Examples of using Authentication protocol in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Support for 128- and 256-bit AES encryption for the Kerberos authentication protocol.
These are things like authentication protocol parameters, but also other tunable configuration variables.
The authentication protocol used in rsync is a 128-bit MD4 based challenge-response system.
This package contains utility classes related to the Kerberos network authentication protocol.
The Security Channel(Schannel) authentication protocol suite provides these protocols. .
The''rc'' files are given the X11 authentication protocol and cookie in standard input.
The Kerberos authentication protocol is a great step toward making Hadoop environments secure.
Products using the authentication protocol retain control the security policies to be implemented and enforced.
The authentication protocol used in rsync is a 128 bit MD4 based challenge response system.
LEAP(Lightweight Extensible Authentication Protocol), is an EAP authentication type used primarily in Cisco Aironet* WLANs.
In Active Directory, NTLM has been replaced by Kerberos as the default authentication protocol.
The authentication protocol required by the remote server cannot use the stored password.
Description: A cryptographic weakness existed in the authentication protocol of Remote Desktop.
This tool also allows you to configure Kerberos to be used as the authentication protocol when using LDAP or NIS.
DS is a cardholder authentication protocol backed by the major credit card scheme schemes.
MS-CHAP v2 may be used as an authentication protocol for wired and wireless LAN in some cases.
The Microsoft Windows Server operating systems implement the Kerberos version 5 authentication protocol and extensions for public key authentication. .
The''rc'' files are given the X11 authentication protocol and cookie in standard input.
The Microsoft Windows Server operating systems implement the Kerberos version 5 authentication protocol and extensions for public key and password-based authentication. .
We utilise Hawk authentication protocol, which implements hash message authentication code(HMAC) signing based on the API key provided, thereby enhancing our security.