Greek | English |
Έλεγχος ταυτότητας μέσω φορμών | forms-based authentication (A service that enables applications to provide their own logon UI and to verify credentials independently) |
Έλεγχος ταυτότητας με αντιστοίχιση πιστοποιητικών προγραμμάτων-πελατών SSL | SSL client certificate mapping authentication (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site) |
έλεγχος ταυτότητας | authentication (The process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity. Common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords) |
έλεγχος ταυτότητας απλού κειμένου | plaintext authentication (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network) |
έλεγχος ταυτότητας βασισμένος σε δηλώσεις | claims-based authentication (The process of authenticating a user based on a set of claims about the user's identity contained in a trusted token. This token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication) |
έλεγχος ταυτότητας διακομιστή μεσολάβησης | proxy authentication (An authentication method that uses a proxy server) |
έλεγχος ταυτότητας δύο παραγόντων | two-factor authentication (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |
έλεγχος ταυτότητας μέσω πιστοποιητικού | certificate authentication (A form of IIS authentication in which IIS accepts client-certificates used to prove the client's identity. Using this form of authentication, IIS can optionally map a client certificate to a Windows user account by using an internal mapping table or Active Directory) |
έλεγχος ταυτότητας με ανάθεση | delegated authentication (A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources) |
έλεγχος ταυτότητας με δυνατότητα σύνδεσης | pluggable authentication (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme) |
έλεγχος ταυτότητας πολλών παραγόντων | multifactor authentication (An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |
έλεγχος ταυτότητας προγράμματος-πελάτη | client authentication (A method of authentication by which the client in a client-server communication proves its identity to the server) |
έλεγχος ταυτότητας πρόσβασης | authenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site) |
έλεγχος ταυτότητας τριών παραγόντων | three-factor authentication (An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |
ανώνυμος έλεγχος ταυτότητας FTP | anonymous FTP authentication (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password) |
ανώνυμος έλεγχος ταυτότητας | Anonymous authentication (An authentication mechanism that does not require user accounts and passwords) |
αποκήρυξη ταυτότητας | repudiation (The ability of a user to falsely deny having performed an action that other parties cannot prove otherwise. For example, a user who deleted a file can successfully deny doing so if no mechanism (such as audit files) can prove otherwise) |
απόκρυψη ταυτότητας | anonymizer (Software or web service that provides an anonymous proxy designed to make user identity untraceable) |
Bασικός έλεγχος ταυτότητας | Basic authentication (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network) |
βάση δεδομένων ελέγχου ταυτότητας | authentication database (A database on a server that matches user names to passwords) |
δεδομένα ελέγχου ταυτότητας | authentication data (A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated) |
δελτίο ελέγχου ταυτότητας | authentication ticket (A ticket that Commerce Server creates for registered users) |
διαχείριση ταυτοτήτων | identity management (The the management of the identity life cycle of entities (e.g. people, computers) during which the identity is created, documented and destroyed) |
Ενσωματωμένος έλεγχος ταυτότητας των Windows | Integrated Windows authentication (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS)) |
επαλήθευση ταυτότητας | identity verification (The process of confirming the identity of an individual or business who is applying to the store as a developer/vendor) |
εφαρμογή πιστοποίησης ταυτότητας | Authenticator (The app that generates security codes that change frequently as part of two-step verification) |
ηλεκτρονική ταυτότητα | online identity (A single set of sign-in credentials (typically, e-mail address and password) that is used to access the services provided by an online service provider (OSP)) |
ιδιότητα ταυτότητας | identity property (A property that generates values that uniquely identify each row in a table) |
κλειδί επιβεβαίωσης ταυτότητας | attestation identity key (The cryptographic representation of the hardware or software state and other integrity metrics, and which can be used to perform anonymous or pseudo-anonymous attestations to remote parties in multiparty transactions) |
κύκλος ζωής ταυτότητας | identity life cycle (The stages an identity goes through from the time it is conceived until the time it is destroyed) |
κώδικας ελέγχου ταυτότητας μηνύματος | Message Authentication Code (An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received) |
