即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
This password check is done even if the user is following the public key or host-based authentication.
通过扩展PasswordHandler接口,开发人员可以创建一个类来实现密码检查逻辑。
By extending the PasswordHandler interface, a developer can create a class to implement the password-checking logic.
清单4显示为对一个用户的项目目录进行密码检查向httpd . conf增加的代码,而不是将其放入一个. htaccess文件并依赖于AllowOverrides。
Listing 4 shows the additions to httpd.conf to enable password checking for a user's project directory, rather than putting in a.htaccess file and relying on AllowOverrides.
无意义介导的衰变检查是否存在过早的无意义密码子。
Nonsense-mediated decay checks for the presence of premature nonsense codons.
您需要为这个方法传入三个参数,即ID文件、密码和用于检查更改的服务器。
You pass to this method the ID file, password, and server on which to check for changes.
在这里,它只是针对固定值检查提供的用户名和密码,但它可以轻松使用一个数据库查询或其他机制替代。
In this case, it just checks the supplied username and password against fixed values, but it could easily use a database lookup or other mechanism instead.
它只是检查名称和密码是否与数据库匹配。
It simply checks if the name and password match up to the database.
更明确地说,SSH是一种更安全的工具,不以明文传输密码,并且执行更加健壮的检查,以确保客户机不是在欺骗它们的主机名。
More specifically, SSH is a more secure utility that does not transmit passwords in clear text, and performs much more robust checks to ensure that clients are not spoofing their hostname.
清单6将添加第一个基本的击键力度相关的检查子例程:密码输入总时间。
Listing 6 adds subroutines for the first basic keystroke dynamics-related check: total time of password entry.
当用户登录并输入用户名和密码时,会检查这些文件。
These files are checked when a user logs in and enters a username and password.
在进入以后,他们可以检查文件系统,查看个人信息,比如密码。
Upon entry, they scan your file system for personal information, such as passwords.
在经过简单的检查确保两个密码长度相等之后,将在整个密码中匹配各个键——例如,确保两个密码中的第五个字符是零。
After a simple check to ensure the two passwords are of equal length, each key is then matched in the entire password - ensuring that the fifth character is a zero in both passwords, for example.
默认的身份验证器仅仅检查用户名和密码是否相同。
The default authenticator simply verifies that the username and password are identical.
检查用户ID和密码,并进行相应的修改。
密码规则用于控制对主体密码的单项限制或检查项。
A password rule governs a single restriction or checks on the principal's password.
运行的时候,TAI检查密码,通过用户注册中心验证密码是否属于信任用户。
At run time, the TAI examines the password and validates with the user registry that the password belongs to the trusted user.
对于High、Medium和Low安全级别,检查密码、用户和组定义。
Checking password, user, and group definitions for High, Medium, and Low security levels.
最初,表单只是检查用户名和密码,如果正确无误则创建一个loginToken。
Originally, it simply checked the username and password and created a loginToken if they were correct.
因此,如果您自己管理安全设置(例如通过编辑文件、设置密码规则等等),那么AIXPert安全检查不起作用。
So, if you've started locking down security yourself-for example, by editing files, setting password rules, and so on-the AIXPert security check won't work.
清单7显示了 hasNonPrintable子例程,它可以针对 @nonPrintable数组中的一个预期前缀检查密码。
Listing 7 shows the hasNonPrintable subroutine used to check a password for one of the expected prefixes in the @nonPrintable array.
我要做的只是了解如何使用ActiveDirectoryServer检查用户名和密码,创建一个类来扩展这个接口,并添加执行身份验证的代码。
All I had to do was find out how to check the username and password using Active Directory Server, create a class to extend this interface, and add the code to perform the authentication.
它从前面生成的passfile文件读取用户名和密码,然后通过检查 /etc/passwd 确认这是有效的账户。
It reads the user and password from the file passfile, (generated earlier in this demonstration) it then checks this is a valid account by checking /etc/passwd.
对root密码的更严格的检查。
在设置为“Yes”时,在允许用户登录之前,它检查用户的密码是否已经过期。
When it is set to "Yes," it checks whether the password is expired for that user before allowing the user to log in.
示例4:检查userid和密码以确保策略遵从性。
Example 4: Check userids and passwords for policy compliance.
j_username指定请求安全检查的用户的用户名,j _ password指定密码。
J_username specifies the username of the user requesting a security check, and j_password is the password.
pam_cracklib和pam_pwcheck检查新密码的强度。
Pam_cracklib and pam_pwcheck check possible new passwords for strength.
LogonCmd调用VerifyCredentialsCmd任务,向它传递登录ID和密码,并检查该询问信息是否有效。
The LogonCmd calls the VerifyCredentialsCmd task passing it the logon id and logon password, which checks to see if the challenge information is valid.
LdapAuthenticationProvider构造函数的第一个参数是authenticator,该参数通过检查用户的用户名和密码对LDAP目录的用户进行身份验证。
The first parameter to the LdapAuthenticationProvider constructor is authenticator, which authenticates a user with the LDAP directory by verifying the user's username and password.
IBMNAS管理服务器(kadmind)提供了增强密码强度检查工具。
The IBM NAS administration server (kadmind) provides an enhanced password strength-checking facility.
应用推荐