This paper proposes a hierarchical access authentication mechanism based on MIP-RR.
提出一种基于MIP-RR协议的层次化接入认证机制。
If you are using HTTP connections, then you should use the Digest Access Authentication method.
如果您使用的是HTTP连接,那么你应该使用摘要访问认证方法。
RAM uses both form-based authentication (using a browser) and basic access authentication (using Eclipse).
RAM 同时采用基于表单的认证(使用浏览器)和基本访问认证(使用Eclipse)。
The design of this paper referenced HTTP Digest Access authentication and implemented the authentication of user's identity.
本文的设计中参考了HTTP的摘要认证机制,实现了对用户身份的认证。
The invention also discloses a corresponding method for realizing the network access authentication, the transmission encryption and the UTM.
本发明还公开了相应的实现网络接入认证、传输加密、utm的方法。
One thing to note is that a WebSEAL server can be configured to either support basic access authentication or form-based authentication, but not both.
有一点需要注意,可对WebSEAL服务器进行配置,以便要么支持基本访问认证,要么支持基于表单的认证,但是二者不同时受支持。
One of the strongest encryption algorithms used by remote access authentication products is the widely tested and implemented industry-standard Data Encryption Standard (DES).
经广泛测试、并成为工业界标准的数据加密标准(DES)是远程访问认证产品中最强的加密算法之一。
Compared with access authentication mechanism based on base mobile IP protocol, security and encryption for the mechanism are enhanced, which can resist common security att...
相比基本移动IP协议的接入认证方法,该方法的加密强度和安全性更高,可以更有效地抵御常见的安全攻击。
The implementation of IMS access authentication mechanism, which is considered to be the first step of the whole IMS security plan, is the key to the IMS system security access.
IMS的接入认证机制的实现作为整个IMS安全方案实施的第一步,是保证IMS系统安全的关键。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
Log in to enter credentials for authentication and account access authorization.
登录以输入认证和帐户访问授权的凭证。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
See the Resources section to learn more about code source access control and authentication in JAAS.
请参阅参考资料部分以了解更多关于JAAS中代码源访问控制和认证的信息。
This GET method requires authentication and does not support anonymous access.
该GET方法需要认证,不支持匿名访问。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
Enabling security for user authentication and group permissions for access to requirements and documents
要访问需求和文档,就要为用户的鉴定和组权限激活其安全性
Note: if you need to access resources that require authentication, you can specify a second servlet mapping that is associated with a security constraint.
注意:如果您想访问需要认证的资源,那么您可以指定第二个与安全性限制相关联的servlet映射。
Hence, you must configure your platform access to support both basic and form-based authentication to enable both cloud access and on-premise access scenarios.
因此,必须配置平台访问,以同时支持基本的和基于表单的认证,从而同时支持云访问和预置(on - premise)访问场景。
Of course, this can only be anonymous content; once it's downstream, you won't see the requests anymore and can't perform authentication to prevent access to it.
当然,这只能是匿名内容;一旦它成为下行流之后,您就再也不会看到这些请求,并且再也无法执行身份验证以阻止对它的访问了。
It allows a network access server (NAS) to perform authentication, authorization, and accounting for users.
它允许网络访问服务器(NAS)执行对用户的验证、授权和记帐。
This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.
您已经了解如何在不能直接采用SSL或通道安全出口之类的强身份验证方法时锁定管理访问权限。
They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.
它们有很多相同的概念,要处理的问题域也在很大程度上重叠:验证、授权和访问控制。
The full capabilities of authentication and access control are beyond the scope of this article.
身份验证和访问控制的完整功能超出了本文的范围。
It provides the consistent authentication and authorization services necessary for universal access.
它为通用访问提供了所需的一致的身份验证和授权服务。
The user at home can access his company's Intranet by dial-up authentication.
用户在家里可以通过拨号验证访问他公司的内部网。
These modules provide extra authentication rules to harden access to your machine.
这些模块提供额外的身份验证规则,保护对计算机的访问。
If the time is too far into the past, you can of course fail the access and force a new authentication.
如果时间在很久以前,当然就可以停止访问并强制使用新的身份验证。
With version 3, considered the current version since 2004, the standard was improved with explicit authentication and access control systems.
对于版本3(自从2004年以来的最新版本),该标准已通过显式身份验证和访问控制系统进行了改进。
In multi-layer authentication, the authentication levels denote whether additional authentication is necessary to access a protected object.
在多层身份验证中,身份验证层表示是否需要额外的身份验证才能访问受保护的对象。
应用推荐