DictionaryForumContacts

   Russian
Terms for subject Microsoft containing проверка подлинности | all forms | exact matches only | in specified order only
RussianEnglish
активность запроса проверки подлинностиauthentication challenge activity (A Windows Workflow Foundation activity that is used to configure a challenge that will be issued to a user in order to authenticate to ILM "2")
анонимная проверка подлинности FTPanonymous FTP authentication (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password)
база данных проверки подлинностиauthentication database (A database on a server that matches user names to passwords)
библиотека для проверки подлинности носителя веб-токенов JSONlibrary for performing JSON Web Token JWT Bearer Authentication (JWT; Azure Active Directory Rori)
встроенная проверка подлинности WindowsIntegrated Windows authentication (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS))
группа ожидания проверки подлинностиchallenge group (The group that consists of requests/connections awaiting authentication)
дайджест-проверка подлинностиdigest authentication
данные проверки подлинностиauthentication data (A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated)
данные проверки подлинностиauthentication information (Windows 7 Rori)
двухфакторная проверка подлинностиtwo-factor authentication (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
делегирование проверки подлинностиauthentication delegation (A method used to authenticate a session that has been opened with the published Web site)
доступ с проверкой подлинностиauthenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site)
доступ с проверкой подлинностиauthenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site. Rori)
запрос проверки подлинностиauthentication challenge (A dialog that requires the user to provide a response in order to authenticate to ILM "2")
Имитация клиента после проверки подлинностиImpersonate a client after authentication (microsoft.com bojana)
код проверки подлинности сообщенияMAC (An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received)
код проверки подлинности сообщенияMessage Authentication Code (An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received)
контроль проверки подлинностиauthentication assurance (A Windows Server feature that provides the ability to determine which logon method was used by a user from his Kerberos token)
метод проверки подлинностиauth method (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network)
метод проверки подлинностиauthentication method (For BitLocker Drive Encryption, a combination of one or more of the following elements, identified by a globally unique identifier (GUID): personal identification number (PIN), recovery password, recovery key, startup key, and Trusted Platform Module (TPM))
метод проверки подлинностиauthentication method (SQL platon)
механизм проверки подлинностиauthentication mechanism (SQL platon)
многофакторная проверка подлинностиmultifactor authentication
модульная проверка подлинностиpluggable authentication (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme)
набор проверки подлинностиauthentication set (In IPsec, a collection of authentication methods that the client proposes during negotiation with the remote host)
Настройте проверку подлинности носителей JWTConfigure JWT Bearer Authentication (Azure Active Directory Rori)
обычная проверка подлинностиbasic authentication
отрицание существования при проверке подлинностиauthenticated denial of existence (The authentication of a DNS query for a record that does not exist)
отрицание существования при проверке подлинностиauthenticated denial of existence (The authentication of a DNS query for a record that does not exist. Rori)
параметры проверки подлинности регистратораRegistrar Authentication Settings (Lync Server 2013 Rori)
повторная попытка проверки подлинностиretry authentication (ssn)
пользователь, прошедший проверку подлинностиauthenticated user (Only authenticated users can create new files and folders – Только пользователи, прошедшие проверку подлинности, могут создавать новые файлы и папки microsoft.com bojana)
поставщик проверки подлинностиauthentication provider (The software component that provides services for authenticating security principals. For example, the implementation of RADIUS is an authentication provider)
приложение для проверки подлинностиAuthenticator (The app that generates security codes that change frequently as part of two-step verification)
проверка подлинностиAuthentication Validation (The label for the goup box that contains options for validating client credentials)
проверка подлинностиgenuine validation (A process that verifies whether installed software is genuine)
проверка подлинностиauthentication (A workflow that is used to perform additional user identity validation before continuing with the request)
проверка подлинности KerberosKerberos authentication (An authentication protocol that provides a mechanism for mutual authentication between a client and a server, or between one server and another, before a network connection is opened between them)
проверка подлинности FTPFTP authentication (ssn)
проверка подлинности KerberosKerberos authentication (An authentication protocol that provides a mechanism for mutual authentication between a client and a server, or between one server and another, before a network connection is opened between them. Rori)
проверка подлинности TLSTLS authentication (Authentication by using the Transport Layer Security (TLS) protocol)
проверка подлинности без шифрованияplaintext authentication
проверка подлинности W-дайджестWDigest authentication (A form of digest authentication that is used when Forefront TMG is installed in a Windows Server 2008 domain. WDigest does not have the requirement that a reversibly encrypted copy of the user password is stored in Active Directory)
проверка подлинности клиентаclient authentication (A method of authentication by which the client in a client-server communication proves its identity to the server)
проверка подлинности маркераtoken authentication (microsoft.com Alex_Odeychuk)
