Authentication methods seek to guarantee the identities of system users.
认证方法试图保证系统用户的身份。
NTLM and CRAM-MD5 authentication methods in the message queuing mode.
消息队列模式中的NTLM和强制的MD5验证方法。
The Netflix authentication methods are based on the OAuth Core 1.0 protocol.
Netflix的认证方式基于OAuthCore 1.0协议。
USAE has unified authentication methods, and realized applications's SSO.
USAE能够实现统一认证和单点登录。
The SOAP 1.1 protocol does not yet define encryption and authentication methods.
SOAP 1.1协议还没有定义加密和认证的方法。
Table 1 provides a side-by-side comparison of the two authentication methods.
表1提供对两种身份验证方法的并排比较。
Linux is able to use different authentication methods for its various services.
Linux可以为不同的服务使用不同的验证方法。
Some new authentication methods are in development, so expect this page to grow.
一些新的验证方法正在开发中,所以,期待这一页得到补充。
These security protocols used different authentication methods and encryption algorithm.
这些安全协议使用不同的认证方法和加密算法。
Uses a generic user-naming syntax so it can interoperate with most authentication methods.
使用通用的用户命名语法,因此它能够与大多数身份验证方法互操作。
Passive authentication methods can be classified into the source detection and tamper detection.
被动认证可分为来源鉴别与内容篡改检测。
This article helps users understand how to set up some authentication methods supported by OpenSSH.
本文帮助用户了解如何设置OpenSSH支持的一些身份验证方法。
A user authentication layer provides authentication for clients as well as several authentication methods.
用户认证层提供客户端身份验证以及多种验证方法。
This function USES authentication methods and algorithms available to all components of Lotus Mobile Connect.
该功能使用LotusMobileConnect所有组件可用的认证方法和算法。
Common authentication methods include password, public key, keyboard-interactive, GSSAPI, SecureID, and PAM.
常见的身份验证方法包括密码、公钥、键盘交互、GSSAPI、SecureID和PAM。
Presenting a strong authentication model for ANs after deeply researching the various authentication methods of ANs.
在深入研究主动网认证方法的基础上,提出并设计了一个主动网络强认证模型。
The article covered configuration to setting up the authentication methods and the new features supported by IBM OpenSSH.
本文讨论了身份验证方法的配置和IBMOpenSSH支持的一些新特性。
The AuthHelper ViewBean generates all the form elements needed to gather credentials for the supported authentication methods.
AuthHelperViewBean生成所有表单组件,用于为受支持的认证方法收集凭证。
The only secure way to identify users across sessions is to use standard authentication methods based on user names and passwords.
跨会话识别用户的惟一一种最安全的方案是使用基于用户名和密码的标准身份认证方法。
Next, we investigated the effect of various server authentication methods on the time required to move binaries in and out of Subversion.
接下来,我们调查不同服务器认证方法对将二进制文件移入和移出Subversion所需时间的影响。
Configuring Lotus Mobile Connect involves setting up authentication methods and defining one or more instances of the HTTP access service resource.
配置LotusMobileConnect时,需要设置认证方法,并定义一个或多个HTTP访问服务资源实例。
The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
Legacy portals had been deployed with custom authorization and authentication methods, each with custom code that needed to be updated and maintained.
遗留门户已经使用自定义授权和身份验证方法部署,每个门户都有需要更新和维护的自定义代码。
You can select or omit specific software, determine the file system layout, choose user ID authentication methods, and even set the root user's password.
可以选择或省略特定的软件、决定文件系统布局、选择用户ID身份验证方法,甚至设置根用户的密码。
The transport layer is comparable to transport layer Security (TLS), and you can employ custom authentication methods to extend the user authentication layer.
传输层可媲美传输层安全(Transport Layer Security,TLS),而且您可以运用定制的身份验证方法来扩展用户认证层。
You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.
您已经了解如何在不能直接采用SSL或通道安全出口之类的强身份验证方法时锁定管理访问权限。
The investigation into authentication methods was carried out by comparing the authentication method against the time taken to move the binaries into Subversion.
对认证方法的调查是使用不同认证方法时比较将二进制文件移入Subversion所需的时间。
Both Oracle and DB2 are secure databases with basic and advanced security features. In Oracle, there are 4 different user authentication methods, as follows.
Oracle和DB 2都是具有基本和高级安全特性的安全数据库。
There are many authentication methods for applications; consequently any application being converted must be analyzed and its methods of authentication understood.
应用程序可以采用多种方法进行身份验证;因此,对于进行转换的任何应用程序,必须进行分析并理解其身份验证方法。
There are many authentication methods for applications; consequently any application being converted must be analyzed and its methods of authentication understood.
应用程序可以采用多种方法进行身份验证;因此,对于进行转换的任何应用程序,必须进行分析并理解其身份验证方法。
应用推荐