-
21 cryptobinding
-
22 Wired AutoConfig Service
A system service that provisions local area network (LAN) Ethernet adapters with the security and connectivity settings that are required for Institute of Electrical and Electronics Engineers (IEEE) 802.1X authenticated IEEE 802.3 wired access. -
23 usage type
"In Exchange Server 2007, the type of connector that is determined by the intended use of the connector. The usage type determines the default settings for the connector. This includes the SIDs that are authenticated, the permissions that are assigned to those SIDs, and the authentication mechanism." -
24 dial-in conferencing
"A feature that merges public switched telephone network (PSTN) and Voice over IP (VoIP) conferences, which allows participants to dial in to a conference from anywhere as an authenticated user without having to be on the corporate network. Typically, a local number is provided to avoid long-distance fees." -
25 pass-through authentication
"The process by which a user account is authenticated when the computer being used for the logon is not a domain controller in the domain where the user account is defined and is also not the computer where the account is defined. In this process, the computer passes the logon information through to a domain controller (directly or indirectly) where the user account is defined."English-Arabic terms dictionary > pass-through authentication
-
26 anonymous user
"An external user who does not have credentials in the Active Directory Domain Services. Unlike a federated user, an anonymous user is not authenticated." -
27 authentication data
"A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated." -
28 flexible authentication
An authentication process where users in a variety of identity management systems can be authenticated. -
29 Cloud App Model
"An application-hosting architecture that relies on cloud-based services. Application logic and data are typically hosted on a distributed set of services on the Internet, connected through web APIs, and authenticated with server-to-server authentication technologies such as OAuth." -
30 IP allow list
"A list of IP addresses that are considered ""safe"" by an authority. IP addresses in this list are allowed access to a given resource or web service and are thereby excluded from further processing of access control policies that would otherwise be used to determine the validity of that clients request for access. For example, an IP allow list can be used to exclude a trusted set of clients from needing to use a second-factor of authentication to sign in to a web service, while other clients that are not in the list would have no other choice but to provide a second-factor method to be successfully authenticated."
- 1
- 2
См. также в других словарях:
authenticated — adj. 1. established or certified as genuine. Syn: attested, documented. [WordNet 1.5] … The Collaborative International Dictionary of English
authenticated — index actual, definitive, fully executed (signed), genuine, official, true (authentic) Burt … Law dictionary
Authenticated — Authenticate Au*then ti*cate, v. t. [imp. & p. p. {Authenticated}; p. pr. & vb. n. {Authenticating} (?).] [Cf. LL. authenticare.] 1. To render authentic; to give authority to, by the proof, attestation, or formalities required by law, or… … The Collaborative International Dictionary of English
authenticated — un·authenticated; … English syllables
Authenticated encryption — (AE) is a term used to describe encryption systems which simultaneously protect confidentiality and authenticity (integrity) of communications. These goals have long been studied, but they have only recently enjoyed a high level of interest from… … Wikipedia
Authenticated Identity Body — Saltar a navegación, búsqueda Authenticated Identity Body o AIB es un método para compartir una identidad autenticada entre los participantes de una red, permitiendo a un miembro firmar criptográficamente las cabeceras que aseguran la identidad… … Wikipedia Español
Authenticated Identity Body — or AIB is a way of sharing authenticated identity among parties in a network, allowing a party in a SIP transaction to cryptographically sign the headers that assert the identity of the originator of a message, and provide some other headers… … Wikipedia
authenticated confirmation — index certification (attested copy), reference (recommendation) Burton s Legal Thesaurus. William C. Burton. 2006 … Law dictionary
authenticated incident — index fact Burton s Legal Thesaurus. William C. Burton. 2006 … Law dictionary
Authenticated Post Office Protocol — [Abk. APOP, dt. »beglaubigtes Postamtsprotokoll«), eine Erweiterung von POP3, mit dem im Internet E Mail Clients die Nachrichten vom Mail Server abholen. Bei APOP wird dabei im Gegensatz zu POP3 das Passwort zur Authentifizierung verschlüsselt… … Universal-Lexikon
Authenticated TURN — On Demand Mail Relay (ODMR) oder Authenticated TURN (ATRN) ist eine Erweiterung für das E Mail Protokoll Simple Mail Transfer Protocol (SMTP). ODMR ist in RFC 2645 definiert. ODMR ist ein E Mail Dienst, der es Benutzern erlaubt, nach… … Deutsch Wikipedia