为了估计远程用户认证的变量,在本文中提到的程序服务器是本地的用户储存库(并不使用LDAP)。
To eliminate the variable of remote user authentication, the application servers mentioned in this article are local user repositories (that do not use LDAP).
增强认证支持,对建立安全的远程会话和用户认证提供了更强大的处理能力。
Enhanced authentication support that provides stronger processes for establishing secure remote sessions and authenticating users.
接下来,可以创建用户映射以便在需要时将远程认证信息注册到数据源
Next, you can create a user mapping to register remote authentication information to the data sources if necessary
在Authenticationprofile字段中,输入用于验证远程用户凭证的认证方法。
In the authentication Profile field, enter the authentication method to use to validate remote user credentials.
指定对该用户进行认证的密码;该工具需要使用一个有效的用户ID和密码登录到远程系统上。
Specifies a password that authenticates the user; the utility requires a valid user id and password to log on to a remote system.
因为门户用户无法访问远程Web应用程序,所以portlet服务需要使用不同的用户标识进行认证。
Because the portal users do not have access to the remote Web application, the portlet service needs to authenticate with a different user id.
远程认证准许用户电脑上的改变被授权方感知。
Remote computer authentication allow users to change authorized square perception.
该系统实现了远程访问用户的安全认证、访问授权和记费管理。
The system achieves identity authentication, access authorization, and accounting management to the remote access users.
构建了基于远程访问拨号接入用户服务(RADIUS)的认证、授权和计费系统。
A remote access dial in user service (RADIUS) authentication, authorization and account system is constructed.
TACACS是一个安全的加密协议,因此低于后来TACACS +和远程认证拨号用户服务协议。
TACACS is an encryption protocol and therefore less secure than the later TACACS + and Remote Authentication Dial-In User Service protocols.
同时,在可信计算技术中,终端计算机是通过用户身份认证来实现安全的远程访问,用户在实现远程认证的同时也要求保护自己的隐私不被泄漏。
Remote attestation which the users are used to identify themselves to connect remote communication is required in the trusted computing. As well as the users require to protect their privacy.
同时,在可信计算技术中,终端计算机是通过用户身份认证来实现安全的远程访问,用户在实现远程认证的同时也要求保护自己的隐私不被泄漏。
Remote attestation which the users are used to identify themselves to connect remote communication is required in the trusted computing. As well as the users require to protect their privacy.
应用推荐