Russian | English |
активность запроса проверки подлинности | authentication challenge activity (A Windows Workflow Foundation activity that is used to configure a challenge that will be issued to a user in order to authenticate to ILM "2") |
анонимная проверка подлинности FTP | anonymous FTP authentication (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password) |
база данных проверки подлинности | authentication database (A database on a server that matches user names to passwords) |
библиотека для проверки подлинности носителя веб-токенов JSON | library for performing JSON Web Token JWT Bearer Authentication (JWT; Azure Active Directory Rori) |
встроенная проверка подлинности Windows | Integrated Windows authentication (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS)) |
группа ожидания проверки подлинности | challenge group (The group that consists of requests/connections awaiting authentication) |
дайджест-проверка подлинности | digest authentication |
данные проверки подлинности | authentication data (A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated) |
данные проверки подлинности | authentication information (Windows 7 Rori) |
двухфакторная проверка подлинности | two-factor authentication (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |
делегирование проверки подлинности | authentication delegation (A method used to authenticate a session that has been opened with the published Web site) |
доступ с проверкой подлинности | authenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site) |
доступ с проверкой подлинности | authenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site. Rori) |
запрос проверки подлинности | authentication challenge (A dialog that requires the user to provide a response in order to authenticate to ILM "2") |
Имитация клиента после проверки подлинности | Impersonate a client after authentication (microsoft.com bojana) |
код проверки подлинности сообщения | MAC (An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received) |
код проверки подлинности сообщения | Message Authentication Code (An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received) |
контроль проверки подлинности | authentication assurance (A Windows Server feature that provides the ability to determine which logon method was used by a user from his Kerberos token) |
метод проверки подлинности | auth method (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network) |
метод проверки подлинности | authentication method (For BitLocker Drive Encryption, a combination of one or more of the following elements, identified by a globally unique identifier (GUID): personal identification number (PIN), recovery password, recovery key, startup key, and Trusted Platform Module (TPM)) |
метод проверки подлинности | authentication method (SQL platon) |
механизм проверки подлинности | authentication mechanism (SQL platon) |
многофакторная проверка подлинности | multifactor authentication |
модульная проверка подлинности | pluggable authentication (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme) |
набор проверки подлинности | authentication set (In IPsec, a collection of authentication methods that the client proposes during negotiation with the remote host) |
Настройте проверку подлинности носителей JWT | Configure JWT Bearer Authentication (Azure Active Directory Rori) |
обычная проверка подлинности | basic authentication |
отрицание существования при проверке подлинности | authenticated denial of existence (The authentication of a DNS query for a record that does not exist) |
отрицание существования при проверке подлинности | authenticated denial of existence (The authentication of a DNS query for a record that does not exist. Rori) |
параметры проверки подлинности регистратора | Registrar Authentication Settings (Lync Server 2013 Rori) |
повторная попытка проверки подлинности | retry authentication (ssn) |
пользователь, прошедший проверку подлинности | authenticated user (Only authenticated users can create new files and folders – Только пользователи, прошедшие проверку подлинности, могут создавать новые файлы и папки microsoft.com bojana) |
поставщик проверки подлинности | authentication provider (The software component that provides services for authenticating security principals. For example, the implementation of RADIUS is an authentication provider) |
приложение для проверки подлинности | Authenticator (The app that generates security codes that change frequently as part of two-step verification) |
проверка подлинности | Authentication Validation (The label for the goup box that contains options for validating client credentials) |
проверка подлинности | genuine validation (A process that verifies whether installed software is genuine) |
проверка подлинности | authentication (A workflow that is used to perform additional user identity validation before continuing with the request) |
проверка подлинности Kerberos | Kerberos authentication (An authentication protocol that provides a mechanism for mutual authentication between a client and a server, or between one server and another, before a network connection is opened between them) |
проверка подлинности FTP | FTP authentication (ssn) |
проверка подлинности Kerberos | Kerberos authentication (An authentication protocol that provides a mechanism for mutual authentication between a client and a server, or between one server and another, before a network connection is opened between them. Rori) |
проверка подлинности TLS | TLS authentication (Authentication by using the Transport Layer Security (TLS) protocol) |
проверка подлинности без шифрования | plaintext authentication |
проверка подлинности W-дайджест | WDigest authentication (A form of digest authentication that is used when Forefront TMG is installed in a Windows Server 2008 domain. WDigest does not have the requirement that a reversibly encrypted copy of the user password is stored in Active Directory) |
проверка подлинности клиента | client authentication (A method of authentication by which the client in a client-server communication proves its identity to the server) |
проверка подлинности маркера | token authentication (microsoft.com Alex_Odeychuk) |
