- third party authentication
- Безопасность: аутентификация с обращением к третьей стороне, аутентификация с участием третьей стороны
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
IBM Lightweight Third-Party Authentication — Lightweight Third Party Authentication (LTPAs), is an authentication technology used in IBM WebSphere and Lotus Domino products.When accessing web servers that use the LTPA technology it is possible for a web user to re use his login across… … Wikipedia
IBM Lightweight Third-Party Authentication — Lightweight Third Party Authentication Lightweight Third Party Authentication (LTPA) est un processus informatique d’authentification à signature unique (Single Sign On SSO) mis en place par IBM en 2001 au sein du serveur d application Websphere… … Wikipédia en Français
Lightweight Third-Party Authentication — (LTPA) est un processus informatique d’authentification à signature unique (Single Sign On SSO) mis en place par IBM en 2001 au sein du serveur d application Websphere et du logiciel de groupware Lotus Notes. Mécanisme Le processus… … Wikipédia en Français
Lightweight Third-Party Authentication — (LTPA, „leichtgewichtige Authentifizierung durch Dritte“) ist eine Authentifizierungstechnik, die in den Software Produkten IBM Websphere und Lotus Domino verwendet wird. Beim Zugriff auf Webserver, die LTPA verwenden, ist es für einen Anwender… … Deutsch Wikipedia
Lightweight Third Party Authentication — (LTPA) est un processus informatique d’authentification à signature unique (Single Sign On SSO) mis en place par IBM en 2001 au sein du serveur d application Websphere et du logiciel de groupware Lotus Notes. Mécanisme Le processus… … Wikipédia en Français
Third Party Grading — is a term used to refer to coin grading, authentication, and encapsulation companies. Often abbreviated TPG, these companies will, for a fee, slab a coin. Some companies offer a guarantee covering the grade or authenticity of the coin.… … Wikipedia
Third-party verification — TPV (Third party verification) is a process of getting an independent party to confirm that the customer is actually requesting a change or ordering a new service or product. By putting the customer on the phone (usually via transfer or 3 way… … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Protected Extensible Authentication Protocol — PEAP is also an acronym for Personal Egress Air Packs. Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced peep ), is a method to securely transmit authentication information, including passwords, over wired or … Wikipedia
Integrated Windows Authentication — (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols with respect to SSPI functionality introduced with Microsoft Windows 2000 and included with later Windows NT based… … Wikipedia
Internet Authentication Service — (IAS) is a component of Windows Server operating systems that provides centralized user authentication and authorization, auditing and accounting. Overview While Routing and Remote Access (RRAS) security is sufficient for small networks, larger… … Wikipedia