一旦安全服务器通过秘密密钥确认了用户的身份,用户登录到DCE的过程就完成了。
Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.
目标服务器将使用此会话密钥来确认客户端的身份。
This session key will be used by the target server to confirm the identity of the client.
在ssl属性中,确认密钥存储库的位置是否与您的密钥数据库名称和位置相符。
In the SSL properties, verify that the location of the key repository matches your key database name and location.
为了确认,您的应用服务器密钥文件中应包含jmsclient证书,同时应用服务器信任文件中应包含两个签名者证书,如图13所示。
To verify, your application server key file should contain the jmsclient certificate, and the application server trust file should contain two signer certificates, as shown in Figure 13.
Notes客户程序收到消息,获得交叉证书(提示用户并确认该操作之后),然后把发送方的公开密钥加入到地址簿中。
The Notes client receives the message, obtains cross certificates (after prompting the user to confirm this action), and then adds the sender's public key to the address book.
完成上述操作后,可以看到一个回复页面,其中给出了一个非常长的密钥,并确认您的URL,甚至还给出一个示例页面。
Once you're finished, you'll get a nice reply screen back, which gives you a very long key, repeats back your URL, and even gives you a sample page. The key will look something like this.
应用你看到的下一批的可用更新,然后应用你看到的其它进一步的更新,在此过程中按更新软件的提示,确认并导入新的GPG密钥。
Apply the next set of updates you see available. Then apply any further updates you see, verifying and importing the new GPG key along the way as prompted by your update software.
把密钥和数据库从老计算机复制到新计算机。(确认新计算机与老计算机同名。)
Copy the cryptographic key and the database from the old computer to the new one. (Make sure the new computer has the same name as the old one.)
其次,对UAP协议进行安全分析,由于其确认密钥完全依赖于服务器的长期私钥,因此它不具有前向保密性和密钥泄漏的安全性。
Secondly, the UAP protocol is analysed, because the key confirmation completely lies on the long-term private key, so it does not achieve forward secrecy, and resists key-compromise impersonation.
当认证机构确认了用户的身份后,电子证书使用证书持有者的公共密钥来保护数据。
When a user's identity is verified by the CA, the certificate uses the holder's public encryption key to protect this data.
当认证机构确认了用户的身份后,电子证书使用证书持有者的公共密钥来保护数据。
When a user's identity is verified by the CA, the certificate uses the holder's public encryption key to protect this data.
应用推荐