Examples of using Private keys in English and their translations into Polish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Financial
-
Official/political
-
Programming
-
Computer
Some CSPs require the subject of the signing certificate in order to access private keys.
require the key hash of the signing certificate in order to access private keys.
Cause: Private keys will not be archived when the key usage for the certificate template is set to Signature.
Cause: Smart cards do not allow private keys to be exported once they are written to the smart card.
Do not select this option if a hardware security module(HSM) is used to protect private keys.
This option allows the administrator to choose the Advanced Encryption Standard(AES) algorithm to encrypt private keys while they are transferred to the CA for key archival.
Credential roaming allows X.509 certificates, certificate requests, and private keys specific to a user in AD DS to be stored independently from the user profile and used on any computer on the network.
the secure storage and size requirements of digital certificates and private keys.
The Recipient Info section in the output of this command identifies the serial numbers of the key recovery agent certificates whose private keys are needed to decrypt the blob and recover the key. .
authentication because the private keys of the certificate have an incorrectly configured access control list(ACL)
resolves any conflicts between certificates and private keys from any number of client computers that the user logs on to,
Phase 2 private key.
Private Key List.
Certificate import: private key could not extracted.
Passphrase to protect private key again.
Private key does not certify public key, %1.
Cold wallet private key.
Private key id_dsa to move to a client machine.
Private key is needed to authenticate certificate owner.
Ppk file when the private key is encrypted.