Perimeter authentication synonyms
Category:
Part of speech:
authentication (related)
identity theft or masquerading (related)
The process of authenticating the identity of an off-site user not within the application server’s domain. This process is completed by a remote user specifying an identity and some form of corresponding “proof” of identity. The proof provided is generally a secret string of letters and/or numbers (such as a credit card number, a password, or a Personal Identification Number such as an important date to the user) that can then be verified. The process of authenticating the identity of an off-site user not within the application server’s domain. This process is completed by a remote user specifying an identity and some form of corresponding “proof” of identity. The proof provided is generally a secret string of letters and/or numbers (such as a credit card number, a password, or a Personal Identification Number such as an important date to the user) that can then be verified. BEA Systems. Security Fundamentals. [Online, 2004.] BEA Systems Website. http://e-docs.bea.com/wls/docs81/secintro/concepts.html#1077583.
password (related)
(Computing) A string of characters used to log in to a computer or network, to access a level in a video game, etc.
personal identification number (pin) (related)
The process of authenticating the identity of an off-site user not within the application server’s domain. This process is completed by a remote user specifying an identity and some form of corresponding “proof” of identity. The proof provided is generally a secret string of letters and/or numbers (such as a credit card number, a password, or a Personal Identification Number such as an important date to the user) that can then be verified. The process of authenticating the identity of an off-site user not within the application server’s domain. This process is completed by a remote user specifying an identity and some form of corresponding “proof” of identity. The proof provided is generally a secret string of letters and/or numbers (such as a credit card number, a password, or a Personal Identification Number such as an important date to the user) that can then be verified. BEA Systems. Security Fundamentals. [Online, 2004.] BEA Systems Website. http://e-docs.bea.com/wls/docs81/secintro/concepts.html#1077583.
Advertisement
Find another word for perimeter authentication. In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for perimeter authentication, like: authentication, fraud, identity theft or masquerading, password and personal identification number (pin).