Home page » Initial: a » First 2 letters: au » Keyword: authentication

65 Hungarian websites relevant to the keyword: authentication

DomainExcerpts relevant to keyword: authenticationRelated expressionsOther expressions from the websiteeRelevance
online-fordito.huData collected and processed: Device identifiers, Authentication-derived identifiers, Privacy choices, Probabilistic identifiers, Users’ profiles, Browsing and interaction data, User-provided data, IP addresses, Device characteristics, Precise location data, Non-precise location dataidentifier authentication, authentication identifier, datum authenticationlaunch, duration, storage, datum, detail54
talaloskerdesunk.huData collected and processed: Device identifiers, Authentication-derived identifiers, Privacy choices, Probabilistic identifiers, Users’ profiles, Browsing and interaction data, User-provided data, IP addresses, Device characteristics, Precise location data, Non-precise location dataidentifier authentication, authentication identifier, datum authenticationlaunch, duration, storage, datum, detail54
madarles.huData collected and processed: Authentication-derived identifiers, Device characteristics, Non-precise location data, IP addresses, Probabilistic identifiers, Users’ profiles, Precise location data, Privacy choices, Browsing and interaction data, User-provided data, Device identifiersdatum authentication, authentication identifierlaunch, duration, storage, datum, detail52
exkluzivsirko.huData collected and processed: Non-precise location data, Browsing and interaction data, IP addresses, User-provided data, Users’ profiles, Privacy choices, Authentication-derived identifiers, Device identifiers, Device characteristics, Probabilistic identifiers, Precise location datachoice authentication, authentication identifier, profile authentication, address authenticationlaunch, duration, storage, datum, detail52
f12.huWindows Hello for Business and Windows Hello may sound siblings, but they are actually two different families in authentication world ( link )*. Hello is basicly using password caching while Hello for Business uses asymmetric authentication (key or certificate based) – that’s why Windows Hello for…secondary authentication, authentication azure, saml authentication, authentication conditional, certificate authenticationhello, application, user, sign, certificate23
inbuss.huIDM can support your access management with role management, or you can use different authentication levels to access different resources.otp authentication, authentication information, different authentication, authentication leveltechnology, ltd, solution, application, software4
negoma.huIDM can support your access management with role management, or you can use different authentication levels to access different resources.otp authentication, authentication information, different authentication, authentication leveltechnology, ltd, solution, application, software4
balazscsordas.huThis game is only available after authentication. It is connected to a MongoDB database and there is an all time ranklistauthentication system, available authentication, authentication mongodbbalazs, portfolio, site, website, app3
peterprog.huFlask-WTForms is a great tool to help with form authentication (e.g. avoiding Cross-Site Request Forgery (CSRF)). Flask-WTForms can help you create and use simple web forms with simple Python models.form authentication, authentication cross, user authentication, authentication registrationnetwork, security, course, language, industrial3
joshua.huThe End of Yubikeys as 2-Factor-Authentication? Google Breaks 2FA with Yubikeys in Favor of Passkeysfactor authentication, authentication googlebash, fun, jun, attack, tip2
bancard.huIntroducing Apple Pay and implementing strong customer authentication at OTP Bank. Professional support of the introduction of EMV 3DS at OTP Bank both on the issuer and the accepting sides. Support of the VTS project.customer authentication, authentication sca, authentication otpreference, introduction, consulting, solution, commitment2
vargaae.hu> Server side: REST API with Node JS-express server and PostgreSQL database. Authentication and Authorization - set with email registration-log in system on the server sidedatabase authentication, authentication authorizationapplication, andras, portfolio, developer, database2
qstest.huindustry-leading cloud infrastructure provides continuous availability, without having to run your expensive servers. Work anywhere and any time securely using your Windows, Android, iOS browser and native applications, with Multi-Factor-Authentication (MFA), and full regulatory and GDPR compliance.factor authentication, authentication mfasolution, automation, customer, process, software2
cardinal.huCardinal's mobile authentication tool, which supports strong customer authentication (SCA) as required by the PSD2 Directive of the European Union (EBA-RTS) through two-factor authentication (2FA) on Android, iOS and Windows 10 operating platforms. Our Virtual Chipcard Application (ViCA) turns…mobile authentication, authentication tool, customer authentication, authentication sca, factor authenticationdocument, system, support, electronic, customer2
stylersgroup.huTroubleshoot Authentication, Authorization, and Accounting (AAA) and Role-Based Access Control (RBAC)troubleshoot authentication, authentication authorization, authentication failuretroubleshoot, datum, series, group2
petrolkft.huLicence published by the National Office of Measures for doing 30 day long qualification substitute for authentication of dispensers exclusively after repairing.measure authentication, authentication storage, substitute authentication, authentication dispenserdispenser, fuel, technology, product, system2
budapest-ugyved.huThe AVDH (Authentication for Reverted Document Authentication) service is available to those with a client portal. Most importantly, AVDH allows you to sign pdf documents anywhere in the world. If the client also requests a specimen signature (optional), only then is it necessary to print out a…avdh authentication, authentication reverted, document authentication, authentication service, authentication remotelawyer, contract, sale, client, purchase2
