导入CA的证书作为受信任的证书。
设防的和受信任的包装器架构。
创建一个受信任的文件位置。
导入外部CA的证书作为受信任的证书。
Import the external ca's certificate as a trusted certificate.
该体系结构包括一个dmz层,保护受信任的网络。
This architecture includes a DMZ layer that protects the trusted network.
授权将委托给受信任的供应商,如Twitter。
Authorization is delegated to a trusted provider, like Twitter.
如果该发送服务器是受信任的,那么执行过程将继续。
恶意代码在一个受信任的域或上下文中执行。
Execution of malicious scripts within a trusted domain or context.
自定义令牌传播不需要配置受信任的目标领域。
Custom token propagation does not require the configuration of Trusted target realms.
自定义令牌对象传播不需要配置受信任的目标领域。
Custom token object propagation does not require the configuration of Trusted target realms.
只有使用受信任的签署方发放的证书才能发起此攻击。
You can only use certificates issued by trusted signers to execute this attack.
要考虑到,这一专有名称可以从任何受信任的ca请求。
Consider that this same distinguished name can be requested from any trusted ca.
声明为受信任的例程在数据库管理器的地址空间中运行。
A routine that is declared as trusted will run in the same address space of the database manager.
如果发出请求的机器是受信任的,那么用户也是受信任的。
If the machine that initiates the request is trusted, then the user is also trusted.
目标服务器必须将发送服务器列入到受信任的服务器列表中。
The target server has to list the sending server on the trusted servers list.
目标服务器必须将发送服务器列入到受信任的服务器列表中。
The target server must list the sending server on the trusted servers list.
如果这些服务器位于不同的领域,那么必须配置受信任的目标领域列表。
If the servers are not in the same realm, the trusted target realm list must be configured.
然而,基于主机的认证只是在两个受信任的主机之间被允许。
However, host-based authentication is only allowed between two trusted hosts. This trust is based on two criteria.
CA的证书现在已经作为受信任的证书导入到Web浏览器。
The ca's certificate has now been imported into the Web browser as a trusted certificate.
正如前面提到过的,其基本思想是成为同盟者或受信任的顾问。
The idea is to become an ally or trusted advisor, as mentioned earlier.
在设计SOA安全基础设施时,请考虑允许某些受信任的中介。
When designing your SOA security infrastructure, consider planning to allow certain trusted intermediaries.
受信任的主机:数据库根据连接请求的来源确定是否信任这个主机。
Trusted hosts: the database assumes trust based on the source of the connection request.
如果有一种安全的方法可以将公钥分发给受信任的群体,这就足够了。
If there was a secure way to distribute public keys to trusted parties, that would be enough.
要使用任意CA颁发的证书,第一步是将该CA指定为受信任的第三方。
The first step toward using a certificate issued by any ca is to designate that ca as a trusted third party.
如果我们限制服务器上受信任的签署者,我们就连谁能完成SSL握手都可以限制。
If we limit the signers we trust on the server, we can limit who can even complete that SSL handshake.
在联合网络模型中,受信任的联合中的每个合作伙伴被授权访问共享资源。
In the federated network model, each partner in a trusted federation is granted access to the Shared resources.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
The end to end security model would mean that all providers give access to all trusted requesting applications.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
The end to end security model would mean that all providers give access to all trusted requesting applications.
应用推荐