• To create a properties file realm.

    创建属性文件,需要完成以下工作。

    youdao

  • To create a Properties File realm from the admin console.

    管理控制台创建属性文件,请执行以下操作。

    youdao

  • Properties file realm: Credentials stored in properties files on disk.

    属性文件存储磁盘上属性文件中的凭据

    youdao

  • You have successfully created a properties file realm called SampleSecurityRealm.

    已经成功地创建了一个名为 SampleSecurityRealm 的属性文件域。

    youdao

  • Certificate properties file realm: Uses digital certificates and properties files on disk.

    证书属性文件使用磁盘数字证书属性文件

    youdao

  • A security realm based on PropertiesFileLoginModule is generally referred to as a properties file realm.

    我们通常基于PropertiesFileLoginModule安全领域称为属性文件

    youdao

  • You also created a properties file realm and configured a Web application's security using that realm.

    创建了属性文件使用配置了Web应用程序安全性

    youdao

  • Let us look at an example creating a Properties File realm using the admin console and see how it works.

    我们一个使用管理控制台创建属性文件示例了解如何工作的。

    youdao

  • For example, access to the Community Edition admin console is secured by means of a properties file realm named geronimo-admin.

    例如名为geronimo -admin属性文件可以确保CommunityEdition管理控制台安全访问

    youdao

  • The default realm is a property file realm, as well as a realm for Derby, but you can configure the LDAP as a security realm.

    缺省属性文件域,也是一个用于Derby 的域,可以LDAP配置安全域。

    youdao

  • This is a more robust security realm than the properties file realm, but for this you need to create tables and enter data in the database.

    一种属性文件更加可靠的安全领域但是为了实现域,需要创建相应的数据库输入数据

    youdao

  • The previous section discussed the prerequisites and explained how to create the necessary artifacts for a properties file realm, a database realm, and an LDAP realm.

    前面部分讨论一些先决条件说明了如何属性文件数据库域、ldap创建所需构件

    youdao

  • At this point, you have created a properties file realm, configured a Web application to authenticate against this security realm, and verified the authorization for resources in the application.

    此时已经创建了一个属性文件,并将Web应用程序配置根据这个安全领域进行身份验证验证了该应用程序中资源的授权

    youdao

  • The auditing feature enables you to configure a security realm that logs all login attempts to a file.

    审核特性允许配置安全领域以便所有登录尝试记录一个文件中。

    youdao

  • When the problem exceeds the file system realm, it often goes to the volume group level.

    问题若超出文件系统范畴时通常转向级别

    youdao

  • This file contains the REALM definition and various configuration options for the KDC.

    文件包含REALM定义KDC各种配置选项

    youdao

  • This configuration file is comprised of sections for specifying logging options, admin server and KDC server instance information for a particular realm, and values of options for Kerberos, etc.

    这个配置文件多个部分组成,分别用来指定登录选项某个特定领域管理服务器KDC服务器的实例信息以及Kerberos各选项的等。

    youdao

  • The access control list file below allows all principals with admin instance for our realm VMKRB5 all accesses.

    下面所示的访问控制列表文件允许具有admin实例所有主体领域VMKRB5进行全面访问。

    youdao

  • If you look into the default j2ee-tomcat-server.xml configuration file, you'll see that a tomcat JAAS realm has been configured at the engine level, as shown in Listing 3.

    如果仔细观察默认的j2ee -tomcat - server . xml配置文件看到tomcatJAAS领域引擎级别进行了配置清单3中所

    youdao

  • The server.xml file also sets up this realm.

    xml文件设置领域

    youdao

  • With the example of the ldif file, which was imported above into the LDAP server, you need to enter the following value, [o=ibm,c=us], into the names of sub entries in the realm, as shown in Figure 6.

    对于上面导入LDAP服务器ldif文件示例需要输入以下,[o=ibm,c=us],作为领域中的条目,如图 6 所示。

    youdao

  • Update this file with the Kerberos realm and LDAP suffix information.

    使用kerberosLDAP后缀信息更新这个文件

    youdao

  • This file has been modified for the enterprise integration, including a data source realm.

    已经修改文件,以便进行企业集成它包括一个数据源域。

    youdao

  • The already configured base entries in the realm are shown; in this case, you will see the base entries corresponding to the file-based and database repositories (Figure 17).

    这时将显示域中已经配置基本情况下看到与基于文件的存储数据库存储库对应的基本项(17)。

    youdao

  • The file my-realm.xml defines three GBeans that coordinate authentication type, login usage, and the security realm users log in to.

    文件my - realm . xml定义了三个GBeans用来协调身份验证类型登录用法以及用户登录安全领域

    youdao

  • In Listing 1, the pluto-properties-file-realm security realm is configured to enforce application-specific authentication policy, which ACTS as an entry point into login domains.

    清单1中,pluto - properties - file -realm安全领域配置强制执行特定于应用程序验证策略用作登录域的入口

    youdao

  • The [realm] stanza of the /etc/krb5/krb5.conf file contains the information that the NAS client uses when looking for the IBM NAS servers.

    etc/krb5/krb5.conf 文件 [realm]包含NAS客户端查找IBM NAS 服务器时所使用信息

    youdao

  • The SQL to create these tables, provided in db-realm-tables.sql file in the included download file, is shown in Listing 9.

    本文所提供下载文件中的db - realm -tables .sql文件提供了创建这些表的sql语句,如清单9所

    youdao

  • Then the name of the realm that you're going to use is identified in the <security-realm-name> tag, which you already defined in the my-realm.xml file, and the mappings are defined in the tag.

    然后 realm-name>标记中确定使用领域名称(这个领域名是您在my-realm.xml文件已经定义的),在 标记中定义映射

    youdao

  • File-realm-demo: Demonstrates how to setup security restrictions using a flat file of users and groups.

    file - realm - demo展示如何使用用户平面文件设置安全约束

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定