hologramhungary.huThere are hologram security labels which are so called „general pattern” labels, which have some standard text on the label, like „Original”, „Authentication”, „Valid” or „Genuine”. These labels can be ordered from our site directly here. They are usually used on single occasion events like local…original authentication, authentication validlabel, security, product, customer, material1
raszta.hu…secure record sharing. To assist ensure the sensitive data stays safe, look for a VDR partner with solid security features such as strain and spy ware scanning, multifactor authentication and advanced encryption. Likewise, select a corporation that offers SOC credentials, which prove that the ...multifactor authentication, authentication advanceddatum, february, room, financial, provider1
investinart.huThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.manage authentication, authentication navigationart, collection, exhibition, sale, news1
basicasset.huIf the application requires the managing of authentications (registration, sign-in), data bases, and contents, it must be equipped with a backend server. The creation of a backend server also takes roughly 1 month .manage authentication, authentication registrationprocess, development, basic, asset, application1
raketakutya.huYou are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in.currently authentication, authentication credentiallog, revision, tool, recent, change1
datakart.huThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.manage authentication, authentication navigationtraining, consulting, datum, product, maintenance1
pickup4x4.huThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.manage authentication, authentication navigationaccessory, fleet, road, steel, bed1
babatb.huThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.manage authentication, authentication navigationdetail, view, target, log, economy1
allatbutor.huThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.manage authentication, authentication navigationdog, furniture, bed, owner, view1
cstamas.huZimbra has a mechanism called preauth which makes it possible to interface with other authentication systems.possible authentication, authentication systempuppet, network, entry, user, idea1
liberatingstructures.huYou are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in.currently authentication, authentication credentialtool, log, recent, change, medium1
rco.huYou are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in.currently authentication, authentication credentialtool, log, recent, change, medium1
hidasi.huOur specialities are real estate and contract law, law of public administrative, representation before courts and authorities, and authentication of contracts in Hungarian, German and English.authority authentication, authentication contractlawyer, law, firm, german, contract1
miskolckartya.huA board web destination can decrease manual processes, free up employees’ time, and cut down on additional out-of-pocket bills. Its protection is top priority. An appropriate board web destination will have a strong security structure, end-to-end reliability features, two-factor authentication…factor authentication, authentication industryboard, software, free, datum, portal1
lebersoftware.huLufthansa Systems – personal award – I made the architecture and most of the implementation of a React component library and other integration parts which provide seamless transition between our current project family’s systems. It provides SSO (Single Sign-on), authentication (based on OpenID)…sign authentication, authentication openidsoftware, engineer, system, award, game1
pattern.huStraight out of university she joined a market leader in the field of digital security and authentication solutions, where she had her first brush with digital technologies. Soon after, she moved on to KPMG where she was a consultant in the energy practice working on both local and regional…security authentication, authentication solutiondigital, consulting, pattern, knowledge, discover1
terrapark.huThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.manage authentication, authentication navigationoffice, environment, ideal, building, conference1
gutinkft.huThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.manage authentication, authentication navigationmain, quality, view, website, document1
filesender.huAuthentication of users is provided through SimpleSAMLphp , supporting SAML2, LDAP and RADIUS and more. Users without an account can be sent an upload voucher by an authenticated user. FileSender is developed to the requirements of the higher education and research community.file, size, upload, user, login1
conos.huElevate your file sharing experience from risky attachments to the highest standard of cloud-based security. Replace the hassle of attachment sharing with the peace of mind that comes with password protection and two-factor authentication. Securely share your sensitive data without compromising…factor authentication, authentication securelydocument, construction, file, solution, plan1
kapinfood.huThe project will complete full automation of the device and its rendered services to pilot the Lab-In-A-Box product in operational environment. The system will be qualified demonstrating full capability including backend cloud-based data management and frontend authentication empowered by…frontend authentication, authentication blockchainfood, safety, system, lab, innovative1
hagcso.huThis website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.manage authentication, authentication navigationprice, website, activity, main, product1
fittfuggok.huIf you are an experienced Joomla! user, this Joomla site will seem very familiar but also very different. The biggest change is the new administrator interface and the adoption of responsive design. Hundreds of other improvements have been made.article, category, component, joomla, user0
