DictionaryForumContacts

   Greek
Terms for subject Microsoft containing ταυτότητα | all forms
GreekEnglish
Έλεγχος ταυτότητας μέσω φορμώνforms-based authentication (A service that enables applications to provide their own logon UI and to verify credentials independently)
Έλεγχος ταυτότητας με αντιστοίχιση πιστοποιητικών προγραμμάτων-πελατών SSLSSL client certificate mapping authentication (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site)
έλεγχος ταυτότηταςauthentication (The process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity. Common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords)
έλεγχος ταυτότητας απλού κειμένουplaintext authentication (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
έλεγχος ταυτότητας βασισμένος σε δηλώσειςclaims-based authentication (The process of authenticating a user based on a set of claims about the user's identity contained in a trusted token. This token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication)
έλεγχος ταυτότητας διακομιστή μεσολάβησηςproxy authentication (An authentication method that uses a proxy server)
έλεγχος ταυτότητας δύο παραγόντωνtwo-factor authentication (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
έλεγχος ταυτότητας μέσω πιστοποιητικούcertificate authentication (A form of IIS authentication in which IIS accepts client-certificates used to prove the client's identity. Using this form of authentication, IIS can optionally map a client certificate to a Windows user account by using an internal mapping table or Active Directory)
έλεγχος ταυτότητας με ανάθεσηdelegated authentication (A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources)
έλεγχος ταυτότητας με δυνατότητα σύνδεσηςpluggable authentication (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme)
έλεγχος ταυτότητας πολλών παραγόντωνmultifactor authentication (An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
έλεγχος ταυτότητας προγράμματος-πελάτηclient authentication (A method of authentication by which the client in a client-server communication proves its identity to the server)
έλεγχος ταυτότητας πρόσβασηςauthenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site)
έλεγχος ταυτότητας τριών παραγόντωνthree-factor authentication (An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
ανώνυμος έλεγχος ταυτότητας FTPanonymous FTP authentication (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password)
ανώνυμος έλεγχος ταυτότηταςAnonymous authentication (An authentication mechanism that does not require user accounts and passwords)
αποκήρυξη ταυτότηταςrepudiation (The ability of a user to falsely deny having performed an action that other parties cannot prove otherwise. For example, a user who deleted a file can successfully deny doing so if no mechanism (such as audit files) can prove otherwise)
απόκρυψη ταυτότηταςanonymizer (Software or web service that provides an anonymous proxy designed to make user identity untraceable)
Bασικός έλεγχος ταυτότηταςBasic authentication (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
βάση δεδομένων ελέγχου ταυτότηταςauthentication database (A database on a server that matches user names to passwords)
δεδομένα ελέγχου ταυτότηταςauthentication data (A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated)
δελτίο ελέγχου ταυτότηταςauthentication ticket (A ticket that Commerce Server creates for registered users)
διαχείριση ταυτοτήτωνidentity management (The the management of the identity life cycle of entities (e.g. people, computers) during which the identity is created, documented and destroyed)
Ενσωματωμένος έλεγχος ταυτότητας των WindowsIntegrated Windows authentication (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS))
επαλήθευση ταυτότηταςidentity verification (The process of confirming the identity of an individual or business who is applying to the store as a developer/vendor)
εφαρμογή πιστοποίησης ταυτότηταςAuthenticator (The app that generates security codes that change frequently as part of two-step verification)
ηλεκτρονική ταυτότηταonline identity (A single set of sign-in credentials (typically, e-mail address and password) that is used to access the services provided by an online service provider (OSP))
ιδιότητα ταυτότηταςidentity property (A property that generates values that uniquely identify each row in a table)
κλειδί επιβεβαίωσης ταυτότηταςattestation identity key (The cryptographic representation of the hardware or software state and other integrity metrics, and which can be used to perform anonymous or pseudo-anonymous attestations to remote parties in multiparty transactions)
κύκλος ζωής ταυτότηταςidentity life cycle (The stages an identity goes through from the time it is conceived until the time it is destroyed)
κώδικας ελέγχου ταυτότητας μηνύματοςMessage Authentication Code (An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received)
