不过,在您创建配置文件之前,需要先生成一个用户证书。
But, before creating a profile, you need to generate a user certificate.
下一步是使用有效的用户证书集登录到Sametime。
The next step is to log in to Sametime with a valid set of user credentials. These credentials can be obtained as follows.
随后,它将把生成的用户证书发送到所提供的电子邮件地址。
Later, a generated user certificate will be mailed to the E-mail id provided.
合作伙伴的主要目的之一就是不公开用户所在的安全域的用户证书。
One of the primary goals of the partners was to not expose user credentials of their security domain.
每个用户配置文件都使用用户证书进行加密,该证书充当一个主密匙。
Each user profile created is strongly encrypted with the personal user certificate, which ACTS as a master key.
然后,LoginAction获取和确认用户证书,并针对后续请求验证用户。
Then, the LoginAction obtains and verifies user credentials, and authenticates the user for subsequent requests.
图7.Mozilla通知用户证书中指定的主机名与浏览器期望的主机名不相符。
Figure7. Mozilla informing the user that the certificate is specifying a hostname different from the hostname that the browser is expecting.
针对3g现有安全特点,提出了基于3g安全接入机制AKA的用户证书颁发过程。
For the current security features of 3g, an issuing process of user certificate based on 3g security access mechanism AKA is put forward.
有了 OAuth,一个资源所有者可以授权第三方应用程序访问受保护的资源,而不损害用户证书。
With OAuth, a resource owner can authorize third party application access to the protected resource without compromising user credentials.
论证子系统的设计:包括认证中心的建立与运作,商家证书和用户证书的申请、颁发、查询、安装。
The authentication subsystem which includes the establishment and operation of authentication center, the application, grant, query, and setting of merchant and client certificate.
该类将检索它必须连接的LotusSametime服务器信息,以及作为命令行参数的机器人的用户证书。
The class retrieves the Lotus Sametime server information to which it must connect as well as the user credentials for the bot as command line arguments.
因此,服务器上的每次缓存缺页都会触发一个RPC回调,它会获取整个完整的用户证书(STKT +PAC)。
Thus, every cache miss on the server triggered a callback RPC that had to fetch the user's credential (STKT + PAC) in its entirety.
通过对用户证书中的属性取值进行评估,把符合条件的用户分配给特定角色,从而达到了根据用户的特征及资历实施访问授权的目的。
By evaluating the value of user attributes in the user credential, a qualified user is assigned to a specific role. This allows access authorization based on user characteristics and qualifications.
该模型从用户证书、时间约束、XML文档分类等方面对传统的RBAC模型进行了扩展,以实现基于内容的时间上下文敏感的多粒度访问控制。
This model extends the traditional RBAC model with user credentials, temporal constraints and XML document classification to enforce a content-based time-aware multi-granularity access control.
这个RA可以注册用户并管理证书请求,而不需要直接访问证明者ID和口令。
This RA can register users and manage certificate requests without having direct access to the certifier ID and password.
该系统可能使用智能身份证或连接到特定计算机的数字证书,并在一系列在线服务中认证用户。
The system might use a smart identity card, or a digital credential linked to a specific computer and would authenticate users at a range of online services.
然后,您必须从电子邮件客户端保存该证书,并完成用户配置文件创建过程。
You then have to save the certificate from the E-mail client and complete the user profile creation process.
于是这个RA可以注册用户并管理证书请求,而不需要直接访问证明者ID和口令。
The RA can then register users and manage certificate requests without having direct access to the certifier ID and password.
证书允许用户通过JAAS供应者得到身份认证,并同时得到访问多种企业资源的身份认证。
Credentials allow the user to be authenticated through a JAAS provider and simultaneously authenticated to a wide variety of enterprise resources.
您必须在证书中使用一个有效的用户DN以使证书正常工作。
You would have to use a valid user DN in your certificate for that to work.
基于各种登录模块实现(使用数字证书,或由用户实现的登录模块实现)的安全领域超出了本文的范围。
Security realms based on login module implementations that either use digital certificates or are user implemented are beyond the scope of this article.
发送端断言的标识采用为初始登录(例如,用户ID、DN、证书)提供的原始凭据的形式。
The identity asserted on the sending side takes the form of the original credentials provided for the initial login (for example, user ID, DN, certificate).
如果您希望向用户显示证书的内容,或者要根据主机名或证书权威对证书进行验证,那么就需要检索证书的内容。
Retrieving the peer certificate is necessary if you wish to either display it to the user or verify it either against the host name or the certificate authority.
凭证的示例包括证书、私钥、用户标识以及密码。
Examples of credentials include certificates, private keys, user IDs, and passwords.
该服务器接收调用并检查证书,然后判断用户是否被授权使用此服务。
The server takes the call and examines the certificate and decides whether the user is authorized to enjoy this service.
把用户绑定到证书采用什么样的过程?
What process will be used to bind the user to the certificate?
很多厂商都提供了自动化的系统来注册用户和发布证书。
Many vendors have automated systems that can register users and issue certificates.
您可以控制用户到证书的绑定。
您控制用户和证书的绑定。
您控制用户和证书的绑定。
应用推荐