영어에서 Authenticating 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Handle all the low-level details of communication with the server, including authenticating with Google.
Where typical electronic signatures can use a variety of methods for authenticating signers, digital signatures use one specific method.
Digital certificates can be kept in registries so that authenticating users can look up other users' public keys.
The user no longer needs to enter a password when authenticating from that device.
This usually means authenticating over SSL and continuing to use SSL until the session ends.
Authenticating a system to meet network requirements may not be required but is often recommended.
Authenticating ownership via written records is burdensome
Further minimize unauthorized access by authenticating users using MFA across email, SMS or TOTP.
When you set up SSO in required mode, your identity provider becomes the entire basis for authenticating end users.
Certificate A data record used for authenticating network entities such as a server or a client.
Authenticating the user's identity for Symantec or for relying third parties that utilize Norton Security Login;
Later, the focus shifted to applying Akamai's content distribution network service to internal apps and using 802.1x certificates for authenticating users to them.
NetScaler MAS provides a method for authenticating both local users and external users.
The technology developed by Xage creates a distributed network of devices which are capable of authenticating each machine's digital fingerprint.
Users can connect to the database without authenticating a login at the Database Engine-level.
Simply speaking, mining Bitcoins means authenticating and legitimizing transactions using one's own computing potential.
Authenticating requests from mobile(iPhone) app to ASP. Net Web API(Feedback requested on my design).
Non-repudiability could be something a user wants(e.g. authenticating a payment) or it could be an undesirable property(e.g. sending a message they regret).
If the enterprise identity provider is configured to send the email attribute to ArcGIS Online after authenticating the member, the email address should match the email address where the invitation is sent.
New electronic signature regulations — like the European Union's Regulation on Identification and Trust Services(eIDAS) — are putting a spotlight on the need for high assurance methods of authenticating the identity of people signing documents.