проверка подлинности между лесами | cross-forest authentication (An authentication feature that enables secure access to resources when the user account is in one forest and the computer account is in another forest. This feature allows users to securely access resources in other forests, using either Kerberos or NTLM, without sacrificing the single sign-on and administrative benefits of having only one user ID and password maintained in the user's home forest) |
проверка подлинности на основе Active Directory | Active Directory authentication (ssn) |
проверка подлинности на основе маркеров SAML | SAML token-based authentication (microsoft.com bojana) |
проверка подлинности на основе протокола NTLM | NTLM-based authentication (microsoft.com bojana) |
проверка подлинности на основе сертификата | certificate authentication (A form of IIS authentication in which IIS accepts client-certificates used to prove the client's identity. Using this form of authentication, IIS can optionally map a client certificate to a Windows user account by using an internal mapping table or Active Directory) |
проверка подлинности на основе утверждений | claim-based authentication (microsoft.com bojana) |
проверка подлинности на основе утверждений | claims-based authentication (microsoft.com bojana) |
проверка подлинности на основе форм | forms-based authentication (microsoft.com bojana) |
проверка подлинности на уровне сети | network level authentication (ssn) |
проверка подлинности на уровне сети | Network Level Authentication (An authentication method that completes user authentication before you establish a Remote Desktop connection and the logon screen appears) |
проверка подлинности по внешнему удостоверению | external identity authentication (ssn) |
проверка подлинности по маркеру | token authentication (microsoft.com Alex_Odeychuk) |
проверка подлинности по протоколу Kerberos | Kerberos authentication (microsoft.com bojana) |
проверка подлинности подключаемых к ПК временных запоминающих устройств | authentication in host attachments of transient storage devices (ssn) |
проверка подлинности прокси | proxy authentication (An authentication method that uses a proxy server) |
проверка подлинности с помощью пароля | password authentication |
проверка подлинности с сопоставлением сертификата клиента | client certificate mapping authentication (microsoft.com bojana) |
проверка подлинности с сопоставлением SSL-сертификатов клиентов | SSL client certificate mapping authentication (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site) |
Проверка подлинности сети | Network Authentication (Alex Lilo) |
проверка подлинности устройства | device authentication (Allowing only specific users to connect and configure a device) |
Проверка подлинности через Интернет | Internet Authentication (SQL Server 2008 Rori) |
протокол расширенной проверки подлинности | Extensible Authentication Protocol (harser) |
протокол IP с проверкой подлинности, AuthIP | AuthIP (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements) |
протокол IP с проверкой подлинности | Authenticated Internet Protocol (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements) |
протокол IP с проверкой подлинности | Authenticated IP (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements) |
протокол IP с проверкой подлинности | Authenticated Internet Protocol (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements. Rori) |
проходить проверку подлинности | get authenticated (microsoft.com Alex_Odeychuk) |
расширенная защита для проверки подлинности | Extended Protection for Authentication (A security feature that helps protect against man-in-the-middle (MITM) attacks) |
расширяемый протокол проверки подлинности | Extensible Authentication Protocol (harser) |
режим проверки подлинности Windows | Windows authentication mode (platon) |
режим проверки подлинности | authentication mode (SQL platon) |
сведения для проверки подлинности | authentication information (Office System 2010 Rori) |
сертификат проверки подлинности клиента | client authentication certificate (microsoft.com bojana) |
сертификат проверки подлинности сервера | server authentication certificate (microsoft.com bojana) |
сквозная предварительная проверка подлинности | pass-through preauthentication (microsoft.com bojana) |
сквозная проверка подлинности | end-to-end authentication |
служба проверки подлинности | authentication service (A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer) |
Служба проверки подлинности в интернете | IAS |
событие: повторная попытка проверки подлинности | retry authentication event (Windows 8 ssn) |
способ проверки подлинности | authentication method (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network) |
способ проверки подлинности | authentication option (One of multiple authentication mechanisms or settings that a user can set. Rori) |
стандартный протокол IEEE для проверки подлинности подключаемых к ПК временных запоминающих устройств | IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments) |
стандартный протокол IEEE для проверки подлинности подключаемых к ПК временных запоминающих устройств | IEEE standard protocol for authentication in host attachments of transient storage devices (ssn) |
страница проверки подлинности | authentication page (A Web page presented to unauthenticated users logging on to a site requiring authentication with a Web browser) |
строгая проверка подлинности | strong authentication (Authentication by means of cryptographically derived credentials (as opposed to simple authentication which uses simple password arrangements)) |
строка проверки подлинности | Authentication string (Alastriona) |
структура проверки подлинности | authenticator (A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)) |
тип проверки подлинности | authentication type (SQL platon) |
трёхфакторная проверка подлинности | three-factor authentication |
удалённая проверка подлинности на основе Active Directory | remote Active Directory authentication (ssn) |
удалённая проверка подлинности на основе Active Directory | remote Active Directory authentication (A feature that enables IT professionals to activate Windows-based computers based on user identities in the Active Directory, without requiring additional infrastructure) |
учётные данные для проверки подлинности | authentication credentials (Arkadi Burkov) |