这个阶段不需要任何安全配置。
安全配置问题:连接器未启动。
下图展示了以下安全配置的测试时间
The next figures show test times for the following security configurations
测试Web应用程序的安全配置。
这特别适用于安全配置。
安全配置:创建和管理用户和组,管理授权组。
Security configuration: Create and manage users and groups, manage authorization groups.
用户的特定要求取决于DB2的安全配置。
The specific requirements of the users depend on the security configuration of DB2.
STS安全配置嵌在安全对话令牌的策略定义中。
The STS security configuration is nested inside the policy definition of the secure conversation token.
在EJB3Bean中使用注释进行安全配置。
随后的两组数据显示了遵循安全配置的相对测试时间
The next two figures show the relative test times for the following security configurations
我已经查找过信息,我发现我需要使用定制安全配置。
I have been looking for information and I have found that I need to use a custom security configuration.
还有就是,你不能使用组策略来部署安全配置向导策略。
INF files Furthermore, you can't use group policies to deploy Security Configuration Wizard policies.
清单12显示了用于本文使用的示例应用程序之一的安全配置。
Listing 12 shows the security configuration of one of the sample applications used in this article.
在本测试中的所有安全配置中,Axis2始终是速度最慢的栈。
Axis2 is consistently the slowest of the stacks across all security configurations for this test case.
它把许多功能集中在一个系统中,包含超过300个安全配置设置。
It incorporates many functions bundled into one system and includes over 300 security configuration Settings.
这样做将允许轻松地集成现有安全配置,因为用户名和密码保留不变。
This allows for easy integration with existing security configurations, as the user name and password will remain unchanged.
对于SSL安全配置,我们将使用服务器身份验证和客户端身份验证。
For the SSL security configuration, we use both server authentication and client authentication.
由应用程序使用的凭据库在应用程序的部署计划中的安全配置中指定。
You specify the credential store to be used by an application in the security configuration in the application's deployment plan.
因此,应用程序具有不同的用户群体和不同的安全配置,如图12所示。
As a result, applications have a distinct user population and distinct security configuration, shown in Figure 12.
当使用SSL 时,可以应用“疑问 #1”中所提到的所有安全配置。
The security configurations mentioned in Myth #1 all apply when using SSL.
安全配置问题:服务器初始化缓慢和WBEruntimeear未启动。
Security configuration problem: server initialization is slow and WBEruntimeear doesn't start.
这些文件指定了RMI - IIOP与服务器的通信中要使用的安全配置。
These files specify security configuration to use in RMI-IIOP communication with the server.
每个请求序列在不同安全配置下运行多次,结果取每种配置下的最好成绩。
Each request sequence was run multiple times in different security configurations, with only the best time for each configuration kept in the results. The security configurations tested were.
安全配置向导允许你创建基于XML的安全策略。它们可以应用到你的服务器上。
The security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers.
而AIXPert包含了超过300个安全配置设置,并提供对每个元素的控制。
AIXPert incorporates over 300 security configuration Settings, while still providing control over each element.
这可能导致布置在网络中的系统需要的信任级别更低,或者会暴露本地的安全配置。
This may result in systems placed in network segments with lower than required trust levels or vulnerable local security configurations.
记住,由安全配置向导所创建的这些策略跟安全模板(采用。INF文件)是不同的。
Keep in mind that the policies created by the security Configuration Wizard are different from security templates which use.
每个请求序列都使用不同的安全配置运行了多次,结果中仅记录各配置表现最好的数据。
Each request sequence was run multiple times in different security configurations with only the best time for each configuration kept in the results.
您可以管理安全配置和传输配置,但是目前,让我们单击TryIt链接。
You can manage security and transport configuration, but for now, let's click on the Try it link.
应用程序的Run-as 主体和缺省主体在应用程序的部署计划的安全配置中指定。
You specify the run-as and default subjects for the application in the security configuration in the application's deployment plan.
应用推荐