-
1 authentication method
в виртуальной частной сети (ВЧС, VPN) - процедура верификации, применяемая для установления подлинности (идентичности) отправителя сообщенияАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > authentication method
-
2 authentication method
"The authentication protocol (such as CHAP, PAP, EAP etc.) used when authenticating access to resources on a network." -
3 authentication method
Майкрософт: метод проверки подлинности (SQL) -
4 authentication method
metoda uwierzytelnianiaEnglish-Polish dictionary for engineers > authentication method
-
5 authentication method
metoda uwierzytelnianiaEnglish-Polish dictionary of Electronics and Computer Science > authentication method
-
6 asymmetric authentication method
асимметричный метод аутентификации
Метод аутентификации, при котором не вся информация об аутентификации совместно используется обеими сторонами.
Рекомендация МСЭ-Т X.811.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > asymmetric authentication method
-
7 symmetric authentication method
симметричный метод аутентификации
Метод аутентификации, при котором оба объекта совместно используют общую информацию об аутентификации. Рекомендация МСЭ-Т X.811.
[ http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=4651]Тематики
EN
Англо-русский словарь нормативно-технической терминологии > symmetric authentication method
-
8 User Authentication Method
File extension: UAMУниверсальный русско-английский словарь > User Authentication Method
-
9 authentication
аутентификация, опознавание, проверка (подтверждение) подлинности1) в системе компьютерной безопасности - процесс, позволяющий установить, что пользователь или компьютер (сервер), пытающийся получить интерактивный доступ к определённой категории информации, компьютерной системе, вычислительной сети или электронной почте, действительно тот, за кого себя выдаёт. Выполняется с помощью дополнительных идентификаторов - биометрической информации, паролей, специальных карточек, цифровой подписи и др. В компьютерной системе пользователю обычно присваивается символическое имя или идентификационный код (SID), используемые в дальнейшем процедурами управления доступом (см. access control); аутентификация отличается от авторизации (authorization) тем, что не управляет предоставлением или непредоставлением права доступа к ресурсамсм. тж. authentication algorithm, authentication alias, authentication center, authentication data, authentication device, authentication level, authentication method, authentication password, authentication service, authentication token, authentication type, mutual authentication, PAP, password-based authentication, user authentication2) установление подлинности сообщения, источника (data origin authentication) и/или приёмника данныхАнгло-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. > authentication
-
10 multifactor authentication
"An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature."English-Arabic terms dictionary > multifactor authentication
-
11 three-factor authentication
"An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature."English-Arabic terms dictionary > three-factor authentication
-
12 two-factor authentication
"An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature." -
13 Digest authentication
"An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems." -
14 proxy authentication
An authentication method that uses a proxy server. -
15 distributed password authentication
"An advanced, distributed method of user authentication from Microsoft, allowing for single user log-on."English-Arabic terms dictionary > distributed password authentication
-
16 delegated authentication
A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources.مصادقة مفوَّضة -
17 SSL client certificate mapping authentication
A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site.English-Arabic terms dictionary > SSL client certificate mapping authentication
-
18 metoda uwierzytelniania
• authentication methodSłownik polsko-angielski z Elektroniki i Informatyki > metoda uwierzytelniania
-
19 metoda uwierzytelniania
• authentication methodSłownik polsko-angielski dla inżynierów > metoda uwierzytelniania
-
20 асимметричный метод аутентификации
асимметричный метод аутентификации
Метод аутентификации, при котором не вся информация об аутентификации совместно используется обеими сторонами.
Рекомендация МСЭ-Т X.811.
[http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d=23]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > асимметричный метод аутентификации
- 1
- 2
См. также в других словарях:
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
authentication — /ɔ:ˌθentɪ keɪʃ(ə)n/ noun 1. an action of checking that something is true, such as an instruction sent to a bank by email 2. a method of proving the identity of a person or company COMMENT: Authentication is particularly important on the Internet… … Dictionary of banking and finance
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Transaction authentication — generally refers to the Internet based security method of securely identifying a user through two or three factor authentication (Two factor authentication: something you know plus something you have and/or something you are) at a transaction… … Wikipedia
Protected Extensible Authentication Protocol — PEAP is also an acronym for Personal Egress Air Packs. Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced peep ), is a method to securely transmit authentication information, including passwords, over wired or … Wikipedia
E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… … Wikipedia
Lightweight Extensible Authentication Protocol — The Lightweight Extensible Authentication Protocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features of LEAP are dynamic WEP keys and mutual authentication (between a wireless client and a… … Wikipedia
clear text authentication — An authentication method that encodes user name and password information according to a freely available 64 bit encoding utility. See also challenge response authentication; encryption … Dictionary of networking
pass-through authentication — In Microsoft Windows NT, an authentication method used when the user account must be authenticated,butthecomputerusedforthe logon is neither the domain controller for the account nor the computer on which the user account is defined. In such a … Dictionary of networking