token-based authentication

token-based authentication
  1. аутентификация по маркеру

 

аутентификация по маркеру

[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]

Тематики

  • информационные технологии в целом

EN

  • token-based authentication


Англо-русский словарь нормативно-технической терминологии. . 2015.

Игры ⚽ Поможем написать курсовую

Смотреть что такое "token-based authentication" в других словарях:

  • Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… …   Wikipedia

  • Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP …   Deutsch Wikipedia

  • Security token — Several types of security tokens with a penny for scale …   Wikipedia

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Protected Extensible Authentication Protocol — PEAP is also an acronym for Personal Egress Air Packs. Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced peep ), is a method to securely transmit authentication information, including passwords, over wired or …   Wikipedia

  • Common Authentication Service Adapter — CASA is an open source component infrastructure for securely storing credential and other confidential data that can be used for authentication, single sign on (SSO) and other purposes by users, services and applications on a desktop or server… …   Wikipedia

  • Claims-based identity — is a common way for applications to acquire the identity information they need about users inside their organization, in other organizations, and on the Internet.[1] It also provides a consistent approach for applications running on premises or… …   Wikipedia

  • Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… …   Wikipedia

  • Software token — A software token is a type of two factor authentication security device that may be used to authorize the use of computer services. Software tokens are stored on a general purpose electronic device such as a desktop computer, laptop, PDA, or… …   Wikipedia

  • Pre-boot authentication — (PBA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper proof environment external to the operating system as a trusted authentication layer. The PBA prevents anything being read from the hard disk such as the… …   Wikipedia

  • Mutual authentication — or two way authentication (sometimes written as 2WAY authentication) refers to two parties authenticating each other suitably. In technology terms, it refers to a client or user authenticating themselves to a server and that server authenticating …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»