-
1 authentication method
"The authentication protocol (such as CHAP, PAP, EAP etc.) used when authenticating access to resources on a network." -
2 multifactor authentication
"An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature."English-Arabic terms dictionary > multifactor authentication
-
3 three-factor authentication
"An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature."English-Arabic terms dictionary > three-factor authentication
-
4 two-factor authentication
"An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature." -
5 Digest authentication
"An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems." -
6 proxy authentication
An authentication method that uses a proxy server. -
7 distributed password authentication
"An advanced, distributed method of user authentication from Microsoft, allowing for single user log-on."English-Arabic terms dictionary > distributed password authentication
-
8 delegated authentication
A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources.مصادقة مفوَّضة -
9 SSL client certificate mapping authentication
A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site.English-Arabic terms dictionary > SSL client certificate mapping authentication
-
10 DPA
"An advanced, distributed method of user authentication from Microsoft, allowing for single user log-on." -
11 push-button configuration
"In some Wi-Fi Protected Setup networks, a method that enables users to push a physical or software-based button to automatically configure network names, connect devices to the network, and enable data encryption and authentication." -
12 PBC
"In some Wi-Fi Protected Setup networks, a method that enables users to push a physical or software-based button to automatically configure network names, connect devices to the network, and enable data encryption and authentication." -
13 IP allow list
"A list of IP addresses that are considered ""safe"" by an authority. IP addresses in this list are allowed access to a given resource or web service and are thereby excluded from further processing of access control policies that would otherwise be used to determine the validity of that clients request for access. For example, an IP allow list can be used to exclude a trusted set of clients from needing to use a second-factor of authentication to sign in to a web service, while other clients that are not in the list would have no other choice but to provide a second-factor method to be successfully authenticated."
См. также в других словарях:
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
authentication — /ɔ:ˌθentɪ keɪʃ(ə)n/ noun 1. an action of checking that something is true, such as an instruction sent to a bank by email 2. a method of proving the identity of a person or company COMMENT: Authentication is particularly important on the Internet… … Dictionary of banking and finance
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Transaction authentication — generally refers to the Internet based security method of securely identifying a user through two or three factor authentication (Two factor authentication: something you know plus something you have and/or something you are) at a transaction… … Wikipedia
Protected Extensible Authentication Protocol — PEAP is also an acronym for Personal Egress Air Packs. Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced peep ), is a method to securely transmit authentication information, including passwords, over wired or … Wikipedia
E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… … Wikipedia
Lightweight Extensible Authentication Protocol — The Lightweight Extensible Authentication Protocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features of LEAP are dynamic WEP keys and mutual authentication (between a wireless client and a… … Wikipedia
clear text authentication — An authentication method that encodes user name and password information according to a freely available 64 bit encoding utility. See also challenge response authentication; encryption … Dictionary of networking
pass-through authentication — In Microsoft Windows NT, an authentication method used when the user account must be authenticated,butthecomputerusedforthe logon is neither the domain controller for the account nor the computer on which the user account is defined. In such a … Dictionary of networking