应用服务器管理为用户认证和角色管理提供了交互性配置支持。
Application Server's administration support interactive configuration for user's authentication and role management.
HTTP访问服务解码该信息,并使用可配置的认证方法验证它。
The HTTP access services decode the information and validate it using a configurable authentication method.
如果应用配置了基本类型的身份认证就会弹出一个登录对话框,收集用户名和密码并进行认证。
If the basic authentication type is configured in the application, a login dialog box is displayed to collect the user name and password for authentication purposes.
如果您不需要认证中心,那么可以跳过这些配置。
If you don't need a Certificate Authority, you can skip this configuration.
然而,我们需要将客户机配置为信任签署服务器的公钥证书的认证中心(CA)。
However, we'll need to configure the client to trust the certificate authority (ca) that signed the server's public key certificate.
验证选择了刚刚上载的公钥的配置加密认证的文件名称。
Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected.
为了让DB 2UDBD PF实例使用基于主机的认证,实例中的每个主机必须正确地配置ssh客户机和ssh服务器。
For your DB2 UDB DPF instance to use host-based authentication, each host in the instance must have the SSH client and SSH server configured properly.
首先,我们假定配置WebSphereCommerce是为了使用数据库认证,那样购物者就会将他们的凭证以及用户概要文件存储在数据库中。
First, we assume that WebSphere Commerce is configured to use database authentication, so that shoppers will have their credentials and user profiles stored in the database.
因此,必须配置平台访问,以同时支持基本的和基于表单的认证,从而同时支持云访问和预置(on - premise)访问场景。
Hence, you must configure your platform access to support both basic and form-based authentication to enable both cloud access and on-premise access scenarios.
ssh客户机现在已经被配置为允许基于主机的认证。
The SSH client has now been configured to allow host-based authentication.
至此,ssh 基于公钥的认证已经完成,现在可以进入“DB2配置”。
At this point, ssh public key-based authentication is now complete, and you can proceed to " DB2 configuration."
RationalClearQuest 7.1会引入对使用多个LDAP配置进行认证支持的环境。
Rational ClearQuest 7.1 introduces support for environments where multiple LDAP configurations can be used for authentication.
在这个配置中,WebSEAL服务器利用它自身的客户端证书将自己标识和认证到Web服务器。
In this configuration, the WebSEAL server identifies and authenticates itself to the Web server using its own client-side certificates.
对于ssh 基于主机的认证,主机必须建立一个信任关系,然后已配置主机上的所有用户ID都将可以凭相同的用户ID在任何其他已配置主机上登录。
With ssh host-based authentication, hosts must establish a trust relationship, and then all user IDs on the configured hosts will be allowed to login as the same user ID on any other configured host.
当配置Shiro时,你必须至少指定一个Realm,用于认证和(或)授权。
When configuring Shiro, you must specify at least one Realm to use for authentication and/or authorization.
WebSphereApplicationServer还提供设置和配置一些ssl特性(例如认证)的功能。
WebSphere Application Server also provides capabilities to setup and configure several SSL features, such as certificates.
配置LotusMobileConnect时,需要设置认证方法,并定义一个或多个HTTP访问服务资源实例。
Configuring Lotus Mobile Connect involves setting up authentication methods and defining one or more instances of the HTTP access service resource.
authenticate:这个方法使用ServletContext上配置的容器登录机制认证用户请求。
Authenticate: This method USES the container login mechanism configured for the ServletContext to authenticate the user making the request.
有一点需要注意,可对WebSEAL服务器进行配置,以便要么支持基本访问认证,要么支持基于表单的认证,但是二者不同时受支持。
One thing to note is that a WebSEAL server can be configured to either support basic access authentication or form-based authentication, but not both.
这里不需要ssh服务器配置,因为在默认情况下,在基于密码的认证之前,ssh将尝试使用基于公钥的认证。
No SSH server configuration is necessary, since, by default, SSH will attempt to use public key-based authentication before password based authentication.
另外,很难确保所有测试团队都使用标准化的、认证的WebSphereApplicationServer配置。
In addition, it was difficult to ensure that all test teams were working with standardized, certified WebSphere Application Server configurations.
本解决方案部署一个WebSEAL实例集群,这些 WebSEAL 实例都配置为同时支持基本认证和基于表单的认证。
This solution deploys a cluster of WebSEAL instances that are configured for both basic authentication and form-based authentication.
配置的最后一部分,包含在清单11 中,这部分指出了所需保护的资源以及所要采用的认证方式。
The final portion of the configuration, included in Listing 11, indicates which resources you would like to secure and what type of authentication you want to use.
ltpa令牌包括一个可配置的到期时间戳。令牌到期后,将发出新的认证询问。
LTPA tokens include a configurable expiration timestamp; after the token expires, a new authentication challenge is issued.
其它的调整配置文件执行象认证这样的步骤。
现在,您已经将ssh配置为使用某种形式的认证,这种认证不提示附加的验证,您可以验证该配置是否成功。
Now that you've configured SSH to use a form of authentication that does not prompt for additional verification, verify that the configuration was successful.
实例Web服务提供者应用程序配置为通过轻量级第三方认证(Lightweight Third Party Authentication,LTPA)令牌使用WS-Security。
The sample Web service provider application is configured to use WS-Security with a lightweight Third Party Authentication (LTPA) token.
SessionFactory隐藏了实现内部的认证细节,因此一旦配置完成,使用同一证书的会话可以很容易的被检索出来。
SessionFactory hides the authentication details inside the implementation so that once configured, sessions with the same credentials can be easily retrieved.
对Derby数据库是可以配置认证的,但是这里还没有为airlinesdb数据库设置认证。
Configuring authentication for Derby databases is available; however, this has not been set up for the airlinesDB database.
对Derby数据库是可以配置认证的,但是这里还没有为airlinesdb数据库设置认证。
Configuring authentication for Derby databases is available; however, this has not been set up for the airlinesDB database.
应用推荐