telog.huTELOG never stops. We are aware of the importance of the operational continuity of our machines; we are therefore committed to providing remote support, for an improved understanding of any issues you may have and to resolve them together.user authenticationreference, amet, elit, dolor, tempor0
trackgps.huThe TrackGPS fleet management solution combines the accuracy of GPS tracking devices, Bluetooth sensors and CAN data from vehicles with video telematics data, all to ...factor authentication, authentication availablefleet, vehicle, driver, solution, drive0
lasplo.huCurrently I using Exact Audio Copy v1.5 and after ripping (almost with every CD) I get “There were errors” message at the end of .log file. All tracks quality is 100% and crc values are same.key authentication, authentication debianlaszlo, user, music, file, group0
expertsys.huThat null can be really anoying. Your webmethod may have other parameters which all get their right values from the caller, but the renamed one gets nothing. Without any signs of error. In not-so-often-used situation You may already forget about the rename and only get the issue ticket about some…value, method, message, code, result0
reigdev.huInnovative and deadline-driven Graphic Designer with 6+ years of experience & Backend Developer with 4+ years of experience.user authentication, authentication php, authentication systemdevelopment, graphic, art, toth, artwork0
jura.huJura is specialized in developing and supplying graphic security software, hardware, design, banknote protection, personalization and training. Jura provides complete prepress solutions for the demands of high security printing worldwide for more than two decades.smartphone authenticationsecurity, solution, prepress, document, website0
polyglot.huPolyglot Translation Agency: ✔️ Translation ✔️Interpreting ✔️Proofreading for business clients. Please contact us for further information!certification authentication, authentication clausetranslation, language, agency, proofread, interpreter0
blogbook.huIntroduction to Programming Using Java (5th Edition – final version, 2010 Jun) – David J. Eck (HTML, PDF, ePUB + exercises)laravel authenticationprogramming, guide, tutorial, documentation, book0
interoot.huAfter an on-site survey and acknowledging the situation, we sketch a proposal to build your entire company IT network with active elements and a server on demand.network, software, datum, server, system0
synergyfox.huSynergy Fox Business is hrenko.'s proprietary content management system, built on more than 15 years of experience as an agency. You can manage all your websites from one admin interface, with any number of language versions for each page. In addition to the E-commerce module, we can also create a…factor authenticationsynergy, system, corporate, manager, agency0
bse.huBSE Xtend - Stock exchange for medium-sized companiesfactor authentication, authentication codemarket, datum, exchange, stock, trading0
atithebest.huAtithebest Laboratories is an independent institution which research and develop hardware, firmware and software designs.handle authentication, authentication securitylaboratory, technology, solution, control, idea0
rewardclub.huSign up… Login… Home… Support… Terms of Service… Proof of Payments…factor authenticationlogin, recovery, factor, request, sign0
ap-x.huThe data subject has the right to have inaccurate personal data concerning him / her corrected at his / her request without undue delay. Taking into account the purpose of the data processing, the data subject has the right to request that the incomplete personal data be supplemented, inter alia…authenticity authentication, authentication authenticitydatum, subject, process, personal, shall0
minux.huNetBSD on a GPT partition with grub2… grub… boot… Read more about Start NetBSD on a GPT partition with…log, diary, main, notification, user0
hitec.huEnglish… About us… Products… Sale… Security Labels… CX Thermo Data Protective label… Destructive…security, label, paper, product, solution0
nador.huSince the very beginning, we have defined ourselves as a ’system house’ to reflect right in our name that we aim to consistenly provide comprehensive services to our clients from the moment a need arises to the implementation of new systems and post-implementation support.user authenticationsystem, solution, implementation, security, device0
computerce.huFocus: Regularly update product offerings to include the latest technology trends, ensuring clients have access to cutting-edge solutions.accessory, cable, storage, system, memory0
pfeifferszilard.huThe certificate revocation system, just like any other cyber security mechanism, is needless, as long as everything is going well, but becomes essential when...trust, personal, security, technique, attack0
magentadeli.hu…gum 141g… Crodino Biondo non-alcoholic aperitif with herbal extract 10x100ml… Campari LemonSoda Twist-product, cream, sauce, salt, honey0
jzo.huI took part in database schema development with my team and a very strange and unexpected exception threw when we wanted to save data across NHibernate Entity Framework.jwt authentication, authentication authorizationmapping, relationship, identifier, composite, code0
clico.huArista Networks… Armis… Cloudflare… Cloudian… CyberArk… DIGI International… Entrust… Exabeam… Fidelis…user authenticationnetwork, security, gateway, application, encryption0
fortknox.huFort Knox Consultncy provide unique solution for Mobile Rapid Identification, IT consultancy and IT project managmentconsultancy, mobile, solution, explore, verification0
soonerorlater.huWe created this site to have a place to publish our presentations and articles. You may almost consider it a blog.oracle authentication, sniff authentication, authentication bruteforcer, native authentication, authentication versionsoon, presentation, tool, native, article0
csapviztisztitas.huDoulton® has hundreds of years of experience providing families with clean, healthy drinking water in their homes since its beginnings in 1826. Using natural ceramic water filters that improve the look, smell and taste of tap water, Doulton® filters remove contaminants while retaining the healthy…water, filter, taste, drink, discover0