最后的注释行显示了用于ldap_auth身份验证模式的密码映射。
The last commented line shows the password mapping for ldap_auth authentication mode.
客户端用于访问联邦数据库的用户ID和密码映射为远程用户ID和密码。
The client's user ID and password for accessing the federated database is mapped to a remote user ID and password.
指定了两个SQL查询——一个用于选择用户和相应密码的列表,另一个用于选择用户名和组名之间的映射。
Two SQL queries are specified — one for selecting a list of users and corresponding passwords and another for selecting mappings between user names and group names.
下一步是配置安全领域,安全领域定义用户凭证(用户名和密码)与用户角色之间的映射。
The next step is configuring the security realm, which defines mapping between user credentials (user name and password) and user roles.
注意:由于指定该用户映射时没有使用REMOTE _ password子句,因为不需要进行痛苦的密码维护管理。
Note: Since this user mapping is specified without a REMOTE_PASSWORD clause, it does not have the administration pain points associated with password maintenance.
应该能够看到并访问映射的驱动器,不会出现密码提示。
You should be able to see the mapped drive and access it as usual without a password prompt.
第一步是将我们前面提到的别名映射到数据库的用户ID和密码。
The first step is to map the alias that we mentioned earlier to the user ID and password for the database.
我的示例脚本为 "saracco"帐户创建了一个用户映射;在远程Oracle系统上,这个ID将被映射到带有密码 "demopwd" 的 "demo" 用户。
My sample script creates one user mapping for the "saracco" account; on the remote Oracle system, this ID will be mapped to "demo" with a password of "demopwd".
在大多数生产环境中,管理员还会定义用户映射(user mapping),以便将DB 2II用户ID和密码翻译成远程数据源上的有效帐户。
In most production environments, administrators also define user mappings to translate a DB2 II user id and password to a valid account on the remote data source.
选中delegate角色,并输入映射到委托角色的用户代码和密码。
Check the delegate role, and enter the user code and password mapped to the delegate role.
无效用户映射——本地或远程用户ID或密码已改变。
Invalid user mapping - The local or remote user id or password has changed.
清单2演示如何在属性映射中为WS - Security处理设置用户名和密码。
Listing 2 shows how you can set the username and password for WS-Security handling in this property map.
但是,如果不使用用户映射,应确保在连接到联邦数据库时隐式地指定用户ID和密码。
However, if you do not use a user mapping, ensure that you explicitly specify the user ID and password when you connect to the federated database. For example.
byte2eat =映射的用户密码
完成后,使用用户名和密码构造函数参数将它映射到Scitter类非常简单,如清单6所示。
Once that works, it's pretty easy to see how this will map into the Scitter class itself using the username and password constructor parameters, shown in Listing 6.
可以为每个WebSphereInformation Integrator用户创建到远程数据源上的ID和密码的映射。
You can create a mapping for each WebSphere Information Integrator user to an ID and password on a remote data source.
映射为使用两个不同密码的用户rocky(分别针对samba和ad)。
Map as user rocky using the two different passwords (for Samba and AD).
远程文件系统和其他内核服务可以使用这个服务来管理密码学、身份验证标记、跨域用户映射和其他安全问题。
The service can be used by remote filesystems or other kernel services to manage cryptography, authentication tokens, cross-domain user mappings, and other security concerns.
如果用于连接到联邦数据库的用户ID和密码与用于访问远程数据源的用户ID和密码相同,那么不需要创建用户映射。
If the user ID and password you use to connect to the federated database are the same as those you use to access the remote data source, you do not need to create a user mapping.
在客户机上执行userid、密码和名称空间的重新映射。
Perform userID, password, and namespace remapping on the client.
快速编码方法是CMG机构研究工作的一部分,在映射CMG机构密码鉴别原理的电子组合锁中有实用价值。
The fast coding method is a component of the CMG study. It has practicability in a novel electronic combination lock which mapped the discrimination principle of the CMG mechanism.
利用混沌映射具有对初值的敏感性和遍历性等特点,采用多次迭代的一维均衡混沌映射构造了一种非周期、均匀分布的多表代换密码。
Utilize the sensitivity and ergodic characteristic of the chaos map, a non-periodic and uniformity distributing multi-chart substitution is designed with multi-iterative equilibrium chaos map.
通过引入二进制分数及其相关运算,提出一种新的基于混沌映射的分组密码算法。
By introducing binary fraction and its related operations, a novel block cipher based on chaotic maps is proposed in this paper.
论文第四章重点介绍用非线性映射方法分析原核生物基因密码子使用情况并得到的相关结论。
In chapter IV, the codon usage preferences in prokaryotic organism are analyzed by nonlinear mapping method.
提出了一种新的二维混沌映射—平面方体上的帐篷映射,并用于流密码的构造。
In this paper, a new planar chaos map is presented which is tent map on square, and it is applied in stream cipher.
基于分段非线性混沌映射设计了一种流密码加密方案。
A stream cipher encryption scheme was designed based on piecewise nonlinear chaotic map.
基于分段非线性混沌映射设计了一种流密码加密方案。
A stream cipher encryption scheme was designed based on piecewise nonlinear chaotic map.
应用推荐