如果用户的证书丢失或被盗,黑客就能够访问信息而不用经过身份验证。
If the user loses the certificate or the certificate is stolen, hackers can access this information without being challenged for authentication.
然后,将一个卡片附在阀门上,注明每次压力测试和材料检测程序都已完成,作为提供给我们的用户的证书。
A laminated card is then attached to the valve with each test and material check indicated, as certification to our customer that these procedures have been followed.
该系统可能使用智能身份证或连接到特定计算机的数字证书,并在一系列在线服务中认证用户。
The system might use a smart identity card, or a digital credential linked to a specific computer and would authenticate users at a range of online services.
但是,如果可以获得一份有效的证书,无论是用户还是浏览器都不会有被劫持的想法。
But if a valid certificate can be obtained, neither the user nor the browser have any idea that they have been hijacked.
您必须在证书中使用一个有效的用户DN以使证书正常工作。
You would have to use a valid user DN in your certificate for that to work.
通过支持用户名和密码认证以及数字证书的数据安全。
Data security by providing support for username and password authentication and for digital certificates.
凭证的示例包括证书、私钥、用户标识以及密码。
Examples of credentials include certificates, private keys, user IDs, and passwords.
因此,同一个用户在使用相同的证书多次访问相同的服务器时,线路中存在冗余信息。
Consequently, redundant information flows through the wire for the same user accessing the same server multiple times with similar credentials.
用户通过拥有并使用CA的信任证书来表明自己对认证权威的信任。
The user signifies trust in the certificate authority by possessing and using the ca's trust certificate.
把用户绑定到证书采用什么样的过程?
What process will be used to bind the user to the certificate?
您可以控制用户到证书的绑定。
很多厂商都提供了自动化的系统来注册用户和发布证书。
Many vendors have automated systems that can register users and issue certificates.
由RIM开发的黑莓ID (BBID)为用户提供一个单独的用户帐户和使用RIM服务及第三方服务的证书。
Developed by RIM, BlackBerry id (BBID) provides users with a single user account and credentials to access RIM services and third party services.
否则,有可能两个签署者颁发的证书映射到同一个用户身份。
Otherwise, it is possible that two signers might issue certificates that map to the same user identity.
随后,它将把生成的用户证书发送到所提供的电子邮件地址。
Later, a generated user certificate will be mailed to the E-mail id provided.
但是如果伙伴系统位于远程端,CICS则不直接委托合作伙伴声明未经身份验证的用户ID,除非它使用受信任的数字证书进行自我标识。
But if the partner is remote, then CICS does not directly trust the partner to assert unauthenticated user IDs unless it identifies itself with a trusted digital certificate.
您控制用户和证书的绑定。
因为我们不准备将该应用程序部署给广大的用户,所以创建了一个自签名的测试证书。
Since this application is not going to be deployed to a wide user base, we'll create a self-signed test certificate.
因此,服务器上的每次缓存缺页都会触发一个RPC回调,它会获取整个完整的用户证书(STKT +PAC)。
Thus, every cache miss on the server triggered a callback RPC that had to fetch the user's credential (STKT + PAC) in its entirety.
把用户ID添加到队列管理器的密匙列表中之后与通道的证书关联起来的用户ID。
It is the user ID associated with the channel's certificate when you added it to the key ring.
多数用户在登录软件系统时,通常提供自己的用户名(当事人)和支持他们的密码(证书)。
When most users login to a software application, they usually provide their username (the principal) and their supporting password (the credential).
当前用户的Windows证书自动从这个平台获取并用于验证,以免您再次输入这个信息。
The current user's Windows credentials are automatically obtained from the platform and used for authentication, saving you from having to re-enter this information.
如果为您的WebSphereApplicationServer启动了安全性,您必须额外指定安全用户和信任存储信息的证书。
If security is enabled for your WebSphere Application Server, you must additionally specify credentials for the security user and trust store information.
另一个示例是为通过您网站上的在线课程的用户生成表示证书(presentation certificate)。
Another example is generating presentation certificates for users who pass an online course on your Web site.
另外,由于数据集成是在服务器和客户端同时发生的,因此从用户到mashup服务进行的身份和证书委托也可能会成为一个需求。
Additionally, with data integration happening both on the server and client-side, identity and credential delegation from the user to the mashup service might become a requirement.
如果您希望向用户显示证书的内容,或者要根据主机名或证书权威对证书进行验证,那么就需要检索证书的内容。
Retrieving the peer certificate is necessary if you wish to either display it to the user or verify it either against the host name or the certificate authority.
合作伙伴的主要目的之一就是不公开用户所在的安全域的用户证书。
One of the primary goals of the partners was to not expose user credentials of their security domain.
请注意,虽然两个工具都允许用户生成自签署的证书,但是它们都不允许用户签署证书。
Note that while both tools allow the user to generate self-signed certificates, neither tool allows the user to sign a certificate.
基于各种登录模块实现(使用数字证书,或由用户实现的登录模块实现)的安全领域超出了本文的范围。
Security realms based on login module implementations that either use digital certificates or are user implemented are beyond the scope of this article.
基于各种登录模块实现(使用数字证书,或由用户实现的登录模块实现)的安全领域超出了本文的范围。
Security realms based on login module implementations that either use digital certificates or are user implemented are beyond the scope of this article.
应用推荐