Примеры использования Credential на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
If this is the first time that credential roaming is being used,
However, credential roaming can affect the size of the Active Directory database if an organization has a large number of users and credentials. .
Credential roaming will be enabled through a Group Policy ADM template that sets the appropriate registry values on a client computer.
The clearinghouse provides consumers a single contact point for zone file access agreement processing, credential issuance and customer care/support.
After you configure authentication on the RD Session Host server, you must allow default credential usage on the RD Session Host server by using Group Policy.
There are a number of reasons why a certificate can become untrustworthy as a security credential before its scheduled expiration. Examples include.
certain directories have to be excluded from roaming to avoid conflicts with credential roaming.
The CA then issues the certificate to the subject of the certificate for use as a security credential within a public key infrastructure(PKI).
keys that can be used with credential roaming.
Credential issued by the Universidad Nacional de Educación a Distancia(National University of Distance Learning) valid in all Spanish universities for admission and registration.
As part of the logon process, credential roaming Group Policy is applied to the user's computer.
The CWIs then take care of any applications for international credential evaluation(IDW application)
recalls ambassadors and receives the credential and letters of recall of ambassadors art. 67.
what are you doing back in my hotel with a fake credential and a gun?
presenting their up-to-date credential and the Ministry of Foreign Affairs confirmation form.
In 2007, the Government of Alberta signed an agreement with federal government that will accelerate the process of foreign credential recognition for new immigrants by licensing bodies in that province.
The CA then issues the certificate to the subject of the certificate for use as a security credential within a PKI.
The store URI was specified in the logon request and credential verification information is returned.
so this credential is secured only down to the agent level.