您仍然可以控制证书,但是不能控制根证书。
You still control the certificates, but you do not control the root certificate.
这些被称为“软件发布状态密钥”的公钥控制证书验证过程的行为。
These keys, called the Software Publishing State keys, control the behavior of the certificate verification process.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
您就是CA,并控制所有的证书。
这个项目正在研究一个JEST响应的内容可以如何基于请求客户端的证书进行验证或细粒度数据层的控制。
The project is investigating how the content of a JEST response can be authenticated or controlled at a fine-grained data level based on the requesting client's credentials.
而事实上,证书可能会散放在某人的工作站或移动电脑上,并且提供的物理访问控制非常小,这进一步复杂化了该问题。
This is compounded by the fact that the certificate may be "in the wild" on somebody's workstation or mobile computer with minimal physical access controls.
您可以控制用户到证书的绑定。
在管理控制台中选择一个个人证书,显示它的指纹。
Selecting a personal certificate in the admin console displays its fingerprint.
您控制用户和证书的绑定。
您管理证书的结构、命名、验证和到期时间,但是如前所述您不能控制根证书。
You manage the certificate structure, naming, validation, and expiration, but as we mentioned, you cannot control the root certificate.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
使用由CA签名的证书时,MQ管理员只控制允许连接的DistinguishedNames (DN)的字符串匹配模板。
With CA-signed certificates, the MQ administrator controls only the string matching template for Distinguished Names (DN) that are allowed to connect.
把Snap - in “certificate ”添加到控制台中之后,会看到下面的证书类别。
Once the Snap-in "certificate" is added to the console, you get the certificate categories as listed below.
这一点可以通过使用 X. 509 V3格式发布的数字证书来完成(当然要假定供应商对证书由完全的控制,未经授权的用户不可能有该证书)。
This can be done via a digital certificate published in X.509 V3 format (assuming, of course, the vendor has complete control of the certificate and unauthorized people don't have it).
船舶卫生控制措施证书最长有效期为6个月。
必须完成控制措施后才重新签发船舶卫生控制措施证书。
The control measures must be completed before a further SSCC is issued.
使用管理控制台创建自签名证书,具体操作如下。
Create a self-signed certificate using the administrative console as follows.
我们可以使用一个称为Microsoft管理控制台(MMC)的工具管理Windows证书注册表。
We can manage the Windows certificate registry using a tool called the Microsoft Management Console (MMC).
她拥有ScrumMaster认证证书,在项目管理、问题控制有长期的经验,拥有项目管理方法的广泛知识。
She is a certified scrum master and has long-term experience in managing projects, issue control and has broad knowledge of several project management methods.
如果无法访问iManager控制台,但是需要查明服务器提供的证书,可以采用以下方法。
When there is no access to the IManager console but you need to find out about the certificate the server presents, here is a way.
签发船舶卫生控制措施证书,及附件1和3提及的条款;
the issuance of SSCC and the provisions referred to in Annexes 1 and 3;
WAS管理控制台中的Signer证书。
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
基于SPKI技术提出了组播分布式访问控制系统MDAC,并提出了基于二叉授权委托树的委托证书路径(DCP)查找算法。
Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path (DCP) searching algorithm based on binary tree.
为了设计一种交叉域访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户的PK I方法。
In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.
访问决策子系统负责解析用户属性证书和提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制。
It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.
完整设计了模型的整个可实现框架:包括各组成模块的功能、相关数据结构和消息编码格式、证书管理库和密钥环的设计,以及具体的访问控制流程等。
Those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on.
完整设计了模型的整个可实现框架:包括各组成模块的功能、相关数据结构和消息编码格式、证书管理库和密钥环的设计,以及具体的访问控制流程等。
Those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on.
应用推荐