DictionaryForumContacts

Terms for subject Microsoft containing authentication | all forms | exact matches only
EnglishFrench
anonymous FTP authenticationauthentification FTP anonyme (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password)
authentication assuranceassurance d'authentification (A Windows Server feature that provides the ability to determine which logon method was used by a user from his Kerberos token)
authentication challengedemande d'authentification (A dialog that requires the user to provide a response in order to authenticate to ILM "2")
authentication challenge activityactivité de demande d'authentification (A Windows Workflow Foundation activity that is used to configure a challenge that will be issued to a user in order to authenticate to ILM "2")
authentication datadonnées d'authentification (A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated)
authentication databasebase de données d'authenfication (A database on a server that matches user names to passwords)
authentication delegationdélégation de l'authentification (A method used to authenticate a session that has been opened with the published Web site)
authentication methodméthode d'authentification (The authentication protocol (such as CHAP, PAP, EAP etc) used when authenticating access to resources on a network)
authentication optionoption d'authentification (One of multiple authentication mechanisms or settings that a user can set)
authentication pagepage d'authentification (A Web page presented to unauthenticated users logging on to a site requiring authentication with a Web browser)
authentication serviceservice d'authentification (A service provided by an operating system or underlying subsystem (like Microsoft Internet Information Services) that provides a means to authenticate users, typically using a user name and password. Part of the general security system, authentication services can also be offered at the application layer)
authentication setjeu d'authentification (In IPsec, a collection of authentication methods that the client proposes during negotiation with the remote host)
authentication ticketticket d'authentification (A ticket that Commerce Server creates for registered users)
Basic authenticationauthentification de base (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
certificate authenticationauthentification par certificat (A form of IIS authentication in which IIS accepts client-certificates used to prove the client's identity. Using this form of authentication, IIS can optionally map a client certificate to a Windows user account by using an internal mapping table or Active Directory)
Challenge Handshake Authentication Protocol A challenge-response authentication protocol for Point-to-Point Protocol (PPP) connections described in RFC 1994. It uses the industry-standard MD5 hashing algorithm to hash the combination of a challenge string issued by the authenticating server and the user's password in the responseprotocole CHAP (Challenge Handshake Authentication Protocol)
claims-based authenticationauthentification basée sur les revendications (The process of authenticating a user based on a set of claims about the user's identity contained in a trusted token. This token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication)
client authenticationauthentification client (A method of authentication by which the client in a client-server communication proves its identity to the server)
client authentication certificatecertificat d'authentification client (In AD FS, a certificate that federation server proxies use to authenticate a client to the Federation Service)
cross-forest authenticationauthentification inter-forêts (An authentication feature that enables secure access to resources when the user account is in one forest and the computer account is in another forest. This feature allows users to securely access resources in other forests, using either Kerberos or NTLM, without sacrificing the single sign-on and administrative benefits of having only one user ID and password maintained in the user's home forest)
CS Authentication resourceressource Authentification CS (A Commerce Server resource with global-level properties, managed through Commerce Server Manager. Use CS Authentication to configure authentication options for a site)
delegated authenticationauthentification déléguée (A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources)
Digest authenticationauthentification Digest (An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems)
distributed password authenticationAuthentification par mot de passe distribué (An advanced, distributed method of user authentication from Microsoft, allowing for single user log-on)
end-to-end authenticationauthentification de bout en bout (An authentication method in which credentials are validated at the endpoints instead of at a central server)
Extended Protection for Authenticationprotection étendue de l'authentification (A security feature that helps protect against man-in-the-middle (MITM) attacks)
flexible authenticationauthentification flexible (An authentication process where users in a variety of identity management systems can be authenticated)
forms-based authenticationAuthentification basée sur les formulaires (A service that enables applications to provide their own logon UI and to verify credentials independently)
IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage DevicesIEEE 1667 (The IEEE industry standard that defines methods for authenticating transient removable storage devices (e.g. USB flash drives, memory cards, and portable hard disks) when they are mounted to host computers in corporate, government, academic, and other environments)
