End-to-end authentication, confidentiality and Integrity required.
端到端身份验证,需要机密性和完整性。
The ability to do end-to-end authentication and authorization is key to doing real distributed, multi-org composite apps.
有能力完成端到端的认证和授权是进行真正的分布式、跨组织组合应用的关键所在。
In PPP also defines a scalable LCP to allow consultations authentication protocol, thereby conducting transmission network layer protocol before the end-to-end authentication.
在PPP中也定义了一种可扩展的LCP,允许协商认证协议,从而可以在进行网络层协议传输之前对对端进行认证。
When considering end user authentication in an MDM architecture, keep in mind the following.
当在一个MD m架构中考虑终端用户认证时,要记住以下几点。
Authentication specific modules (the back-end).
身份验证特有的模块(后端)。
At one end of the spectrum lies anonymity, or lack of authentication: we don't know who you are and we don't care.
在该范围的最下面是匿名访问,或者没有任何身份验证:我们无法了解您的身份,并且我们对此并不在意。
However, active credentials can submit credentials to back-end applications using standard authentications, such as HTTP form-based authentication or basic authentication.
不过,主动凭证可以使用标准认证(如基于HTTP表单的认证或基本认证)向后端应用程序提交凭证。
The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
Until the connection is re-established, the end users receives error codes indicating that authentication requests failed.
在连接重新建立之前,最终用户会收到表示身份验证请求失败的错误码。
The LDAP authentication provider handles all communication with your back-end LDAP directory.
LDAP身份验证提供者处理所有与后端ldap目录的通信。
The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.
NFSRPC请求可以使用密码认证的能力提供了端到端的NFS安全支持。
When a user requests a protected resource but has not yet authenticated (or their authentication session has expired), the initial request does not reach the back-end servers.
当还没有经过身份验证(或者身份验证会话已经过期)的用户请求受保护的资源时,最初的请求不会到达后端服务器。
To this end, the Samba developers provide authentication keys you can use to validate your download.
为此,Samba开发人员提供认证密钥,您可以用来验证您的下载。
Upon successful authentication of the end user, WebSEAL creates the LTPA Token cookie.
一旦终端用户认证成功,WebSEAL将创建LTPA令牌cookie。
Rather than forcing your end users to create yet another username and password combination that they will surely forget, authentication is delegated to the OpenID provider of their choice.
您的最终用户不需要创建另一个用户名和密码组合(他们肯定会遗忘),身份验证被委托给他们选择的OpenID提供商。
Traditionally, Web sites have maintained their own authentication systems internally—including providing a user registry to store the end user’s digital identity.
过去,Web站点常常在内部维护自己的身份验证系统,包括提供一个用户注册表来存储最终用户的数字身份。
It also provides end-to-end support for common tasks such as data validation, authentication and roles by integrating with Silverlight components on the client and ASP.NET on the mid-tier.
而且通过把客户端的Silverlight组件和中间层的ASP.NET集成起来,提供了对常见任务的端到端支持,如:数据验证、身份验证和角色授权。
As a result, you can achieve end-to-end identity assertion in a trusted environment with or without re-authentication.
由此,您可以在可信的环境中实现端到端的身份断言(identityassertion),不一定需要重新验证。
JXTA also has support in the authentication and authorization areas providing end-to-end application security. The authors also commented on the reliable multicast feature in JGroups framework.
JXTA还支持认证和授权,提供了端到端的安全性。
At end of the paper, the realization of real time encryption and authentication system suitable to wireless monitoring system is introduced according to the character of system and data.
根据无线监控调度系统的系统特点及传输的数据特点,给出了适用于无线监控调度系统的实时加密认证系统的实现。
Authentication is the process of proving an association or identity between an agent (the end-user in our case) and a defined degree of trust.
认证是证明关联或识别的过程,关联和识别发生在代理人(最终用户在我们这里的情况下)和定义信任的程度之间。
For example, when a mobile device client requests access to a back-end application, it sends authentication information to the issuing authority.
例如,当移动设备客户机请求访问后端应用程序时,它向发行认证机构发送认证信息。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
At end of the user registration authentication protocol, a secret data has been established.
在进行用户登记认证的同时,用户与本地的访问网络之间还建立起一个秘密数据。
Secure e-authentication systems must have a legal framework for cross-border recognition and interoperability by the end of 2011.
安全的电子认证系统必须在2011年年底前进行跨边界的承认和互操作性的法律框架。
The TETRA system also supports powerful DMO mode and enables authentication, air interface encryption and end-to-end encryption.
能支持功能强大的移动台脱网直通(DMO)方式,可实现鉴权、空中接口加密和端对端加密;
With this scheme, trustworthy user authentication can be achieved and the end - to - end communications will be kept secure and privacy at the same time.
该方案在提供可靠身份认证的同时,也保证了移动终端间通讯的保密性和安全性。
With this scheme, trustworthy user authentication can be achieved and the end - to - end communications will be kept secure and privacy at the same time.
该方案在提供可靠身份认证的同时,也保证了移动终端间通讯的保密性和安全性。
应用推荐