DictionaryForumContacts

Terms containing authentication | all forms | exact matches only
SubjectEnglishArabic
comp., MSAnonymous authenticationمصادقة مجهولة (An authentication mechanism that does not require user accounts and passwords)
comp., MSanonymous FTP authenticationالمصادقة على مستخدم FTP كمجهول (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password)
comp., MSauthentication dataبيانات المصادقة (A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated)
comp., MSauthentication databaseقاعدة بيانات المصادقة (A database on a server that matches user names to passwords)
comp., MSauthentication methodطريقة المصادقة (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network)
comp., MSauthentication optionخيار المصادقة (One of multiple authentication mechanisms or settings that a user can set)
comp., MSauthentication pageصفحة المصادقة (A Web page presented to unauthenticated users logging on to a site requiring authentication with a Web browser)
comp., MSauthentication serviceخدمة المصادقة (A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer)
comp., MSauthentication setمجموعة مصادقة (In IPsec, a collection of authentication methods that the client proposes during negotiation with the remote host)
comp., MSBasic authenticationمصادقة أساسية (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
comp., MSChallenge Handshake Authentication Protocolبروتوكول "Challenge Handshake Authentication Protocol" (A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response)
comp., MSclaims-based authenticationمصادقة تستند إلى مطالبات (The process of authenticating a user based on a set of claims about the user's identity contained in a trusted token. This token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication)
comp., MSdelegated authenticationمصادقة مفوَّضة (A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources)
comp., MSDigest authenticationمصادقة كلية (An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems)
comp., MSdistributed password authenticationمصادقة كلمات المرور الموزعة (An advanced, distributed method of user authentication from Microsoft, allowing for single user log-on)
comp., MSflexible authenticationمصادقة مرنة (An authentication process where users in a variety of identity management systems can be authenticated)
comp., MSIEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devicesبروتوكول IEEE القياسي لمصادقة مرفقات المضيف لأجهزة التخزين المؤقت (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments)
comp., MSIntegrated Windows authenticationالمصادقة المتكاملة في Windows (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS))
comp., MSMessage Authentication Codeالتعليمة البرمجية لمصادقة الرسالة (An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received)
comp., MSmultifactor authenticationمصادقة متعددة العوامل (An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
comp., MSMulti-Factor Authentication appتطبيق Multi-Factor Authentication (An application that can be installed on a user's mobile device to receive notifications and to verify that their sign in attempt was valid)
comp., MSMulti-Factor Authentication Management Portalمدخل إدارة Multi-Factor Authentication (Used by administrators to manage company-wide Multi-Factor Authentication settings and view centralized usage reports)
comp., MSMulti-Factor Authentication Serverخادم Multi-Factor Authentication (A software application that an administrator can use to configure Multi-Factor Authentication functionality)
comp., MSMulti-Factor Authentication Serviceخدمة Multi-Factor Authentication (A service that places an automated phone call, sends a text message, or pushes a notification to the Multi-Factor Authentication app on the user's mobile device and processes the result)
comp., MSMulti-Factor Authentication User Portalمدخل مستخدمي Multi-Factor Authentication (Allows users to complete the Multi-Factor Authentication enrollment process and manage their settings, such as phone number and PIN, through a simple web interface)
comp., MSpass-through authenticationمصادقة المرور (The process by which a user account is authenticated when the computer being used for the logon is not a domain controller in the domain where the user account is defined and is also not the computer where the account is defined. In this process, the computer passes the logon information through to a domain controller (directly or indirectly) where the user account is defined)
comp., MSplaintext authenticationالمصادقة على نص عادي (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
comp., MSpluggable authenticationمصادقة كافة المستويات (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme)
comp., MSproxy authenticationمصادقة الوكيل (An authentication method that uses a proxy server)
comp., MSremote Active Directory authenticationمصادقة Active Directory عن بُعد (A feature that enables IT professionals to activate Windows-based computers based on user identities in the Active Directory, without requiring additional infrastructure)
comp., MSRemote Authentication Dial-In User Serviceخادم خدمة مصادقة عن بُعد لمستخدم طلب هاتفي (A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link)
comp., MSShiva Password Authentication Protocolبروتوكول مصادقة كلمة المرور الآمنة (A two-way, reversible encryption mechanism for authenticating PPP connections employed by Shiva remote access servers)
comp., MSSSL client certificate mapping authenticationمصادقة تعيين شهادة عميل SSL (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site)
comp., MSthree-factor authenticationمصادقة ثلاثية (An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
comp., MSTLS authenticationمصادقة TLS (Authentication by using the Transport Layer Security (TLS) protocol)
comp., MStwo-factor authenticationمصادقة ثنائية (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
comp., MSWindows Azure Multi-Factor Authentication Management Portalمدخل إدارة Windows Azure Multi-Factor Authentication (Used by administrators to manage company-wide Multi-Factor Authentication settings and view centralized usage reports)
comp., MSWindows Azure Multi-Factor Authentication Serverخادم Windows Azure Multi-Factor Authentication (A software application that an administrator can use to configure Multi-Factor Authentication functionality)
comp., MSWindows Azure Multi-Factor Authentication Serviceخدمة Windows Azure Multi-Factor Authentication (A service that places an automated phone call, sends a text message, or pushes a notification to the Multi-Factor Authentication app on the user's mobile device and processes the result)
comp., MSWindows Azure Multi-Factor Authentication User Portalمدخل مستخدمي Windows Azure Multi-Factor Authentication (Allows users to complete the Multi-Factor Authentication enrollment process and manage their settings, such as phone number and PIN, through a simple web interface)

Get short URL