The ultimate goal is to accelerate the adoption of claims based identity.
最终目标就是为了加快声明式身份认证的使用。
An SSH-based identity consists of two parts: a public key and a private key.
一个基于ssh的身份包括两个部分:一个公钥和一个私钥。
Claims-based identity simplifies application development because applications using this type of authentication do not have to verify all the credentials presented by the user. Instead.
基于声明的身份识别简化了应用程序开发,因此使用该类型验证的应用程序无须核实该用户递交的所有凭据。
The IBE-based identity authentication scheme, which is without the need for issuing digital certificates to bind user identity and public key, can improve the certification efficiency.
基于IBE的身份认证方案无需通过颁发数字证书来绑定用户身份和公钥,可以提高认证效率。
Today, numbers are on the wane thanks to the ease with which mobiles can store and retrieve names and the ubiquity of email addresses and other internet-based identity tags, such as Skype names.
现在,由于移动设备存取名字十分方便、再加上无处不在的电子邮件地址及其它源自互联网的身份标识,数字在生活中正变得越来越少见。
For women in the military, the search for equality will still be based on functional equivalence, not identity or even similarity of task.
对于军队中的女性来说,寻求平等仍然是基于功能对等,而不是身份甚至任务上的相似性。
That might mean either developing a uniform way to mark videos and images, showing when and who they were made by, or abandoning phone calls altogether and moving towards data-based communications—using apps like FaceTime or WhatsApp, which can be tied to your identity.
这可能意味着,要么开发一种统一的方式来标记视频和图像,显示视频和图像是何时并由谁制作的,要么完全放弃电话,转向基于数据的通信——使用 FaceTime 或 WhatsApp 等应用,这些应用可以与你的身份挂钩。
They are value objects, in that their equality is based on the value of their content, not on their identity.
由于它们的等同性是基于它们内容的值的,而不是基于它们的身份的,所以它们是值对象。
DAC mechanisms determine what a program can do based only on the identity of the user running the program and ownership of objects like files.
dac机制只是根据运行程序的用户的身份和文件等对象的所有者来决定程序可以做什么。
A simple enrollment system is provided based on the WSTK Identity service.
简单的登记系统在WSTK“标识”服务的基础上被提供。
Self-branding is a strong personal identity based on a clear perception about what you stand for, what sets you apart from others and the added value you bring to a job or situation.
个人品牌是关于个人身份地位的有力证明。 它主要来自于你所从事的领域、使你与众不同的特点和你能为某件事(译者注:当然应该还有别人)带来的附加价值。
Role based security is described as user-level security which focuses on the logical role of a user rather than the user's individual identity.
基于角色的安全性是一种用户级安全性,主要关注用户的逻辑角色而不是个人身份。
The country's social divisions, however, are much more complicated than statistics suggest, involving lots of fine-grained, identity-based prejudices.
但是这个国家的社会分化远比数据表现出来的复杂,其中包含了很多微妙的、关于身份的偏见。
After being held for three weeks, it turned out that the American extradition request was based on a fraudster who had stolen Mr Bond's identity.
关押了三周后,最后证明美国所要引渡的其实是偷了邦德先生身份证明的一个骗子。
And the fact that all of our visas are fingerprint, bio-metric fingerprints based on ensuring that that person's identity is proven is a very important factor in this," he said.
我们的签证上有用生物计量学检测的指纹,这是证明一个人身份的非常重要的数据。
Geneva aims to take all the identity management effort off the applications with a claims based access platform. According to Microsoft, Geneva is useful.
Geneva的目标是采用一个基于声明的访问平台接管应用程序的身份管理。
Web Identity provides the LDAP-based directory services to enable application administrators to assign users to roles, which applications use to manage user authorizations.
WebIdentity提供了基于LDAP的目录服务来支持应用程序管理员将用户分配到角色,以供应用程序用于管理用户授权。
The sending server only sends the user identity (X.509 certificate, principal name, or distinguished name (DN) based on the credentials used for the initial login) to the target server.
发送服务器仅将用户标识(X.509证书、主体名、或基于初始登录所使用的凭据的专用名称 (DN))发送到目标服务器。
The portal-based interface provides a personalized experience, which considers the user's identity, role, and personal preferences.
基于门户的界面提供了个性化体验,它考虑到用户的身份、角色和个人偏好。
That is, the messaging engine authorizes access to the queue based on the connection identity as we discussed earlier.
即,消息传递引擎将根据我们前面讨论的连接标识对此队列进行访问授权。
What you need is a utility method to simplify identity-based searches.
您所需要的是使用一种实用方法简化基于标识的搜索。
If all the validations are passed, a JAAS-based security context is created, including the identity of the user in a JAAS subject.
如果通过了所有的验证过程,那么将创建基于JAAS的安全上下文,包括JAAS主题中用户的标识。
A digital signature is a math-based method of attaching a "personal" identity to a message.
数字签名是一种向消息附加“个人”身份的数学方法。
Security is controlled based on the user's identity.
基于用户身份来控制安全性。
We regularly encrypt electronic communication today because of the proliferation of identity theft and other information-based crimes.
由于盗窃个人身份和其它以信息为基础的犯罪行为的泛滥,我们通常把为电子信息交流加密。
AIX provides foreign identity mapping using EIM, which is an LDAP-based technology to manage multiple user registries in an organization.
AIX使用EIM提供外部身份映射。EIM是一种基于LDAP的技术,用来管理组织中的多个用户注册表。
Identity provider or IdP based on a request of some sort from a relying party A.K.A. Service provider or SP, and they contain statements that service providers use to make access control decisions.
断言通常通过基于某种依赖方(也称为服务提供商或SP)请求的断言方(也称为身份提供商或IdP)创建,它们包含服务提供者用于访问控制决策的语句。
One of the key advantages of DSig-based protocols is the ability to both assert identity and create a tamper-proof envelope of the content of the message which are often both required together.
基于DSig的协议有个很主要的优势——断定身份的同时还能创建消息内容的防篡改信封,这两个功能通常都要求同时出现。
The IBM Tivoli Directory Server provides an LDAP-based high-performance infrastructure for identity management that is scalable, reliable, and standards-based.
IBMTivoliDirectoryServer提供一个基于LDAP的高性能的身份管理基础结构,它是可伸缩、可靠且基于标准的。
IIPx is based on the foundation laid by the earlier deployed IIP solution that provides employee identity management for internal applications.
IIPx基于早期部署的用于提供内部应用程序的员工标识管理的IIP解决方案的基础。
应用推荐