-
1 Authenticated IP
A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements. -
2 authenticated access
A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site. -
3 Authenticated copy
صورة مصدق عليها، صورة معتمدة طبق الأصل، صورة رسمية -
4 Authenticated documents
مستندات رسمية، مستندات مصدق عليها -
5 Authenticated protest
بروتستو رسمي -
6 Authenticated Internet Protocol
A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements.English-Arabic terms dictionary > Authenticated Internet Protocol
-
7 connected, user authenticated
"A user's status when a telephone connection has been established and the user has entered a correct user name and password. If the user has callback permission and has requested callback, the connection is followed by the calling-back phase. If the calling-back phase is followed by a waiting-for-call phase, then the server was unable to reach the user at the specified number. The user may have supplied an inaccurate callback number (in the case of set-by-caller callback), or an unauthorized attempt to access the network may be under way (in the case of preset-to callback).""متصل، تمت المصادقة على المستخدم"English-Arabic terms dictionary > connected, user authenticated
-
8 external access
Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content. -
9 virtual private network
"The extension of a private network that encompasses encapsulated, encrypted, and authenticated links across shared or public networks. VPN connections typically provide remote access and router-to-router connections to private networks over the Internet." -
10 VPN
"The extension of a private network that encompasses encapsulated, encrypted, and authenticated links across shared or public networks. VPN connections typically provide remote access and router-to-router connections to private networks over the Internet." -
11 authorized user
A user who has been authenticated and who has access to objects and tasks in the system. -
12 Point-to-Point Protocol over Ethernet
"A specification for connecting users on an Ethernet network to the Internet through a broadband connection, such as a single DSL line, wireless device, or cable modem. Using PPPoE and a broadband modem, LAN users can gain individual authenticated access to high-speed data networks. By combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an efficient way to create a separate connection for each user to a remote server."English-Arabic terms dictionary > Point-to-Point Protocol over Ethernet
-
13 PPPoE
"A specification for connecting users on an Ethernet network to the Internet through a broadband connection, such as a single DSL line, wireless device, or cable modem. Using PPPoE and a broadband modem, LAN users can gain individual authenticated access to high-speed data networks. By combining Ethernet and Point-to-Point Protocol (PPP), PPPoE provides an efficient way to create a separate connection for each user to a remote server." -
14 trusted connection
A Windows network connection that can be opened only by users who have been authenticated by the network. -
15 one-way trust
"A trust relationship between two domains in which only one of the two domains trusts the other domain. For example, domain A trusts domain B, and domain B does not trust domain A. One-way trusts are often used to enable authenticated access to resource domains." -
16 membership user
An authenticated user of a Web site. -
17 Security Support Provider Interface
"A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details."English-Arabic terms dictionary > Security Support Provider Interface
-
18 SSPI
"A common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security support providers (SSPs), such as Windows Distributed Security. SSPI allows a transport application to call one of the SSPs to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details." -
19 trust level
"A characterization of an external entity based on how it is authenticated and what privileges it has. Trust levels can be associated with entry points, personas, assets, or other protected resources." -
20 supplicant
An entity at one end of a point-to-point LAN/WLAN segment that is requesting authenticated access to the network.
- 1
- 2
См. также в других словарях:
authenticated — adj. 1. established or certified as genuine. Syn: attested, documented. [WordNet 1.5] … The Collaborative International Dictionary of English
authenticated — index actual, definitive, fully executed (signed), genuine, official, true (authentic) Burt … Law dictionary
Authenticated — Authenticate Au*then ti*cate, v. t. [imp. & p. p. {Authenticated}; p. pr. & vb. n. {Authenticating} (?).] [Cf. LL. authenticare.] 1. To render authentic; to give authority to, by the proof, attestation, or formalities required by law, or… … The Collaborative International Dictionary of English
authenticated — un·authenticated; … English syllables
Authenticated encryption — (AE) is a term used to describe encryption systems which simultaneously protect confidentiality and authenticity (integrity) of communications. These goals have long been studied, but they have only recently enjoyed a high level of interest from… … Wikipedia
Authenticated Identity Body — Saltar a navegación, búsqueda Authenticated Identity Body o AIB es un método para compartir una identidad autenticada entre los participantes de una red, permitiendo a un miembro firmar criptográficamente las cabeceras que aseguran la identidad… … Wikipedia Español
Authenticated Identity Body — or AIB is a way of sharing authenticated identity among parties in a network, allowing a party in a SIP transaction to cryptographically sign the headers that assert the identity of the originator of a message, and provide some other headers… … Wikipedia
authenticated confirmation — index certification (attested copy), reference (recommendation) Burton s Legal Thesaurus. William C. Burton. 2006 … Law dictionary
authenticated incident — index fact Burton s Legal Thesaurus. William C. Burton. 2006 … Law dictionary
Authenticated Post Office Protocol — [Abk. APOP, dt. »beglaubigtes Postamtsprotokoll«), eine Erweiterung von POP3, mit dem im Internet E Mail Clients die Nachrichten vom Mail Server abholen. Bei APOP wird dabei im Gegensatz zu POP3 das Passwort zur Authentifizierung verschlüsselt… … Universal-Lexikon
Authenticated TURN — On Demand Mail Relay (ODMR) oder Authenticated TURN (ATRN) ist eine Erweiterung für das E Mail Protokoll Simple Mail Transfer Protocol (SMTP). ODMR ist in RFC 2645 definiert. ODMR ist ein E Mail Dienst, der es Benutzern erlaubt, nach… … Deutsch Wikipedia