英語 での Authenticating の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Privacy Notices The Software automatically communicates with Exploratory servers for authenticating your user account.
Authenticating your domain might cut down the percentage of emails moving in to spam folder.
When authenticating using the password grant, Passport will use the email attribute of your model as the"username".
The gateway can get the access token by authenticating with its password upon onboarding itself.
The Federation Service uses these certificates(using this trust policy) for authenticating federation server proxies.
(1) For authenticating your identification when you use the Sites.
With a smart BMS, monitoring the state of batteries, calculating secondary data, reporting that data, ontrolling the environment, authenticating.
If you execute this API without setting root authentication, FlashAir executes the command without authenticating the server certificate by root authentication.
Authenticating your users using popular SNS services such as Twitter, Facebook, etc.
Nuance VocalPassword provides state-of-the-art, multimodal biometrics for authenticating customers before they reach an agent.
On the test environment only, you can use 0000000 in place of the one-time password(OTP) when authenticating with BitGo(for the purpose of automated tests).
Consul will authenticate with Kubernetes using the standard kubeconfig file used for authenticating with kubectl.
The Indonesian government favored this plan over receiving and authenticating applications from individual women.
It uses a frontend hosted on S3, authenticating with Cognito and communicating with the DeepLens through IoT topics.
In this way, asymmetric keys can be used for network login and authenticating online transactions.
Pluggable Authentication Module(PAM) is a mechanism for authenticating users.
Pluggable Authentication Modules(PAM) is a flexible mechanism for authenticating users.
And Touch ID is fantastic for logging into my MacBook Pro and authenticating 1Password.
This tunnel is created by first authenticating your client- a computer, smartphone or tablet- with a VPN server.
Authenticating users, managing access to applications and sets of data, and assigning roles and privileges is fundamental to ensuring compliance and security of corporate assets.