μέθοδος ελέγχου ταυτότηταςauthentication method (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network)
IP με έλεγχο ταυτότηταςAuthenticated IP (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements)
πιστοποιητικό ταυτότηταςauthenticator (A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC))
πολλαπλές ταυτότητεςmultiple identities (Multiple Web sites that are hosted on one computer)
πρωτόκολλο ασφαλούς ελέγχου ταυτότητας με κωδικό πρόσβασηςShiva Password Authentication Protocol (A two-way, reversible encryption mechanism for authenticating PPP connections employed by Shiva remote access servers)
πρωτόκολλο ελέγχου ταυτότητας Kerberos V5Kerberos V5 authentication protocol (An authentication mechanism used to verify user or host identity. The Kerberos V5 authentication protocol is the default authentication service. Internet Protocol security (IPsec) can use the Kerberos protocol for authentication)
πρωτόκολλο ελέγχου ταυτότητας μέσω ανταλλαγής χειραψίαςChallenge Handshake Authentication Protocol (A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response)
Πρωτόκολλο Internet με έλεγχο ταυτότηταςAuthenticated Internet Protocol (A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements)
στήλη ταυτότηταςidentity column (A column in a table that has been assigned the identity property)
συνδεδεμένος, η ταυτότητα του χρήστη ελέγχθηκεconnected, user authenticated (A user's status when a telephone connection has been established and the user has entered a correct user name and password. If the user has callback permission and has requested callback, the connection is followed by the calling-back phase. If the calling-back phase is followed by a waiting-for-call phase, then the server was unable to reach the user at the specified number. The user may have supplied an inaccurate callback number (in the case of set-by-caller callback), or an unauthorized attempt to access the network may be under way (in the case of preset-to callback))
Συνοπτικός έλεγχος ταυτότηταςDigest authentication (An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems)
συσχέτιση ηλεκτρονικής ταυτότηταςonline identity association (The binding of an online identity with the user account on a given PC. Once the association exists, the online identity can be used as a pointer to the user account. For example, with remote media connection, the online identity can be used to point to PC names and IP addresses)
σύνολο ελέγχου ταυτότηταςauthentication set (In IPsec, a collection of authentication methods that the client proposes during negotiation with the remote host)
ταυτότητα βασισμένη σε δηλώσειςclaims-based identity (A unique identifier that represents a specific user, application, computer, or other entity, enabling it to gain access to multiple resources, such as applications and network resources, without entering credentials multiple times. It also enables resources to validate requests from an entity)
ταυτότητα εμπορικής επωνυμίαςbrand identity (A company's or partner's logo, fonts, and colour themes or schemes intended to visually signify who and what the company is)
ταυτότητα πακέτουpackage identity (The element of a .appx package that identifies the name of the package. This name is an internal data element of the .appx package and is not seen by the end-user customer)
ταυτότητα χρήστηuser identity (" Identity assigned to a user during authentication. For example, the user identity of anonymous users would be the default "iusr" account. ")
Τυπικό πρωτόκολλο του ΙΕΕΕ για έλεγχο ταυτότητας σε προσαρτήσεις υποδοχών για συσκευές μεταβατικής αποθήκευσηςIEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments)
Υπηρεσία απομακρυσμένου ελέγχου ταυτότητας χρηστών εισερχόμενων κλήσεωνRemote Authentication Dial-In User Service (A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link)
υπηρεσία ελέγχου ταυτότηταςauthentication service (A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer)
χαρακτήρας διαφυγής ταυτότηταςidentity escape (In regular expressions, a backslash followed by a single character. It matches that character and is required when the character has a special meaning; by using the identity escape, the special meaning is removed)
χρήση ομοσπονδιακών ταυτοτήτωνidentity federation (A process in Microsoft Online Services that uses Active Directory Federation Services 2.0 and Microsoft Federation Gateway to securely represent identities in the cloud and tie those identities to corporate credentials (user name and password). Users can then use their corporate credentials to sign in once to access the services in Microsoft Online Services)
χώρος αποθήκευσης ταυτοτήτωνidentity store (An area on a computer where identities are stored)
ψηφιακή ταυτότηταDigital ID (A combination of a digital certificate and a public and private encryption key set)