Exemples d'utilisation de Authentication method en Anglais et leurs traductions en Français
{-}
-
Official
-
Colloquial
The electronic consignment note may also be authenticated by any other electronic authentication method permitted by the law of the country in which the electronic consignment note has been made out.
theft of mobile devices to be used as part of an authentication method, e.g. for accessing mobile finance applications, was also mentioned.
Select an authentication method: Use SQL Authentication,
It was discovered that NTLM authentication challenge packets are not validated properly when using the NTLM authentication method, which could lead to an information disclosure
Data Encryption: Disable01 WEP02* Note The encryption methods that can be selected vary depending on the authentication method set in Netwk Authentic.(Network
on page 4-87 is set to use an authentication method other than Open,
Multi-factor authentication(MFA) increases security for your app by adding another authentication method, and not relying solely on user name and password.
If the authentication method is switched to“Remotely on the Network”,
If you use the SQL Server authentication method, in the Update Manager installation wizard supply the same user name,
BlackBerry Enterprise Identity allows you to choose the authentication method for any given service,
Supplier will use two-factor authentication and certificates to authenticate their remote administrators who manage their cloud services, or an alternative strong authentication method provided it has received prior approval from Seagate.
Under this approach, an electronic signature or authentication method that can both identify the signatory and indicate the signatory's
including any agreement between the originator and the addressee of the data message, the signature or authentication method must be shown to be as reliable as is appropriate for the purpose for which the data message is generated or communicated.
the holder of the card still not have agreed any authentication method, so step 4 not always is,
Under this approach, an electronic signature or authentication method that can both identify the signatory and indicate the signatory's
The computation must take into account how the person accesses the applications(authentication method, geolocation, etc), what they do within the apps,
In the Authentication method on the machine's touch interface(Touch UI)
In the Authentication method on the machine's touch interface(Touch UI)
as it appears that courts tend to reach different conclusions according to the function being attached to the authentication method.
it is conceivable to develop systems whereby foreign notarized records would be given legal recognition on the basis of verifi cation of the electronic signature or authentication method used by the originating notary public.