Examples of using Authentication methods in English and their translations into Russian
{-}
-
Official
-
Colloquial
using various authentication methods such as using TLS certificate,
On the Authentication Methods tab, select the appropriate method
EAP provides authentication methods that use security devices,
The POP module allows users to employ all authentication methods supported with the CommuniGate Pro Server,
Where domestic laws allow for electronic equivalents of paper-based authentication methods, the criteria for the validity of such electronic equivalents may be inconsistent.
The CommuniGate Pro HTTP modules support various authentication methods, including the GSSAPI,
These authentication methods can be enabled
Click the Settings tab. Under Required Authentication Methods, click Authentication Methods, and verify that the Override network policy authentication settings check box is cleared.
The lack of common standards for cross-border recognition of electronic signatures and other authentication methods is considered to be a significant impediment to cross-border commercial transactions.
Many smartphone apps use insecure authentication methods when storing your personal data on remote servers.
These authentication methods can be enabled
The present document analyses the main legal issues arising out of the use of electronic signatures and authentication methods in international transactions.
For information about how to configure supported Windows authentication methods by using Remote Desktop Gateway Manager, see Create an RD CAP.
You can configure the authentication methods that the RD Gateway server will allow by using Remote Desktop Gateway Manager.
using the HTTP authentication methods.
The lack of common standards for cross-border recognition of electronic signatures and other authentication methods is considered to be a significant impediment to cross-border commercial transactions.
One or more authentication methods are configured(in order of preference)
unifies the know-how of many companies and scientists who dealt with secure and transparent authentication methods for years.
The authentication data is configured on the Authentication Methods tab in the properties of an IPsec rule within an IPsec policy.
other authentication methods that do not support secure authentication methods.