token-based authentication
- token-based authentication
- аутентификация по маркеру
аутентификация по маркеру
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]
Тематики
- информационные технологии в целом
EN
- token-based authentication
Англо-русский словарь нормативно-технической терминологии.
academic.ru.
2015.
Смотреть что такое "token-based authentication" в других словарях:
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Authentication Header — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Protected Extensible Authentication Protocol — PEAP is also an acronym for Personal Egress Air Packs. Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced peep ), is a method to securely transmit authentication information, including passwords, over wired or … Wikipedia
Common Authentication Service Adapter — CASA is an open source component infrastructure for securely storing credential and other confidential data that can be used for authentication, single sign on (SSO) and other purposes by users, services and applications on a desktop or server… … Wikipedia
Claims-based identity — is a common way for applications to acquire the identity information they need about users inside their organization, in other organizations, and on the Internet.[1] It also provides a consistent approach for applications running on premises or… … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Software token — A software token is a type of two factor authentication security device that may be used to authorize the use of computer services. Software tokens are stored on a general purpose electronic device such as a desktop computer, laptop, PDA, or… … Wikipedia
Pre-boot authentication — (PBA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper proof environment external to the operating system as a trusted authentication layer. The PBA prevents anything being read from the hard disk such as the… … Wikipedia
Mutual authentication — or two way authentication (sometimes written as 2WAY authentication) refers to two parties authenticating each other suitably. In technology terms, it refers to a client or user authenticating themselves to a server and that server authenticating … Wikipedia