проверка подлинности между лесамиcross-forest authentication (An authentication feature that enables secure access to resources when the user account is in one forest and the computer account is in another forest. This feature allows users to securely access resources in other forests, using either Kerberos or NTLM, without sacrificing the single sign-on and administrative benefits of having only one user ID and password maintained in the user's home forest)
проверка подлинности на основе Active DirectoryActive Directory authentication (ssn)
проверка подлинности на основе маркеров SAMLSAML token-based authentication (microsoft.com bojana)
проверка подлинности на основе протокола NTLMNTLM-based authentication (microsoft.com bojana)
проверка подлинности на основе сертификатаcertificate authentication (A form of IIS authentication in which IIS accepts client-certificates used to prove the client's identity. Using this form of authentication, IIS can optionally map a client certificate to a Windows user account by using an internal mapping table or Active Directory)
проверка подлинности на основе утвержденийclaim-based authentication (microsoft.com bojana)
проверка подлинности на основе утвержденийclaims-based authentication (microsoft.com bojana)
проверка подлинности на основе формforms-based authentication (microsoft.com bojana)
проверка подлинности на уровне сетиnetwork level authentication (ssn)
проверка подлинности на уровне сетиNetwork Level Authentication (An authentication method that completes user authentication before you establish a Remote Desktop connection and the logon screen appears)
проверка подлинности по внешнему удостоверениюexternal identity authentication (ssn)
проверка подлинности по маркеруtoken authentication (microsoft.com Alex_Odeychuk)
проверка подлинности по протоколу KerberosKerberos authentication (microsoft.com bojana)
проверка подлинности подключаемых к ПК временных запоминающих устройствauthentication in host attachments of transient storage devices (ssn)
проверка подлинности проксиproxy authentication (An authentication method that uses a proxy server)
проверка подлинности с помощью пароляpassword authentication
проверка подлинности с сопоставлением сертификата клиентаclient certificate mapping authentication (microsoft.com bojana)
проверка подлинности с сопоставлением SSL-сертификатов клиентовSSL client certificate mapping authentication (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site)
Проверка подлинности сетиNetwork Authentication (Alex Lilo)
проверка подлинности устройстваdevice authentication (Allowing only specific users to connect and configure a device)
Проверка подлинности через ИнтернетInternet Authentication (SQL Server 2008 Rori)
протокол расширенной проверки подлинностиExtensible Authentication Protocol (harser)
протокол IP с проверкой подлинности, AuthIPAuthIP (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements)
протокол IP с проверкой подлинностиAuthenticated Internet Protocol (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements)
протокол IP с проверкой подлинностиAuthenticated IP (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements)
протокол IP с проверкой подлинностиAuthenticated Internet Protocol (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements. Rori)
проходить проверку подлинностиget authenticated (microsoft.com Alex_Odeychuk)
расширенная защита для проверки подлинностиExtended Protection for Authentication (A security feature that helps protect against man-in-the-middle (MITM) attacks)
расширяемый протокол проверки подлинностиExtensible Authentication Protocol (harser)
режим проверки подлинности WindowsWindows authentication mode (platon)
режим проверки подлинностиauthentication mode (SQL platon)
сведения для проверки подлинностиauthentication information (Office System 2010 Rori)
сертификат проверки подлинности клиентаclient authentication certificate (microsoft.com bojana)
сертификат проверки подлинности сервераserver authentication certificate (microsoft.com bojana)
сквозная предварительная проверка подлинностиpass-through preauthentication (microsoft.com bojana)
сквозная проверка подлинностиend-to-end authentication
служба проверки подлинностиauthentication service (A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer)
Служба проверки подлинности в интернетеIAS
событие: повторная попытка проверки подлинностиretry authentication event (Windows 8 ssn)
способ проверки подлинностиauthentication method (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network)
способ проверки подлинностиauthentication option (One of multiple authentication mechanisms or settings that a user can set. Rori)
стандартный протокол IEEE для проверки подлинности подключаемых к ПК временных запоминающих устройствIEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments)
стандартный протокол IEEE для проверки подлинности подключаемых к ПК временных запоминающих устройствIEEE standard protocol for authentication in host attachments of transient storage devices (ssn)
страница проверки подлинностиauthentication page (A Web page presented to unauthenticated users logging on to a site requiring authentication with a Web browser)
строгая проверка подлинностиstrong authentication (Authentication by means of cryptographically derived credentials (as opposed to simple authentication which uses simple password arrangements))
строка проверки подлинностиAuthentication string (Alastriona)
структура проверки подлинностиauthenticator (A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC))
тип проверки подлинностиauthentication type (SQL platon)
трёхфакторная проверка подлинностиthree-factor authentication
удалённая проверка подлинности на основе Active Directoryremote Active Directory authentication (ssn)
удалённая проверка подлинности на основе Active Directoryremote Active Directory authentication (A feature that enables IT professionals to activate Windows-based computers based on user identities in the Active Directory, without requiring additional infrastructure)
учётные данные для проверки подлинностиauthentication credentials (Arkadi Burkov)