对更改密码的安全插件支持。
安全插件把成功或者失败的消息返回给用户。
The security plug-in returns a success or failure message to the user.
用于身份验证的DB 2UDB安全插件。
如果没有明确配置安全插件,则使用默认的安全插件。
If a security plug-in has not been explicitly configured, the default plug-in is used.
在开发安全插件时,需要实现DB 2udb调用的标准身份验证函数。
When you develop a security plug-in, you will need to implement the standard authentication functions that DB2 UDB invokes.
操作系统确认bob/bobpsw组合是否有效,把该信息返回给安全插件。
The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.
编写支持SPKM/LIPKEY安全机制的定制的GSS-API 安全插件。
Write customized GSS-API security plug-ins that will support SPKM/LIPKEY security mechanisms.
本文给出了DB29中 DB2安全插件的增强信息,详细阐述了安全性插件的职责。
This article provided you the enhancement information for the DB2 security plug-in in DB2 9, and explained in detail the duties of the security plug-ins.
在DB2UDB客户机中:一个支持 LIPKEY 的客户端GSS-API安全插件。
On the DB2 UDB client: a LIPKEY-enabled client-side GSS-API security plug-in.
事实上,ibm为db2UDB提供的示例Kerberos安全插件是基于GSS - API的。
In fact, the IBM-supplied sample Kerberos security plug-in for DB2 UDB is based on GSS-API.
利用DB 2UDB安全插件架构,您可以通过开发自己的插件或从第三方购买插件的方式来定制身份验证行为。
With the DB2 UDB security plug-in architecture, you can customize its authentication behavior by either developing your own plug-ins, or buying plug-ins from a third party.
DB 2UDB提供一种框架,用于编写定制的安全插件,管理员可使用这些插件进行DB 2 UDB身份验证。
DB2 UDB provides a framework for writing customized security plug-ins that administrators can use for DB2 UDB authentication.
为了允许定制DB2UDB身份验证行为,DB2 UDB 提供了可用来修改现有插件或构建新的安全插件的API。
To enable you to customize DB2 UDB authentication behavior, DB2 UDB has exposed APIs that you can use to modify existing plug-ins or build new security plug-ins.
然后还将描述:如何通过使用新的具有可定制的DB 2UDB安全插件的GSS - API安全机制来实现基于公钥技术的身份验证。
It then describes how you can achieve authentication based on public key technology, using the new GSS-API security mechanisms with the customizable DB2 UDB security plug-ins.
换言之,IBM的Kerberos支持是作为一个GSS - API安全插件来提供的,您可将该插件用于服务器身份验证和用户身份验证。
In other words, IBM's Kerberos support is provided as a GSS-API security plug-in, which you can use for both server and client authentication.
在DB2UDB服务器中:一张 X.509证书,一个PKI环境,以及一个支持 LIPKEY 的服务器端GSS-API安全插件。
On the DB2 UDB server: an X.509 certificate, a PKI environment, and a LIPKEY-enabled server-side GSS-API security plug-in.
本文将向您介绍如何在TechnologyExplorer中使用db2auth安全插件来控制db2的用户和组身份验证(参见参考资料了解db2auth的详细信息)。
This article teaches you how the Technology Explorer can control user and group authentication to db2 through the use of a security plug-in called db2auth (see Resources for more about db2auth).
本文描述如何设计和开发一种特定类型的安全性插件,这种安全性插件使用DB2数据库存储身份验证信息。
This article describes the design and development process of a specific type of security plug-in, one that uses a DB2 database to store authentication information.
安全性插件是按每个实例实现的,因此可以创建不同的实例,使用不同的安全性插件实现。
Security plug-ins are implemented per instance, therefore you can create different instances, and have different security plug-in implementations.
本系列的第10部分描述了如何部署定制的安全性插件。
Part 10 of this series described how customized security plug-ins can be deployed.
本文讨论为了很好地理解DB 2安全性插件而需要知道的方方面面,并讨论不同类型的安全性插件,它们为什么如此重要,以及如何使用它们。
This article discusses everything you need to know to have a good understanding of DB2 security plug-ins, the different types of security plug-ins, why they are important, and how to use them.
本文对安全性插件进行了概述,首先提到了安全性插件的优点,以及安全性插件与标准安全性设施相比的优势。
This article provided you with an overview of security plug-ins, starting with the benefits of security plug-ins and their advantages over standard security facilities.
DB 2提供安全性插件基础设施和一些缺省的安全性插件。
DB2 provides the security plug-in infrastructure and some default security plug-ins.
本文还提供了一些安全性插件程序示例,并展示如何逐步实现它们。
It also includes sample security plug-in programs, and shows you how to implement them step by step.
这在前面的缺省安全性插件中已经讨论过。
This was discussed earlier in the section Default security plug-ins.
检查管理日志中与安全性插件相关的消息。
Check the administrative log for messages specific to security plug-ins.
通过本文还可以了解安全性插件的一些限制,使用安全性插件时可能遇到的一些常见问题,从而有助于您在实现自己的安全性插件时调试问题。
You learned about restrictions on security plug-ins, and common errors encountered while working with them to help you debug problems when implementing security plug-ins on your own.
而从 8.2版开始,以上每种情况都可以使用安全性插件。
Starting with Version 8.2, security plug-ins can be used in each of these situations.
定制的安全性插件的实现则有待您来决定。
The implementation of a customized security plug-in is left to your discretion.
本系列的第2部分介绍了DB 2安全性插件、实现DB 2安全性的方法及一系列与安全性插件相关的详细信息。
In part 2 of this series, DB2 security plug-ins were introduced, as well as the method in which DB2 security is implemented, and a list of relevant detailed information about security plug-ins.
应用推荐