Примеры использования Authenticate на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
the target and the initiator authenticate each other.
When certified by a notary public an Irish Embassy official should authenticate the signature or seal.
The"Authenticate by login" permission allows/denies users/groups to log in to the TeamWox system using the login
The"Authenticate by login in domain" permission allows/denies users' access to the system using the login
NAP health policy server, verify that Authenticate requests on this server is selected.
We need certain information from you to register you, authenticate you, process your entries
The"Authenticate by CA certificate" permission allows/denies users/groups to log in to the system using the certificates emitted by one of the trusted certification centers.
Zend_Auth adapters return an instance of Zend_Auth_Result with authenticate() in order to represent the results of an authentication attempt.
Authenticate the user and customize the functionality of the website for user's user habits- including language,
To change an existing access level, open the window for setting access levels via the File| Authenticate menu and enter the administrator password.
The CommuniGate Pro Server can authenticate its users, and it can also reject connections from outside of the"client networks".
before authentication is attempted, since Zend Auth::authenticate() performs the automatic storage of the identity.
Upon a request of a mass media representative, the election commission must authenticate a copy of the protocol on the results of voting
Users can authenticate at the terminal, then manage their YSoft SafeQ prints,
then calling its authenticate() method.
For example, TLS can authenticate one or both parties using a mutually trusted certificate authority.
Addressed an issue where some user accounts imported from Active Directory could not authenticate.
A clerk is asked to issue or authenticate a document that is not usually issued by that clerk or by that institution.
The NPS server can authenticate and authorize users whose accounts are in the domain of the NPS server
An alternative approach could be to use encryption technology to control and authenticate records.