μέθοδος ελέγχου ταυτότητας | authentication method (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network) |
IP με έλεγχο ταυτότητας | Authenticated IP (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements) |
πιστοποιητικό ταυτότητας | authenticator (A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)) |
πολλαπλές ταυτότητες | multiple identities (Multiple Web sites that are hosted on one computer) |
πρωτόκολλο ασφαλούς ελέγχου ταυτότητας με κωδικό πρόσβασης | Shiva Password Authentication Protocol (A two-way, reversible encryption mechanism for authenticating PPP connections employed by Shiva remote access servers) |
πρωτόκολλο ελέγχου ταυτότητας Kerberos V5 | Kerberos V5 authentication protocol (An authentication mechanism used to verify user or host identity. The Kerberos V5 authentication protocol is the default authentication service. Internet Protocol security (IPsec) can use the Kerberos protocol for authentication) |
πρωτόκολλο ελέγχου ταυτότητας μέσω ανταλλαγής χειραψίας | Challenge Handshake Authentication Protocol (A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response) |
Πρωτόκολλο Internet με έλεγχο ταυτότητας | Authenticated Internet Protocol (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements) |
στήλη ταυτότητας | identity column (A column in a table that has been assigned the identity property) |
συνδεδεμένος, η ταυτότητα του χρήστη ελέγχθηκε | connected, user authenticated (A user's status when a telephone connection has been established and the user has entered a correct user name and password. If the user has callback permission and has requested callback, the connection is followed by the calling-back phase. If the calling-back phase is followed by a waiting-for-call phase, then the server was unable to reach the user at the specified number. The user may have supplied an inaccurate callback number (in the case of set-by-caller callback), or an unauthorized attempt to access the network may be under way (in the case of preset-to callback)) |
Συνοπτικός έλεγχος ταυτότητας | Digest authentication (An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems) |
συσχέτιση ηλεκτρονικής ταυτότητας | online identity association (The binding of an online identity with the user account on a given PC. Once the association exists, the online identity can be used as a pointer to the user account. For example, with remote media connection, the online identity can be used to point to PC names and IP addresses) |
σύνολο ελέγχου ταυτότητας | authentication set (In IPsec, a collection of authentication methods that the client proposes during negotiation with the remote host) |
ταυτότητα βασισμένη σε δηλώσεις | claims-based identity (A unique identifier that represents a specific user, application, computer, or other entity, enabling it to gain access to multiple resources, such as applications and network resources, without entering credentials multiple times. It also enables resources to validate requests from an entity) |
ταυτότητα εμπορικής επωνυμίας | brand identity (A company's or partner's logo, fonts, and colour themes or schemes intended to visually signify who and what the company is) |
ταυτότητα πακέτου | package identity (The element of a .appx package that identifies the name of the package. This name is an internal data element of the .appx package and is not seen by the end-user customer) |
ταυτότητα χρήστη | user identity (" Identity assigned to a user during authentication. For example, the user identity of anonymous users would be the default "iusr" account. ") |
Τυπικό πρωτόκολλο του ΙΕΕΕ για έλεγχο ταυτότητας σε προσαρτήσεις υποδοχών για συσκευές μεταβατικής αποθήκευσης | IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments) |
Υπηρεσία απομακρυσμένου ελέγχου ταυτότητας χρηστών εισερχόμενων κλήσεων | Remote Authentication Dial-In User Service (A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link) |
υπηρεσία ελέγχου ταυτότητας | authentication service (A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer) |
χαρακτήρας διαφυγής ταυτότητας | identity escape (In regular expressions, a backslash followed by a single character. It matches that character and is required when the character has a special meaning; by using the identity escape, the special meaning is removed) |
χρήση ομοσπονδιακών ταυτοτήτων | identity federation (A process in Microsoft Online Services that uses Active Directory Federation Services 2.0 and Microsoft Federation Gateway to securely represent identities in the cloud and tie those identities to corporate credentials (user name and password). Users can then use their corporate credentials to sign in once to access the services in Microsoft Online Services) |
χώρος αποθήκευσης ταυτοτήτων | identity store (An area on a computer where identities are stored) |
ψηφιακή ταυτότητα | Digital ID (A combination of a digital certificate and a public and private encryption key set) |