Record down the authentication key.
记录下来,验证的关键。
The second is to require a valid authentication key.
第二个方法要求使用一个有效的认证密钥。
The authentication key is set as a class variable in your controller.
认证密钥在控制器中被设为类变量。
Using the core Security class, an authentication key is generated and written to the session.
通过使用核心Security类,生成认证密钥并将其写入会话。
When the form is posted, the value of this field is compared to the value of the authentication key in session, to verify that the form submission was valid.
当表单被提交时,系统将把此字段的值与会话中的认证密钥值相比较,以检验表单提交是否有效。
A good example of this would be a user using the application, taking a lunch break, and returning to the application after the authentication key had expired.
这方面的一个很好的例子是用户正在运行应用程序,午饭过后,当他返回到应用程序时,认证密钥已经过期了。
Aiming at the demand of contactless smart card, this paper proposes a new mutual authentication key exchange protocol based on low power computing devices.
针对非接触式智能卡的需求,提出一种基于有限计算能力的相互认证密钥交换协议。
To establish an Account, you will be required to provide Blizzard with certain personal information and the Authentication Key provided to you by Blizzard.
为了建立一个帐户,你将会要由大风雪对你用特定的个人数据和证明钥匙提供大风雪提供。
Instead, the site requires a nickname and authentication remote key.
相反,站点需要一个昵称和远程认证密钥。
Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
Double key secure authentication is one of the protection methods used to verify access across different systems.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
This specifies the use of the RSA Key Exchange and authentication algorithm, along with the RC4_SHA_US CipherSpec.
它规定了RSA密钥交换和认证算法的使用,还规定了RC4_SHA_US密码规范。
The ability to do end-to-end authentication and authorization is key to doing real distributed, multi-org composite apps.
有能力完成端到端的认证和授权是进行真正的分布式、跨组织组合应用的关键所在。
The SSH daemon does not allow key-based authentication if the home directory if people other than the user can write to it.
如果除应用程序用户以外还有人能够修改home目录,那么SSH守护进程就不支持基于密钥的认证。
The OpenSSH client user ram is all set for Public Key authentication to user laxman on the OpenSSH server with EFS login. Verify the same with ssh login from client
现在准备使用EFS登录由OpenSSH服务器上的用户laxman 对 OpenSSH客户机用户ram 进行公钥认证。
The key exchange and authentication algorithm used during the SSL handshake.
SSL握手过程中的密钥交换和认证算法。
These runtime environments should be configured to use global security, and they should be configured to use LTPA authentication with the same LTPA key.
这些运行时环境应该配置为使用全局安全性,而且应该配置为通过相同LTPA密钥进行LTPA身份验证。
The client decrypts the message from the authentication service using client secret key.
客户端使用它的秘密密钥解密来自身份验证服务的消息。
This password check is done even if the user is following the public key or host-based authentication.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
When configured with public key authentication, your key proves your identity to remote SSH hosts.
当配置为公钥身份验证时,您的密钥证明您在远程ssh主机上的身份。
The transport layer is responsible for key exchange and server authentication.
传输层负责密钥交换和服务器身份验证。
TGT carries session key for use between the client and authentication service.
TGT包含供在客户端与身份验证服务之间使用的会话密钥。
The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
The entire TGT is encrypted with the secret key of authentication service.
整个TGT 使用身份验证服务的秘密密钥加密。
Private-public key pair authentication requires both client and server configuration.
公私密钥对身份验证同时需要客户端和服务器配置。
Unless your API is a free, read-only public API, don't use single key-based authentication.
除非你的API是一个免费的,只读的公开api,否则不要使用单一的基于密钥的验证。
Information security in general and authentication in particular are key aspects for any IT-based solution.
信息(尤其是身份验证信息)的安全性是任何基于IT的解决方案的关键方面。
SPKM provides authentication, key establishment, data integrity, and data confidentiality in an online distributed application environment using a public key infrastructure.
SPKM使用公钥基础设施在一个联机分布式应用程序环境下提供身份验证、密钥设立、数据完整性和数据机密性。
It then describes how you can achieve authentication based on public key technology, using the new GSS-API security mechanisms with the customizable DB2 UDB security plug-ins.
然后还将描述:如何通过使用新的具有可定制的DB 2UDB安全插件的GSS - API安全机制来实现基于公钥技术的身份验证。
Key authentication is tried for each private key type found locally.
对于在本地找到的每个私有密钥类型,尝试执行密钥身份验证。
应用推荐