The most widely used authenticator, particularly by the financial sector, is called a Message Authentication Code. |
|
The corresponding functional component at the other end of the L2L connection is termed the authenticator. |
|
The authenticator is configured to access the authentication server and to allow one or more of its ports to provide 802.1X access control. |
|
An authenticator is evidence that is presented to support the authentication of a claim. |
|
An authenticator and a former Mariners equipment manager said it was not authentic. |
|
Later, she became a not very successful painter and, as the executor of her father's estate, an erratic authenticator of his works. |
|
According to one authenticator of sports memorabilia, his clients are not optimistic. |
|
This shared secret can be used to derive cryptographic keys between the authenticator and the supplicant to ensure confidentiality and integrity and enable message authentication. |
|
He'd become an authenticator of corn, a compiler of pickle recipes. |
|
Users can elect to require the use of a personal password or an RSA SecurID two-factor authenticator when logging in to the host, in addition to supplying operating system credentials. |
|
In the security capability phase, a supplicant negotiates the security capabilities and the various parameters of the protocol to be used with the authenticator. |
|
This request contains the TGT, an authenticator that verifies the principal's identity, and the name of the service the principal wants to use, all encrypted in the session key. |
|
Adopting this molten mutt is easy: If you've got any kind of Authenticator attached to your account, you'll find your new canine companion waiting for you the next time you log in. |
|