• 1提供两种身份验证方法并排比较

    Table 1 provides a side-by-side comparison of the two authentication methods.

    youdao

  • 身份验证方法确定了如何登录Gerrit

    Authentication method is how you log into Gerrit.

    youdao

  • 前一介绍身份验证方法用户安全措施。

    The authentication described in the previous section is user-level security.

    youdao

  • 对于本文所使用身份验证方法来说,必需的。

    This is necessary for the authentication approach used in this article.

    youdao

  • lsauthent命令列出系统配置身份验证方法

    The lsauthent command lists the authentication method that was configured on the system.

    youdao

  • 这些协议都已经经过加密使用的是操作系统身份验证方法

    Both of these protocols are encrypted and use the operating systems method of authentication.

    youdao

  • DB 2客户机服务器通信协商采用何种身份验证方法

    The DB2 client communicates with the server and negotiates which authentication method to use.

    youdao

  • 简单起见我们假设客户机使用服务器返回身份验证方法

    For simplicity, let's assume the client USES the authentication method returned by the server.

    youdao

  • 使用chauthent命令AIX系统启用身份验证方法

    Enable the authentication method on AIX systems using the chauthent command.

    youdao

  • 这里使用的身份验证方法LDAP_AUTH_SIMPLE。

    The authentication method used is LDAP_AUTH_SIMPLE.

    youdao

  • 本文帮助用户了解如何设置OpenSSH支持一些身份验证方法

    This article helps users understand how to set up some authentication methods supported by OpenSSH.

    youdao

  • 使用通用用户命名语法因此能够大多数身份验证方法互操作

    Uses a generic user-naming syntax so it can interoperate with most authentication methods.

    youdao

  • 身份验证方法使用CREATEUSER命令创建用户指定的。

    The authentication method is specified when creating the user using the CREATE user command.

    youdao

  • 存储密码只能访问使用一个密码其他身份验证方法用户定义

    The stored passwords can only be accessed by the use of a master password or other authentication method defined by the user.

    youdao

  • chauthent命令根据用户设置标志设置所需身份验证方法

    The chauthent command sets the desired authentication method based on the flags the user sets.

    youdao

  • 对于所有用户所有应用程序SSO使用相同身份验证方法证实身份

    SSO uses the same authentication method for all users and all applications to prove their identity.

    youdao

  • 本文讨论了身份验证方法配置IBMOpenSSH支持的一些特性

    The article covered configuration to setting up the authentication methods and the new features supported by IBM OpenSSH.

    youdao

  • 有时候系统管理员希望实施不同安全策略这时就可能需要修改替换身份验证方法

    At times, the authentication methodologies may need modification or replacement when system administrators want to enforce different security policies.

    youdao

  • 可信主机身份验证公私ssh密钥身份验证方法类似的很大程度上实现相同结果

    The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.

    youdao

  • 身份验证提供者必须支持至少一种身份验证方法很可能支持多种方法可以支持点登录

    An authentication provider has to support at least one method of authentication, possibly multiple and it can support single sign-on support as well.

    youdao

  • 遗留门户已经使用定义授权身份验证方法部署每个门户都需要更新和维护的自定义代码。

    Legacy portals had been deployed with custom authorization and authentication methods, each with custom code that needed to be updated and maintained.

    youdao

  • 已经了解如何不能直接采用SSL通道安全出口之类身份验证方法锁定管理访问权限

    You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.

    youdao

  • 常见身份验证方法包括密码、公钥、键盘交互、GSSAPISecureIDPAM

    Common authentication methods include password, public key, keyboard-interactive, GSSAPI, SecureID, and PAM.

    youdao

  • 可以选择省略特定软件决定文件系统布局选择用户ID身份验证方法甚至设置用户密码

    You can select or omit specific software, determine the file system layout, choose user ID authentication methods, and even set the root user's password.

    youdao

  • 必须像在部署期间一样,应用程序中执行每个资源引用身份验证信息(此时身份验证方法并不重要)。

    Instead, you must specify, likely during the deployment process, the authentication information for each resource reference in the application (in this case the authentication method does not matter).

    youdao

  • DB 2 UDB中LDAP目前不是受支持身份验证方法但是可以一个安全性插件来实现

    LDAP is not currently supported as an authentication method in DB2; however, you can always implement it using a security plug-in.

    youdao

  • 如果实例选择 DATA_ENCRYPT身份验证方法,那么可以客户机服务器之间网络通信进行加密

    The network communication between client and server can be encrypted if you choose DATA_ENCRYPT method of authentication at the instance level.

    youdao

  • 如果把pam_deny . so替换为pam_unix . so,就应用标准身份验证方法(输入用户密码)。

    With pam_unix.so, the standard authentication method (enter a user name and password) will be applied.

    youdao

  • 应用程序可以采用多种方法进行身份验证因此对于进行转换任何应用程序,必须进行分析并理解身份验证方法

    There are many authentication methods for applications; consequently any application being converted must be analyzed and its methods of authentication understood.

    youdao

  • 应用程序可以采用多种方法进行身份验证因此对于进行转换任何应用程序,必须进行分析并理解身份验证方法

    There are many authentication methods for applications; consequently any application being converted must be analyzed and its methods of authentication understood.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定