• This paper proposes a hierarchical access authentication mechanism based on MIP-RR.

    提出一种基于MIP-RR协议层次化接入认证机制

    youdao

  • If you are using HTTP connections, then you should use the Digest Access Authentication method.

    如果使用HTTP连接那么应该使用摘要访问认证方法

    youdao

  • RAM uses both form-based authentication (using a browser) and basic access authentication (using Eclipse).

    RAM 同时采用基于表单认证使用浏览器基本访问认证(使用Eclipse)。

    youdao

  • The design of this paper referenced HTTP Digest Access authentication and implemented the authentication of user's identity.

    本文设计中参考HTTP摘要认证机制,实现用户身份的认证。

    youdao

  • The invention also discloses a corresponding method for realizing the network access authentication, the transmission encryption and the UTM.

    发明公开相应实现网络接入认证传输加密、utm的方法

    youdao

  • One thing to note is that a WebSEAL server can be configured to either support basic access authentication or form-based authentication, but not both.

    一点需要注意,可WebSEAL服务器进行配置,以便要么支持基本访问认证,要么支持基于表单的认证,但是二者不同时受支持。

    youdao

  • One of the strongest encryption algorithms used by remote access authentication products is the widely tested and implemented industry-standard Data Encryption Standard (DES).

    广泛测试成为工业界标准数据加密标准(DES远程访问认证产品最强加密算法之一。

    youdao

  • Compared with access authentication mechanism based on base mobile IP protocol, security and encryption for the mechanism are enhanced, which can resist common security att...

    相比基本移动IP协议接入认证方法,该方法加密强度安全性更高,可以更有效地抵御常见安全攻击

    youdao

  • The implementation of IMS access authentication mechanism, which is considered to be the first step of the whole IMS security plan, is the key to the IMS system security access.

    IMS接入认证机制实现作为整个IMS安全方案实施的一步保证IMS系统安全的关键

    youdao

  • This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.

    包括识别认证授权访问控制数据屏蔽审计加密

    youdao

  • Log in to enter credentials for authentication and account access authorization.

    登录输入认证帐户访问授权凭证

    youdao

  • Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.

    通过适当认证访问控制确保只有具有适当身份经过授权用户可以访问数据,可以处理大多数数据安全问题

    youdao

  • See the Resources section to learn more about code source access control and authentication in JAAS.

    请参阅参考资料部分了解更多关于JAAS代码访问控制认证的信息。

    youdao

  • This GET method requires authentication and does not support anonymous access.

    GET方法需要认证支持匿名访问

    youdao

  • Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.

    通过增强访问控制身份标识认证提高UDDI数据完整性从而使安全性问题得以解决。

    youdao

  • Enabling security for user authentication and group permissions for access to requirements and documents

    访问需求文档,就要用户鉴定权限激活安全性

    youdao

  • Note: if you need to access resources that require authentication, you can specify a second servlet mapping that is associated with a security constraint.

    注意如果访问需要认证资源,那么您可以指定第二安全性限制关联的servlet映射

    youdao

  • Hence, you must configure your platform access to support both basic and form-based authentication to enable both cloud access and on-premise access scenarios.

    因此必须配置平台访问同时支持基本基于表单认证从而同时支持访问和预置(on - premise)访问场景

    youdao

  • Of course, this can only be anonymous content; once it's downstream, you won't see the requests anymore and can't perform authentication to prevent access to it.

    当然只能匿名内容一旦成为下行流之后,再也不会看到这些请求并且再也无法执行身份验证阻止它的访问了。

    youdao

  • It allows a network access server (NAS) to perform authentication, authorization, and accounting for users.

    允许网络访问服务器(NAS)执行用户验证授权记帐

    youdao

  • This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.

    通常为了进行网络访问授权身份验证内容筛选通过缓存更好地利用网络带宽而进行活动

    youdao

  • You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.

    已经了解如何不能直接采用SSL通道安全出口之类身份验证方法锁定管理访问权限

    youdao

  • They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.

    它们很多相同概念,要处理的问题也在很大程度上重叠:验证授权访问控制。

    youdao

  • The full capabilities of authentication and access control are beyond the scope of this article.

    身份验证访问控制完整功能超出本文范围

    youdao

  • It provides the consistent authentication and authorization services necessary for universal access.

    通用访问提供所需一致身份验证授权服务

    youdao

  • The user at home can access his company's Intranet by dial-up authentication.

    用户家里可以通过拨号验证访问公司内部网

    youdao

  • These modules provide extra authentication rules to harden access to your machine.

    这些模块提供额外的身份验证规则保护计算机访问

    youdao

  • If the time is too far into the past, you can of course fail the access and force a new authentication.

    如果时间很久以前当然可以停止访问强制使用新的身份验证。

    youdao

  • With version 3, considered the current version since 2004, the standard was improved with explicit authentication and access control systems.

    对于版本3(自从2004年以来最新版本),标准通过显式身份验证访问控制系统进行了改进

    youdao

  • In multi-layer authentication, the authentication levels denote whether additional authentication is necessary to access a protected object.

    多层身份验证中,身份验证表示是否需要额外的身份验证才能访问保护的对象。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定