Sentences with phrase «technical authentication method»

This process is known as eAuthentication and contains two major sets of requirements that must be met: the verification of the user prior to the issuance of the credentials (identity proofing) and a technical authentication method (user name and password).
a b c d e f g h i j k l m n o p q r s t u v w x y z