Directory Server stores user profiles and provides a trusted identity data infrastructure for authentication.
DirectoryServer存储用户概要文件并提供一个可信的身份数据基础架构来实现身份验证。
Obviously, if any file has any identity data in it, secure it with user read-write only mode (mode 600) or user read-only mode (mode 400) to prevent you from accidentally overwriting or removing it.
显然,如果文件中包含任何标识数据,那么请确保它仅具有用户读写模式(模式600)或用户只读模式(模式400),以防止意外地覆盖或删除该文件。
Data and identity theft becomes more and more common.
数据和身份盗窃变得越来越普遍。
That might mean either developing a uniform way to mark videos and images, showing when and who they were made by, or abandoning phone calls altogether and moving towards data-based communications—using apps like FaceTime or WhatsApp, which can be tied to your identity.
这可能意味着,要么开发一种统一的方式来标记视频和图像,显示视频和图像是何时并由谁制作的,要么完全放弃电话,转向基于数据的通信——使用 FaceTime 或 WhatsApp 等应用,这些应用可以与你的身份挂钩。
In order to protect applications from this kind of attack or ambiguity, application designers or developers should add the identity of the intended recipient to application data to be signed.
为了让应用能避免此类攻击或模糊点,应用的设计者或开发者们应该在待签名的应用数据中加入目标接收方的身份。
Identity theft and data breaches are some of the fastest-growing crimes in United States.
身份失窃和数据泄露是美国增长最快的犯罪类型之一。
What's wanted is, in a sense, the exact opposite of a list: a data structure where order is irrelevant, and identity is explicit.
从某种意义上说,您所想要的和列表上给出的是完全相反的:一个顺序不相关,但身份明确的数据结构。
As described above, it is important for security against repudiation to add both a nonce and the identity of the intended recipient to application data to be signed.
正如上面所描述的那样,对于针对抵赖的安全性来说,在待签名的应用数据中同时加入现时标志和目标接收方的身份是非常重要的。
This enables him to encrypt data he sends over the network and protect the identity of his own Internet protocol (IP) address.
这使他能够为他通过网络发送的数据加密,并保护他自己的IP地址身份。
Tossing a drive away is not the safest option, since recovery of the data may be within the means of identity thieves or such like.
随意扔掉这个硬盘并不是最安全的选择,因为硬盘里的数据可以被身份盗贼或类似的人通过某种方式恢复过来。
In the customer case, for instance, this data contains relatively static attributes of customers, such as attributes on the identity, detailed profile, and relationships among customers.
例如,对于客户,主数据包括客户的静态属性(比如身份属性)、详细的个人信息以及客户之间的关系。
Everyone from grandmothers to Fortune 500 companies has heard the stories of identity theft, data loss, and general mayhem caused by viruses and attackers on the Internet.
每个人,从老祖母到全球 500强公司都听说过由互联网上的病毒和攻击者所引起的盗窃身份、丢失数据,及一般性的伤害的事。
In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.
在当前以网络为中心的业务模型中,验证个人身份、控制访问和维护数据的完整性与保密性变得越来越难。
The Service Consumer can either obtain them directly from an Identity Provider, or it can obtain the data in a different form and convert it to a SAML representation.
服务消费者可以从身份提供者那里直接获取SAML断言,也可以获取其他格式的身份数据并把数据转换为SAML断言。
Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
With SAML, any point in the network can assert that it knows the identity of a user or piece of data.
利用SAML,网络中的任何点都可以断言它知道用户或数据块的身份。
In addition to the many identification options presented by keystroke dynamics discussed in my three earlier articles, mouse usage provides additional data to help determine identity.
除了在我的前三篇文章中讨论的击键力学所提供的许多识别方法之外,鼠标使用情况将提供更多数据来帮助确定用户身份。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
This is usually carried out by a third party, who puts the data in order and then discloses it in a way that does not reveal the identity of any individual data provider.
这通常由第三方执行,第三方将资料整理有序然后以不泄露任何资料提供商个人身份的方式发表。
There is single sign-on, which allows you to retrieve a user's identity, avatar, and other profile data.
将会有单点登录,你可以获取其他用户的身份,头像和其他个人信息。
There are standard data models for user identity formats and layering an organizational database on a structured identity repository like LDAP, can help organizations streamline their provisioning.
用户身份格式有一些标准的模型,它们按层次存在于一个有组织的数据库中,这个数据库位于结构化身份知识库中,如LDAP,它可以帮助组织合理化用户提取。
Identity default for automatic sequence Numbers for data.
为数据的自动序列号指定默认值。
Acme's lead data and application architects want to use the DB2 Identity Value Generation function to remove that burden from the business logic of their various applications.
Acme的主要数据和程序结构想要使用DB 2IdentityValueGeneration功能来从不同程序的业务逻辑这样的重担移去。
TADDM also has a bulk loading capability with which data can be imported in IDML (Identity Markup Language) format.
TADDM还有一个批量加载功能,支持以idml (IdentityMarkupLanguage)格式导入数据。
As a developer, Jim must create a static identity relationship with four roles to correlate the different data representations.
作为开发人员,Jim必须创建有四个角色的静态身份关系,关联不同的数据代表。
Additionally, with data integration happening both on the server and client-side, identity and credential delegation from the user to the mashup service might become a requirement.
另外,由于数据集成是在服务器和客户端同时发生的,因此从用户到mashup服务进行的身份和证书委托也可能会成为一个需求。
Appendix: Identity assertion features in data sources.
附录:数据源中的身份断言功能。
Once you have moved the data, you might need to update your database to start the numbering of your automatically generated identity columns higher than all the existing values in the migrated data.
一旦您迁移了数据,您可能需要更新您的数据库,使之在您自动生成的标识字段中从高于迁移数据所有值的数字开始计数。
It is the structure of this meta-data that gives a filesystem its particular identity and performance characteristics.
就是这个元数据的结构为文件系统提供了其特定的身份和性能特征。
User identity must be propagated into services and used to authorize data access.
用户标识必须传播到服务中,并用于授权数据访问。
应用推荐