Subject | English | Czech |
comp., MS | Anonymous authentication | anonymní přístup (An authentication mechanism that does not require user accounts and passwords) |
comp., MS | anonymous FTP authentication | anonymní ověřování protokolu FTP (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password) |
comp., MS | authentication assurance | záruka ověření (A Windows Server feature that provides the ability to determine which logon method was used by a user from his Kerberos token) |
comp., MS | authentication challenge | výzva ověřování (A dialog that requires the user to provide a response in order to authenticate to ILM "2") |
comp., MS | authentication challenge activity | aktivita výzvy ověřování (A Windows Workflow Foundation activity that is used to configure a challenge that will be issued to a user in order to authenticate to ILM "2") |
comp., MS | authentication data | ověřovací data (A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated) |
comp., MS | authentication database | ověřovací databáze (A database on a server that matches user names to passwords) |
comp., MS | authentication database | databáze uživatelů (A database on a server that matches user names to passwords) |
comp., MS | authentication method | metoda ověřování (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network) |
comp., MS | authentication option | možnost ověřování (One of multiple authentication mechanisms or settings that a user can set) |
comp., MS | authentication page | ověřovací stránka (A Web page presented to unauthenticated users logging on to a site requiring authentication with a Web browser) |
IT | authentication service | autentizační služba |
comp., MS | authentication service | ověřovací služba (A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer) |
comp., MS | authentication set | sada ověřování (In IPsec, a collection of authentication methods that the client proposes during negotiation with the remote host) |
commun. | authentication token | autentizační token |
comp., MS | Basic authentication | Základní ověřování (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network) |
dat.proc., life.sc. | biometric authentication | biometrická autentizace |
dat.proc., life.sc. | biometric authentication | biometrická verifikace |
comp., MS | certificate authentication | ověření certifikátu (A form of IIS authentication in which IIS accepts client-certificates used to prove the client's identity. Using this form of authentication, IIS can optionally map a client certificate to a Windows user account by using an internal mapping table or Active Directory) |
comp., MS | Challenge Handshake Authentication Protocol A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the response | protokol CHAP (Challenge Handshake Authentication Protocol) |
bank., dat.proc. | Chip Authentication Programme | Chip Authentication Program |
comp., MS | claims-based authentication | ověřování na základě deklarované identity (The process of authenticating a user based on a set of claims about the user's identity contained in a trusted token. This token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication) |
comp., MS | client authentication | ověření klienta (A method of authentication by which the client in a client-server communication proves its identity to the server) |
comp., MS | client authentication certificate | certifikát pro ověřeřování klientů (In AD FS, a certificate that federation server proxies use to authenticate a client to the Federation Service) |
comp., MS | delegated authentication | delegované ověřování (A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources) |
comp., MS | Digest authentication | Ověřování hodnotou hash (An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems) |
comp., MS | distributed password authentication An advanced, distributed method of user authentication from Microsoft, allowing for single user log-on | standard DPA (Distributed Password Authentication) |
law, commun., IT | e-authentication | elektronické ověřování pravosti |
law, commun., IT | electronic authentication | elektronické ověřování pravosti |
IT | European Commission Authentication Service | ověřovací služba Evropské komise |
comp., MS | flexible authentication | flexibilní autentizace (An authentication process where users in a variety of identity management systems can be authenticated) |
comp., MS | forms-based authentication | ověřování pomocí formulářů (A service that enables applications to provide their own logon UI and to verify credentials independently) |
comp., MS | IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices | Standardní protokol IEEE pro ověřování připojení přechodných zařízení úložiště k hostitelským systémům (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments) |
comp., MS | Integrated Windows authentication | Integrované ověřování systému Windows (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS)) |
comp., MS | Internet Authentication Service | Služba ověřování v Internetu (The Microsoft implementation of a Remote Authentication Dial-In User Service (RADIUS) server, which provides authentication and accounting for network access, and proxy, which provides forwarding of RADIUS messages) |
comp., MS | multifactor authentication | vícefaktorové ověřování (An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |
comp., MS | Multi-Factor Authentication app | aplikace Multi-Factor Authentication (An application that can be installed on a user's mobile device to receive notifications and to verify that their sign in attempt was valid) |
comp., MS | Network Level Authentication | ověřování na úrovni sítě (An authentication method that completes user authentication before you establish a Remote Desktop connection and the logon screen appears) |
law, commun., IT | online authentication | elektronické ověřování pravosti |
comp., MS | plaintext authentication | ověřování pomocí prostého textu (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network) |
comp., MS | pluggable authentication | zásuvné ověřování (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme) |
comp., MS | proxy authentication | ověřování proxy serveru (An authentication method that uses a proxy server) |
commun., IT | qualified certificate for website authentication | kvalifikovaný certifikát pro ověřování webových stránek |
comp., MS | remote Active Directory authentication | vzdálené ověřování pomocí služby Active Directory (A feature that enables IT professionals to activate Windows-based computers based on user identities in the Active Directory, without requiring additional infrastructure) |
comp., MS | Remote Authentication Dial-In User Service A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link | protokol RADIUS (Remote Authentication Dial-In User Service) |
comp., MS | Simple Authentication and Security Layer An open framework, described in Request for Comments (RFC) 2222, for adding authentication support to connection-based protocols | rozhraní SASL (Simple Authentication and Security Layer) |
comp., MS | SSL client certificate mapping authentication | ověřování prostřednictvím mapování klientských certifikátů SSL (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site) |
comp., MS | three-factor authentication | trojúrovňové ověřování (An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |
comp., MS | TLS authentication | ověřování protokolem TLS (Authentication by using the Transport Layer Security (TLS) protocol) |
comp., MS | two-factor authentication | dvojúrovňové ověřování (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |