当用户请求一个保护页面,并被重新定向到登录页面,该页面没有确定的前一页面或主题。
When the user requests a protected page and is redirected to the login screen there is no established previous page or theme.
当一个未经验证的用户试图访问受保护的资源时,提供一个登录页面。
Present a login page whenever an unauthenticated user tries to access a protected resource.
便提醒一下,这些项服务有登录密码保护,因此你无需担心其他人也能够访问你的站点和服务。
These services are protected by logins and passwords, by the way, so you won't have to fear that somebody else will be able to access your site and service.
然而,为了登录网站,我不得不在一大堆甚至连隐私律师都搞不懂的规则下放弃了对可以识别个人身份的大量信息的保护权。
Yet in order even to sign on, I have to give up a rich source of personally identifiable information under a set of rules that a privacy attorney can't even follow.
RP判断登录的用户是否有权访问受保护的资源。
The RP determines whether the logged-in user has authorization to access the protected resource.
预计下周三出现在审判庭上的钱尼,面临着26项身份盗窃及未授权登录和监听一个受保护的计算机的指控。
Chaney, who was expected to appear in a Florida courtroom later Wednesday, was charged with 26 counts of identity theft, unauthorized access to a protected computer and wiretapping.
了解这些内容之后,让我们转而了解那些受简单登录形式保护的示例PHP应用程序。
With that in mind, let's jump into a sample PHP application secured by a simple login form.
JSFAcegiSample应用程序显示一个索引页面和一个登录页面,索引页面中包含受保护资源的链接。
The JSFAcegiSample application displays an index page that contains links to protected resources and a login page.
如果用户试图不是先登录而是直接访问受保护的页面(例如,采用书签或者利用链接),WebSEAL服务器将会返回其默认登录页面。
If a user attempts to directly access a protected page without first logging in (for example, by using a bookmark or following a link), the WebSEAL server will return its default login page.
为私有密钥使用一个强大的口令和密码保护来创建公私密钥对(绝不要生成一个无密码的密钥对或一个无密码口令无密钥的登录)。
Create private-public key pairs using a strong passphrase and password protection for the private key (never generate a password-less key pair or a password-less passphrase key-less login).
当用户使用登录页面进入后,应用程序将自动重定向到被请求的受保护资源。
When the user signs in using the login page, the application automatically redirects to the requested protected resource.
这些密钥存储在采用密码保护的密钥存储库中,在成功登录之后,会将用户的密钥加载到内核中,并建立与进程凭据的关联。
These keys are stored in a cryptographically protected key store and upon successful login, and the user's keys are loaded into the kernel and associated with the process credentials.
这些密钥存储在用密码技术保护的密钥存储库中,在成功登录时,用户的密钥被装载到内核中并与内核进程关联起来。
These keys are stored in cryptographically protected key store and upon successful login, the user's keys are loaded into the kernel and associated with the kernel processes.
如果用户试图访问任何受保护的页面,样例应用程序将显示登录页面。
If the user attempts to access any of the protected resources, the sample application presents the login page.
如果一个页面处于受保护状态,您将无法直接编辑其内容,但如果您登录,就可以在讨论页添加内容。
If a page is protected, you won't be able to edit its contents directly, but if you are logged in, you can add to its discussion page.
考虑到托马斯的电脑已经用密码保护了,那么有可能会是其他人使用她的帐号登录后干的?
Given that Thomas' computer was password protected, what's the chance of somebody else using her login?
身份允许用户通过独一无二的登录设置来获取,保护,表达自己的个性。
The identity allows the user to express his personality, and is typically accessed and protected via a unique log-in.
然后,经过身份验证和授权的用户可以访问一个受保护资源,无需重复执行登录过程。
Authenticated and authorized users can then access a protected resource without performing the login procedure repeatedly.
另一种选择是可以简单地运用火狐浏览器来管理网站登录,根据上述功能,可有效地保护储存于火狐中的更多信息。
Another option is to simply use Firefox to manage your web site logins. See previous feature, Secure your saved passwords in Firefox for more information.
比如,如果一个没有进行身份验证的用户试图访问受保护的资源,ETF将显示一个登录页面要求用户进行身份验证。
For example, if a non-authenticated user attempts to access a protected resource, ETF serves the login page inviting the user to authenticate.
例如,不受保护的资源可以是静态图片、登录页面、注册页面、演示、市场营销资料等。
Examples of unprotected resources can be static images, login pages, registration pages, demos, marketing collateral etc.
这很重要,因为它暴露了简单的、仅基于密码的方法的重大缺陷 ——只要成功登录,就可以访问所有受保护的操作。
This is important because it illustrates one of the key flaws of this simple, password-only approach—namely that, once authenticated, a user can access any or all of the protected actions.
从一个未经身份验证的客户机或权限低于所要求权限的帐户试图访问受保护的对象将会分别导致一个登录提示或“HTTP 401 ”错误。
Accessing protected objects from an unauthenticated client or an account with lower privileges than required will return a login prompt or "HTTP 401" error, respectively.
清单3显示了一个USERNotAuthenticated或FAKED USER错误的例子,当您通过不支持的登录方法登录并运行访问保护点的程序之后,就会出现此类错误。
Listing 3 shows an example of a USER Not Authenticated or FAKED USER error that occurs if you run a program to access a guard point after logging in via a non-authorized login method.
当你想要设置主密码来保护所有敏感的登录信息时,我们为你呈现FireMaster。
Just when you thought setting the master password protected all the sensitive sign-on information, we present FireMaster.
应该从服务客户端通道以工作负荷缓冲、安全、登录等形式提供给服务提供者系统什么保护措施?。
What measure of protection should be afforded to the service provider systems from service client channels in the form of workload buffering, security, logging, and so forth?
所有受保护页面都是使用JSF组件开发的,而Acegi提供登录页面并执行身份验证和授权。
All protected pages are developed using JSF components, whereas Acegi serves the login page and performs authentication and authorization.
图4所示的链接中,其中两个链接指向了被保护的资源(protected1 . jsp和protected2 . jsp),第三个链接指向登录页面(login . jsp)。
Two of the links shown in Figure 4 point to protected resources (protected1.jsp and protected2.jsp) and the third link points to a login page (login.jsp).
例如,如果您希望仅允许通过ssh和telnet登录的特定用户访问保护点,那么需要在登录进程的前面添加|authenticator |,如清单2所示。
For example, if you want to allow certain users to access guard points only if the users log in via SSH and Telnet, add | authenticator | in front of the login processes as shown in Listing 2.
如果远程系统受到保护,并且也不是当前服务器单一登录(Single Sign - On)域的成员,那么您可以在提供的字段中输入用户名和密码。
If the remote system is secured and is not a member of the current server's Single Sign-On domain you can enter a user name and password in the provided fields.
应用推荐