Lines Matching full:generally
65 based services, this list will generally be provided by the service
71 client must possess some kind of secret. This is generally a private
77 This secret is generally generated by the service provider, or by
90 Also, token based client authentication will generally require the
93 time to be accurate within a day or so. Token generation generally
118 devices generally have limited storage, and as such, these logs need
215 that are generally considered secure [2]_, including forward
219 communication with generally agreed secure cipher suites
248 There are several options, and the technique used is generally
254 the secret described by that certificate. Generally, these
268 Token (JWT) can be used. These tokens will generally have a
334 In addition to the above, network connected devices generally will need
379 TLS shall be configured to allow only generally agreed cipher