Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
Using a central authentication database, Snocap hopes to generate secure audio fingerprints for all commercial music, and then license it to copyright holders.
Apache features configurable error messages, DBMS-based authentication databases, and content negotiation.
Rather than develop and maintain a centralized authentication database, said Jonathan Schwartz, Sun's chief strategy officer, the aim is to develop a sort of federation of sites.
WPPA2 Enterprise means there's a back-end authentication database such as RADIUS.
It can use an existing and widely deployed authentication protocol and infrastructure, incorporating legacy password mechanisms and authentication databases, while the secure tunnel provides protection from eavesdropping and man-in-the-middle attack.
Courier can also provide mail services for virtual mail accounts, managed by any of LDAP directory service, Berkeley DB, MySQL or PostgreSQL authentication database.
Some processes require privileges to perform their functions-for example the Secure Server needs to access to the User Access Authentication database, kept at system high, while establishing a session for a user at a lower sensitivity level.
The access token is generated by the logon service when a user logs on to the system and the credentials provided by the user are authenticated against the authentication database, by specifying the rights the user has in the security descriptor enclosed by the token.