in-person authenticationauthentification physique (Physical authentication to complete a certificate request transaction. For example, an end user requesting his/her personal identification number (PIN) be unblocked will visit a certificate manager in person to provide in-person authentication with identification, such as an employee badge or drivers license)
Integrated Windows authenticationauthentification Windows intégrée (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS))
Kerberos authenticationauthentification Kerberos (An authentication protocol that provides a mechanism for mutual authentication between a client and a server, or between one server and another, before a network connection is opened between them)
Kerberos V5 authentication protocolprotocole d'authentification Kerberos V5 (An authentication mechanism used to verify user or host identity. The Kerberos V5 authentication protocol is the default authentication service. Internet Protocol security (IPsec) can use the Kerberos protocol for authentication)
Message Authentication Codecode d'authentification de message (An algorithm that allows a receiver to ensure that a block of data has retained its integrity from the time it was sent until the time it was received)
multifactor authenticationauthentification multifacteur (An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
Multi-Factor Authentication appapplication Multi-Factor Authentication (An application that can be installed on a user's mobile device to receive notifications and to verify that their sign in attempt was valid)
Multi-Factor Authentication Management Portalportail de gestion Multi-Factor Authentication (Used by administrators to manage company-wide Multi-Factor Authentication settings and view centralized usage reports)
Multi-Factor Authentication Serverserveur Multi-Factor Authentication (A software application that an administrator can use to configure Multi-Factor Authentication functionality)
Multi-Factor Authentication Serviceservice Multi-Factor Authentication (A service that places an automated phone call, sends a text message, or pushes a notification to the Multi-Factor Authentication app on the user's mobile device and processes the result)
Multi-Factor Authentication User Portalportail utilisateur Multi-Factor Authentication (Allows users to complete the Multi-Factor Authentication enrollment process and manage their settings, such as phone number and PIN, through a simple web interface)
Network Level AuthenticationAuthentification au niveau du réseau (An authentication method that completes user authentication before you establish a Remote Desktop connection and the logon screen appears)
password authenticationauthentification par mot de passe (The process of verifying the identity of a user, computer, process, or other entity using a combination of a user name and a password as a credential)
plaintext authenticationauthentification en clair (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
pluggable authenticationauthentification enfichable (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme)
proxy authenticationauthentification du mandataire (An authentication method that uses a proxy server)
proxy authenticationAuthentification du proxy (An authentication method that uses a proxy server)
remote Active Directory authenticationauthentification Active Directory à distance (A feature that enables IT professionals to activate Windows-based computers based on user identities in the Active Directory, without requiring additional infrastructure)
Remote Authentication Dial-In User Service A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to linkprotocole RADIUS (Remote Authentication Dial-In User Service)
server authentication certificatecertificat d'authentification serveur (In AD FS, a certificate that AD FS-enabled Web servers, federation servers, and federation server proxies use to secure Web services traffic for communication among themselves as well as with Web clients)
Shiva Password Authentication Protocol A two-way, reversible encryption mechanism for authenticating PPP connections employed by Shiva remote access serversprotocole SPAP (Shiva Password Authentication Protocol)
SSL client certificate mapping authenticationauthentification par mappage de certificat client SSL (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site)
three-factor authenticationauthentification à 3 facteurs (An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
TLS authenticationauthentification TLS (Authentication by using the Transport Layer Security (TLS) protocol)
two-factor authenticationauthentification à 2 facteurs (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
Windows Azure Multi-Factor Authentication Management Portalportail de gestion Windows Azure Multi-Factor Authentication (Used by administrators to manage company-wide Multi-Factor Authentication settings and view centralized usage reports)
Windows Azure Multi-Factor Authentication Serverserveur Windows Azure Multi-Factor Authentication (A software application that an administrator can use to configure Multi-Factor Authentication functionality)
Windows Azure Multi-Factor Authentication Serviceservice Windows Azure Multi-Factor Authentication (A service that places an automated phone call, sends a text message, or pushes a notification to the Multi-Factor Authentication app on the user's mobile device and processes the result)
Windows Azure Multi-Factor Authentication User Portalportail utilisateur Windows Azure Multi-Factor Authentication (Allows users to complete the Multi-Factor Authentication enrollment process and manage their settings, such as phone number and PIN, through a simple web interface)

Get short URL