to represent the results of an authentication attempt.
To use this site system as an Asset Intelligence synchronization point, you must specify an authentication certificate to use when connecting to System Center Online.
the seller sends an authentication request and authorization transaction to the bank.
including the status message was left, after an authentication details.
the client re-sends the same request but adds an authentication header that includes the response code.
which requires the presence of an authentication server.
This feature however was deemed insecure and was extended in RFC 1985 with the ETRN command which operates more securely using an authentication method based on Domain Name System information.
Genetec Archiver and Security Center are assigned an authentication key.
If the repository that you are trying to access is password protected, an authentication Dialog will show up.
Make sure you choose an authentication method that you can ensure the security of, whether it is SMS, Google or email.
If the password is accepted, and there is an authentication response to be returned to the client,
that an adapter class must implement for performing an authentication query.
PEAP fast reconnect, which reduces the delay between an authentication request by a client and the response by the NPS
John Fitzpatrick of MWR InfoSecurity discovered an authentication bypass vulnerability in torque, a PBS-derived batch processing queueing system.
The characteristics of the diamonds will be registered and they will receive an authentication voucher, which will be the minimum requirement for export clearance and a Kimberley Process certificate.
To create an authentication exemption rule, you only need
Use this option to create an authentication exemption rule for connections to computers that do not require Internet Protocol security(IPsec) protection.
contains an authentication bypass flaw allowing users without privileges to install local packages.
There are model agreements which require the parties to adopt an electronic symbol or code as an authentication measure.
After the Federation Service verifies the token, an authentication cookie is issued and written to the client browser.