Examples of using User's identity in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
that confirms the user's identity to the requested service.
Passwords a common means of verifying a user's identity before access given to information systems.
This means that content will be accessed by using the application user's identity, and configuration files will be accessed by using the application pool's identity. .
thereby facilitating the user's identity.
Although VPNs can skirt geographical restrictions and mask the user's identity, please consider the local laws, victims,
Although VPNs can skirt geographical restrictions and mask the user's identity, please consider local laws, victims,
the Service Provider reserves the right to verify the user's identity and user data by requesting the user to present suitable photo identification in order to prevent use of misleading identification.
since the static nature of biometric data mean that hackers can leverage a user's identity for an extended time.
Websites that allow Internet content to be retrieved on behalf of a user with the intent of obscuring the user's identity from the content server or obscuring the source of the content from content-filtering software.
For example, if the data returned by the query is based on the user's identity or role, using a default set of data that was configured at design time instead of using query results may result in incorrect data for that user. .
which is designed to help administrators address identity management challenges by making it possible for organizations to share a user's identity information more securely across security boundaries.
Do not allow a device to access resources if systems cannot determine the user's identity, if it does not meet compliance standards(e.g. screen unlock passcode/PIN not enabled)
The User accepts that the Operator is entitled to reveal the User's identity(such as IP address
Com upon proof of the User's identity.
Net upon proof of the User's identity.
Alternative authentication means the verification of a User's identity using a series of additional questions to which only the User could know the answers.
Verification of the user's identity.
Verification of the user's identity.
Authenticating the protected user's identity for Symantec;
No personal information about the user's identity is shared.