Examples of using Authentication credentials in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
These markets include physical and logical access control, including strong authentication and credential management;
Cloud authentication and credential management will further integrate mobile devices, tokens, cards and machine-to-machine endpoints.
This may allow the attacker to steal cookie-based authentication credentials.
The attack could be used to steal cookie-based authentication credentials, for example.
In this way the attacker can steal cookie-based authentication credentials.
May allow the attacker to steal cookie-based authentication credentials and.
Edit Anonymous Authentication Credentials.
Has the user not provided authentication credentials?
For example, devices are often shipped with hard-coded authentication credentials for system administration, making it simple for attackers to log in to the devices.
When the portal goes live, law enforcement agents will be able to apply for authentication credentials, giving them the option to submit legal requests online.
Obtaining data via a government information request has the definite benefit of not having to know the user's authentication credentials.
A6-Sensitive Data Exposure Many web applications do not properly protect sensitive data, such as credit cards, tax IDs, and authentication credentials.
This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
On Windows Server 2003 or systems with ADAM installed, the attacker must have valid authentication credentials in order to exploit this vulnerability.
The 401(Unauthorized) status code indicates that the request has not been applied because it lacks valid authentication credentials for the target resource.
But, exploiting this flaw requires authentication credentials to connect to the VNC server or control over the client before the connection is established.
If authentication credentials were provided in the request, the server considers them insufficient to grant access.
Fedora Server also includes FreeIPA, enabling you to manage authentication credentials, access control information and perform auditing from one central location.
The Board reviewed the authentication credentials and noted that complexity requirements were not configured and therefore not systematically enforced.
Many web applications do not properly protect sensitive data, such as credit cards, tax IDs, and authentication credentials.