Examples of using Be authenticated in English and their translations into French
{-}
-
Official
-
Colloquial
A device featuring BLUETOOTH function is required to conform to the BLUETOOTH standard specified by BLUETOOTH SIG, and be authenticated.
an Italian court had held that the signatures of all arbitrators must be authenticated on the copy provided by the applicant.
you must provide the following items in your request so the request can be authenticated.
Certified German translation is required in a number of situations where legal documents must be authenticated in order to be considered valid in an official setting.
the birth certificate must be authenticated by way of legalisation or apostille22); and.
Passport, original and copies of the used pages which have to be authenticated by Notary Register Office.
messages must be authenticated through either SPF or DKIM, or both.
All firearms in a business inventory must be authenticated by an approved verifier and registered.
users who assume the role must first be authenticated using multi-factor authentication MFA.
All communications would be authenticated using digital certificates,
including those in electronic form, must be authenticated.
Documents submitted by the applicant seeking licensure should be authenticated and verified by recognized resources.
They cannot be authenticated and will not therefore be able to access JCMS.
An individual's identity should be authenticated by an organization when it is necessary given the nature of the transaction.
The record of the proceedings of this meeting shall be authenticated by a notary public or, in the absence thereof, the local justice of the peace;
the signature can be authenticated.
Ignore if access to Host cannot be authenticated Select this check box to ignore Guest side authentication with Hosts that are not Guest side authentication enabled on a Netop Access Server.
A funds transfer instruction given over the telephone may be authenticated by use of codes,
Inc. and be authenticated.
You can also use commonly used conditions to limit whether a user must be authenticated using a multi-factor authentication(MFA) device, or if the request must originate
