• 如果使用信任应用程序部署,则不会出现任何信任级别提示

    No prompting for trust levels will occur if you use Trusted Application Deployment.

    youdao

  • 配置信任应用程序部署可以证书安装计算机企业级别

    To configure trusted application deployment, the certificate can be installed to the machine or enterprise level.

    youdao

  • 某些情况下通常信任的应用程序宿主提供证据实际上加载程序提供。

    In some situations, evidence that would normally be provided by a trusted application domain host is actually provided by the loader.

    youdao

  • 信任应用程序宿主可以重写加载程序提供证据提供它们自己的证据。

    Trusted application domain hosts can override evidence provided from the loader and can provide their own evidence.

    youdao

  • 另外程序信任应用程序宿主还可以提供自定义证据作为程序组成部分资源

    In addition, an assembly or a trusted application domain host can provide custom evidence as a resource that is part of the assembly.

    youdao

  • 或者数据库可能信任的应用程序处接收XML文档而且您已知这些XML数据始终有效

    Or, maybe the database receives XML documents from a trusted application, maybe even one that you control, and you know that the XML data is always valid.

    youdao

  • 如果数字签名有效信任的应用程序宿主将签名信息作为证据传递运行时策略机制

    If the digital signature is valid, the trusted application domain host passes the signature information as evidence to the runtime's policy mechanism.

    youdao

  • 信任应用程序可以自由可以按照自己互联网接入功能,也认为非常简单易用

    Trusted applications are free to go, but you can block their Internet access too with functions that are very simple to use.

    youdao

  • 如果信任的应用程序宿主没有提供证据权限,则程序应用程序域会收到授予宿主的权限。

    If the trusted application domain host does not have permission to provide evidence, the assembly or application domain receives the permissions that have been granted to the host.

    youdao

  • 运行时策略机制使用来自信任的应用程序宿主程序证据确定代码代码中的成员资格。

    The runtime's policy mechanism USES the evidence from both the trusted application domain host and the assembly to determine a piece of code's membership in a code group.

    youdao

  • 其他辨识项(例如组件数位签章)程序本身就有的,来自载入信任的应用程序定义域主机

    Other evidence, such as an assembly's digital signature, is inherent in the code itself and can come from the loader or a trusted application domain host.

    youdao

  • 有些辨识项(例如程序来源位置)通常来自信任的应用程序定义域主机因为只有应用程序知道这项资讯

    Some evidence, such as where the code originates, usually comes from the trusted application domain host because only the host knows this information.

    youdao

  • 应用程序使用信任的应用程序部署并且没有用于应用程序签名数字证书列为本地计算机受信任发行者

    The application USES trusted application Deployment and the digital certificate used to sign the application is not listed as a trusted publisher on the local machine.

    youdao

  • 可以假设所有直接访问的用户都是信任(即使内部应用程序来说,也是一个天真假设但是场景中这样假设已经足够了)。

    You can assume all the direct users are trusted (a naive assumption even for an internal application, but sufficient for this scenario).

    youdao

  • 这种模型下,根据每位用户信任程度或者授权使用应用程序某一范围功能

    Under this new model, each user is authorized to use an application's range of functionality according to the degree to which he or she is trusted.

    youdao

  • 信任类似模型假定请求应用程序已知信任软件

    This model assumes, like the end to end trust, that a requesting application is known and trusted software.

    youdao

  • 安全模型意味着所有提供者将授予所有信任的请求应用程序访问权限。

    The end to end security model would mean that all providers give access to all trusted requesting applications.

    youdao

  • 模型支持用户登录受信任应用程序后者用户的身份进行服务请求

    This model supports single sign on by users to trusted applications which are able to make service requests on their behalf.

    youdao

  • 如果环境稳定,经常出现组件故障可能重新考虑是否通道作为受信任应用程序运行

    If your environment is unstable with regular component failure you may also wish to reconsider running the channels as trusted applications.

    youdao

  • 通过选择选项队列管理器中的所有通道都将作为受信任应用程序运行

    By choosing this option all channels within the queue manager will run as trusted.

    youdao

  • 而且由于可以很少连接资源切换用户不需要身份验证受信任上下文商业应用程序理想选择

    Furthermore, the ability to switch users with minimum connection resources and without authentication, makes trusted context an ideal choice for business applications.

    youdao

  • 描述环境配置在含受信任上下文的环境运行DB2CLI应用程序的一些考虑事项。

    This section describes the environment configurations and considerations for running DB2 CLI applications under this environment with trusted context.

    youdao

  • 处理请求者应用程序服务主机之间信任关系消息代理可能一个信任中介

    Another trusted intermediary might be a message broker that handles trust relationships between requesters and an application service host.

    youdao

  • XKMS管理客户机应用程序PKI复杂性抽象到了一个信任第三,从而使 PKI 易于管理

    XKMS allows easy management of the PKI by abstracting the complexity of managing the PKI from client applications to a trusted third party.

    youdao

  • 应用程序已经建立DB 2服务器连接之后,应用程序可以在后切换信任上下文相关联用户

    After the application has established a trusted connection with the DB2 server, the application may switch users associated with the trusted context object in the backend.

    youdao

  • 建立信任连接之后应用程序用户切换受信任上下文中定义的允许的用户。

    After the trusted connection has been established, the application can then switch the user to an allowed user defined in the trusted context.

    youdao

  • MQ应用程序作为受信任对象运行好处在于,这样可通过缩短代码路径长度提供性能优势

    The attraction of running an MQ application as trusted is that it gives a performance benefit through reduced code pathlength.

    youdao

  • 信任代码控制区域中运行用户应用程序代码在服务区域中运行,从而应用程序执行事务管理完全隔离

    "Trusted code" runs in the control region, user application code runs in the servant region, which completely isolates application execution and transaction management.

    youdao

  • 这个信任第三提供一个客户机应用程序PK i接口同时驻留XKMS服务

    The trusted third party hosts the XKMS service while providing a PKI interface to the client applications.

    youdao

  • 通过考虑组件应用程序结构主要使用情况,可以更为恰当地确定数据有效性检查位置——例如管理信任边界进行检查。

    Considering the primary USES of components within application structures leads to more appropriate placement of data validity checkingfor example, only at managed trust boundaries.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定