表1提供对两种身份验证方法的并排比较。
Table 1 provides a side-by-side comparison of the two authentication methods.
身份验证方法确定了如何登录Gerrit。
前一节介绍的身份验证方法是用户级安全措施。
The authentication described in the previous section is user-level security.
对于本文中所使用的身份验证方法来说,这是必需的。
This is necessary for the authentication approach used in this article.
lsauthent命令列出系统上配置的身份验证方法。
The lsauthent command lists the authentication method that was configured on the system.
这些协议都已经经过加密,使用的是操作系统身份验证方法。
Both of these protocols are encrypted and use the operating systems method of authentication.
DB 2客户机与服务器通信,协商采用何种身份验证方法。
The DB2 client communicates with the server and negotiates which authentication method to use.
为简单起见,我们假设客户机使用服务器返回的身份验证方法。
For simplicity, let's assume the client USES the authentication method returned by the server.
使用chauthent命令在AIX系统上启用身份验证方法。
Enable the authentication method on AIX systems using the chauthent command.
这里使用的身份验证方法是LDAP_AUTH_SIMPLE。
本文帮助用户了解如何设置OpenSSH支持的一些身份验证方法。
This article helps users understand how to set up some authentication methods supported by OpenSSH.
使用通用的用户命名语法,因此它能够与大多数身份验证方法互操作。
Uses a generic user-naming syntax so it can interoperate with most authentication methods.
身份验证方法是在使用CREATEUSER命令创建用户时指定的。
The authentication method is specified when creating the user using the CREATE user command.
存储的密码只能访问使用一个主密码或其他身份验证方法由用户定义。
The stored passwords can only be accessed by the use of a master password or other authentication method defined by the user.
chauthent命令根据用户设置的标志设置所需的身份验证方法。
The chauthent command sets the desired authentication method based on the flags the user sets.
对于所有用户和所有应用程序,SSO使用相同的身份验证方法证实其身份。
SSO uses the same authentication method for all users and all applications to prove their identity.
本文讨论了身份验证方法的配置和IBMOpenSSH支持的一些新特性。
The article covered configuration to setting up the authentication methods and the new features supported by IBM OpenSSH.
有时候,系统管理员希望实施不同的安全策略,这时就可能需要修改或替换身份验证方法。
At times, the authentication methodologies may need modification or replacement when system administrators want to enforce different security policies.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
身份验证提供者必须支持至少一种身份验证方法,很可能支持多种方法,还可以支持单点登录。
An authentication provider has to support at least one method of authentication, possibly multiple and it can support single sign-on support as well.
遗留门户已经使用自定义授权和身份验证方法部署,每个门户都有需要更新和维护的自定义代码。
Legacy portals had been deployed with custom authorization and authentication methods, each with custom code that needed to be updated and maintained.
您已经了解如何在不能直接采用SSL或通道安全出口之类的强身份验证方法时锁定管理访问权限。
You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.
常见的身份验证方法包括密码、公钥、键盘交互、GSSAPI、SecureID和PAM。
Common authentication methods include password, public key, keyboard-interactive, GSSAPI, SecureID, and PAM.
可以选择或省略特定的软件、决定文件系统布局、选择用户ID身份验证方法,甚至设置根用户的密码。
You can select or omit specific software, determine the file system layout, choose user ID authentication methods, and even set the root user's password.
而必须像在部署期间一样,在应用程序中执行每个资源引用的身份验证信息(此时身份验证方法并不重要)。
Instead, you must specify, likely during the deployment process, the authentication information for each resource reference in the application (in this case the authentication method does not matter).
在DB 2 UDB中,LDAP目前不是受支持的身份验证方法。但是,可以用一个安全性插件来实现它。
LDAP is not currently supported as an authentication method in DB2; however, you can always implement it using a security plug-in.
如果在实例级选择 DATA_ENCRYPT身份验证方法,那么可以对客户机和服务器之间的网络通信进行加密。
The network communication between client and server can be encrypted if you choose DATA_ENCRYPT method of authentication at the instance level.
如果把pam_deny . so替换为pam_unix . so,就应用标准的身份验证方法(输入用户名和密码)。
With pam_unix.so, the standard authentication method (enter a user name and password) will be applied.
应用程序可以采用多种方法进行身份验证;因此,对于进行转换的任何应用程序,必须进行分析并理解其身份验证方法。
There are many authentication methods for applications; consequently any application being converted must be analyzed and its methods of authentication understood.
应用程序可以采用多种方法进行身份验证;因此,对于进行转换的任何应用程序,必须进行分析并理解其身份验证方法。
There are many authentication methods for applications; consequently any application being converted must be analyzed and its methods of authentication understood.
应用推荐