Examples of using Authentication mechanisms in English and their translations into French
{-}
-
Official
-
Colloquial
To meet this needs, JCMS 6 proposes a new, unitary authentication mechanism.
For instance, a bare encryption algorithm will provide no authentication mechanism, nor any explicit message integrity checking.
The France Connect authentication mechanism was implemented
As a consequence, requests can be sent through this method, bypassing any authentication mechanism.
CID) is an authentication mechanism created by card companies to help reduce fraud with online transactions.
The SRM is equipped with an authentication mechanism that formally identifies users by means of an identifier(user code)
Her game can take advantage of the authentication mechanism from one of these providers to validate the user's identity.
Pba allows the user to log in prior to windows' own authentication mechanism.
will complement the authentication mechanism.
second factors raises the authentication mechanism in terms of security.
password into the Windows Domain. Yet another authentication mechanism was application specific.
Under some circumstances, this can negate the incremental security benefit of using a single-use authentication mechanism token.
translate the different credentials to each authentication mechanism.
It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL.
Web Access Management DenyAll Web Access Management provides single authentication mechanism on multiple applications(Web Single Sign On),
A common attack is when MFPs have an authentication mechanism that gives access to an employee via RFID,
in their registry database, infrastructure and/or procedure to support a user authentication mechanism.
while still using the WordPress authentication mechanism and database.
the Generic Security Service Application Program Interface(GSS-API) library could allow an authenticated remote attacker to crash any server application using the GSS-API authentication mechanism, by sending a specially-crafted GSS-API token with a missing checksum field.
Mutual recognition of authentication mechanisms.