用户可以通过Web服务器进行身份验证的方法的数量对安全性有直接的影响。
The number of ways that a user can authenticate against the Web server has a direct impact on security.
如果把pam_deny . so替换为pam_unix . so,就应用标准的身份验证方法(输入用户名和密码)。
With pam_unix.so, the standard authentication method (enter a user name and password) will be applied.
最后是强身份验证,其中使用两种或者更多的方法对一个标识进行验证,如密码和加密密钥。
Finally, there is strong authentication in which an identity is verified using two or more methods, such as a password and a cryptographic key.
由于没有为任何EJB方法配置安全性,因此所有方法都可访问,并作为未经身份验证的用户被调用。
Since no security is configured for any of the EJB methods, all the methods are accessible and are invoked as an Unauthenticated user.
要执行类似的攻击以绕过身份验证,您可能会使用类似清单5的方法。
And to do the same sort of attack to bypass authentication, you might do something like Listing 5.
您已经了解如何在不能直接采用SSL或通道安全出口之类的强身份验证方法时锁定管理访问权限。
You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.
为简单起见,我们假设客户机使用服务器返回的身份验证方法。
For simplicity, let's assume the client USES the authentication method returned by the server.
可以选择或省略特定的软件、决定文件系统布局、选择用户ID身份验证方法,甚至设置根用户的密码。
You can select or omit specific software, determine the file system layout, choose user ID authentication methods, and even set the root user's password.
对于所有用户和所有应用程序,SSO使用相同的身份验证方法证实其身份。
SSO uses the same authentication method for all users and all applications to prove their identity.
还可以提供用户ID和密码信息,用于数据库身份验证,可以选择密码的加密方法。
You can also provide user id and password information for database authentication, and you can select the encryption method for the password.
这些协议都已经经过加密,使用的是操作系统身份验证方法。
Both of these protocols are encrypted and use the operating systems method of authentication.
对于本文中所使用的身份验证方法来说,这是必需的。
This is necessary for the authentication approach used in this article.
查看对CM系统进行身份验证的不同方法以及各种级别的授权。
Take a look at various ways of authenticating to a CM system and various levels of authorization.
身份验证方法是在使用CREATEUSER命令创建用户时指定的。
The authentication method is specified when creating the user using the CREATE user command.
使用窗体身份验证时,这种方法存在一定的缺陷。
The downside to this approach arises when using forms authentication.
声明方法提供易用性,编程方法为资源的身份验证和授权提供更好的安全控制级别。
The declarative method offers ease of use, while the programmatic method provides finer levels of security control with respect to resource authentication and authorization.
前一节介绍的身份验证方法是用户级安全措施。
The authentication described in the previous section is user-level security.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
EJB 的身份验证和授权配置方法为:在部署描述符中定义安全角色,每个方法将依据部署描述符执行。
You configure EJB authentication and authorization by defining security roles in the deployment descriptor under which each method executes.
较好的方法是将身份验证信息重构到外部属性文件中。
Better to refactor the authentication information into an external properties file.
有多种身份验证机制和集成方法,因此必须具备一种灵活的机制来识别用户。
There are many authentication mechanisms and methods of integration with them, so a flexible mechanism for allowing a user to be identified is essential.
表1提供对两种身份验证方法的并排比较。
Table 1 provides a side-by-side comparison of the two authentication methods.
本节尝试为在为TM1 9.5设置LDAP身份验证时最常出现的问题提供解决方法。
This section tries to provide answers to the most common issues observed when setting up LDAP authentication for TM1 9.5.
在UNIX系统中,有多种身份验证方法,比如基于密码的身份验证、使用智能卡的身份验证、基于生物检测技术的身份验证等等。
There are various authentication methods in UNIX systems, like password-based authentication, authentication using smart CARDS, authentication based on biometric technology, and more being practiced.
而必须像在部署期间一样,在应用程序中执行每个资源引用的身份验证信息(此时身份验证方法并不重要)。
Instead, you must specify, likely during the deployment process, the authentication information for each resource reference in the application (in this case the authentication method does not matter).
双因素身份验证是增强安全性的流行方法。
Two-factor authentication is a popular method being practiced for increased security.
应用程序可以采用多种方法进行身份验证;因此,对于进行转换的任何应用程序,必须进行分析并理解其身份验证方法。
There are many authentication methods for applications; consequently any application being converted must be analyzed and its methods of authentication understood.
在DB 2 UDB中,LDAP目前不是受支持的身份验证方法。但是,可以用一个安全性插件来实现它。
LDAP is not currently supported as an authentication method in DB2; however, you can always implement it using a security plug-in.
本文帮助用户了解如何设置OpenSSH支持的一些身份验证方法。
This article helps users understand how to set up some authentication methods supported by OpenSSH.
WebSphereApplicationServer通过表单登录身份验证方法使应用程序出现位置特定的登录表单。
WebSphere application Server lets applications present site-specific login forms by using of the form-login authentication method.
应用推荐