DictionaryForumContacts

Terms containing authentication | all forms | exact matches only
SubjectEnglishCzech
comp., MSAnonymous authenticationanonymní přístup (An authentication mechanism that does not require user accounts and passwords)
comp., MSanonymous FTP authenticationanonymní ověřování protokolu FTP (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password)
comp., MSauthentication assurancezáruka ověření (A Windows Server feature that provides the ability to determine which logon method was used by a user from his Kerberos token)
comp., MSauthentication challengevýzva ověřování (A dialog that requires the user to provide a response in order to authenticate to ILM "2")
comp., MSauthentication challenge activityaktivita výzvy ověřování (A Windows Workflow Foundation activity that is used to configure a challenge that will be issued to a user in order to authenticate to ILM "2")
comp., MSauthentication dataověřovací data (A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated)
comp., MSauthentication databaseověřovací databáze (A database on a server that matches user names to passwords)
comp., MSauthentication databasedatabáze uživatelů (A database on a server that matches user names to passwords)
comp., MSauthentication methodmetoda ověřování (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network)
comp., MSauthentication optionmožnost ověřování (One of multiple authentication mechanisms or settings that a user can set)
comp., MSauthentication pageověřovací stránka (A Web page presented to unauthenticated users logging on to a site requiring authentication with a Web browser)
ITauthentication serviceautentizační služba
comp., MSauthentication serviceověřovací služba (A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer)
comp., MSauthentication setsada ověřování (In IPsec, a collection of authentication methods that the client proposes during negotiation with the remote host)
commun.authentication tokenautentizační token
comp., MSBasic authenticationZákladní ověřování (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
dat.proc., life.sc.biometric authenticationbiometrická autentizace
dat.proc., life.sc.biometric authenticationbiometrická verifikace
comp., MScertificate authenticationověření certifikátu (A form of IIS authentication in which IIS accepts client-certificates used to prove the client's identity. Using this form of authentication, IIS can optionally map a client certificate to a Windows user account by using an internal mapping table or Active Directory)
comp., MSChallenge Handshake Authentication Protocol A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the responseprotokol CHAP (Challenge Handshake Authentication Protocol)
bank., dat.proc.Chip Authentication ProgrammeChip Authentication Program
comp., MSclaims-based authenticationověřování na základě deklarované identity (The process of authenticating a user based on a set of claims about the user's identity contained in a trusted token. This token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication)
comp., MSclient authenticationověření klienta (A method of authentication by which the client in a client-server communication proves its identity to the server)
comp., MSclient authentication certificatecertifikát pro ověřeřování klientů (In AD FS, a certificate that federation server proxies use to authenticate a client to the Federation Service)
comp., MSdelegated authenticationdelegované ověřování (A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources)
comp., MSDigest authenticationOvěřování hodnotou hash (An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems)
comp., MSdistributed password authentication An advanced, distributed method of user authentication from Microsoft, allowing for single user log-onstandard DPA (Distributed Password Authentication)
law, commun., ITe-authenticationelektronické ověřování pravosti
law, commun., ITelectronic authenticationelektronické ověřování pravosti
ITEuropean Commission Authentication Serviceověřovací služba Evropské komise
comp., MSflexible authenticationflexibilní autentizace (An authentication process where users in a variety of identity management systems can be authenticated)
comp., MSforms-based authenticationověřování pomocí formulářů (A service that enables applications to provide their own logon UI and to verify credentials independently)
comp., MSIEEE Standard Protocol for Authentication in Host Attachments of Transient Storage DevicesStandardní protokol IEEE pro ověřování připojení přechodných zařízení úložiště k hostitelským systémům (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments)
comp., MSIntegrated Windows authenticationIntegrované ověřování systému Windows (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS))
comp., MSInternet Authentication ServiceSlužba ověřování v Internetu (The Microsoft implementation of a Remote Authentication Dial-In User Service (RADIUS) server, which provides authentication and accounting for network access, and proxy, which provides forwarding of RADIUS messages)
comp., MSmultifactor authenticationvícefaktorové ověřování (An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
comp., MSMulti-Factor Authentication appaplikace Multi-Factor Authentication (An application that can be installed on a user's mobile device to receive notifications and to verify that their sign in attempt was valid)
comp., MSNetwork Level Authenticationověřování na úrovni sítě (An authentication method that completes user authentication before you establish a Remote Desktop connection and the logon screen appears)
law, commun., ITonline authenticationelektronické ověřování pravosti
comp., MSplaintext authenticationověřování pomocí prostého textu (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
comp., MSpluggable authenticationzásuvné ověřování (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme)
comp., MSproxy authenticationověřování proxy serveru (An authentication method that uses a proxy server)
commun., ITqualified certificate for website authenticationkvalifikovaný certifikát pro ověřování webových stránek
comp., MSremote Active Directory authenticationvzdálené ověřování pomocí služby Active Directory (A feature that enables IT professionals to activate Windows-based computers based on user identities in the Active Directory, without requiring additional infrastructure)
comp., MSRemote Authentication Dial-In User Service A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to linkprotokol RADIUS (Remote Authentication Dial-In User Service)
comp., MSSimple Authentication and Security Layer An open framework, described in Request for Comments (RFC) 2222, for adding authentication support to connection-based protocolsrozhraní SASL (Simple Authentication and Security Layer)
comp., MSSSL client certificate mapping authenticationověřování prostřednictvím mapování klientských certifikátů SSL (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site)
comp., MSthree-factor authenticationtrojúrovňové ověřování (An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
comp., MSTLS authenticationověřování protokolem TLS (Authentication by using the Transport Layer Security (TLS) protocol)
comp., MStwo-factor authenticationdvojúrovňové ověřování (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)

Get short URL