DB2 UDB supports two mechanisms for plug-in authentication.
DB 2UDB支持两种插件身份验证机制。
Digital signature is a very important method in authentication.
数字签名是实现认证的重要工具。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
To ensure the maximum performance, memcached does not provide any form of security, either in authentication or encryption.
为了确保最佳性能,memcached 并未提供任何形式的安全性,没有身份验证,也没有加密。
Improved the display of long domain names in authentication dialogs. Long domain names will now scroll instead of using ellipsis. See the advisory.
改进了长域名在验证对话框中的显示效果。长域名现在可以滚动,不再使用省略号。查看报告。
This article USES example code to demonstrate mouse dynamics for enhancing the security of applications in authentication and continuous usage contexts.
本文将使用示例代码来演示鼠标力学,从而增强在验证和连续使用应用程序时的安全性。
When you add in authentication and authorization through HTTP, you can see that this API provides all of the function necessary to manage one or more blogs.
当通过HTTP添加身份验证和授权时,就会注意到此api提供了管理一个或多个blog所需的全部功能。
Also in this model, authorization data has been separated from the authentication information so authorization data should not be embedded in authentication tickets.
而且,在这个模型中,授权数据已经与认证数据分隔开了,这样,授权数据就应该不用嵌入认证令牌中了。
This framework, introduced with DB2 UDB V8.2, also supports plug-in authentication based on Generic Security Service Application Programming Interface (GSS-API).
该框架是在DB2UDBV8.2 中引入的,也支持基于通用安全服务应用程序编程接口(Generic Security Service Application Programming Interface,GSS-API)的插件身份验证。
This article USES example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.
本文将使用示例代码来演示击键力学如何在验证及连续数据输入环境中增强应用程序安全性。
Even in the situation of limited dealing speed some security measures, such as anti-theft chain, logging in authentication and blacklist management, can be achieved.
在有限处理速度情况下实现了防盗链、登陆认证、黑名单管理等安全措施。
Another advantage of using this type of plug-in authentication is that any authentication data (including binary data) can be transmitted between the client and the server.
使用这种插件身份验证的另一个优点是,任何身份验证数据(包括二进制数据)都可以在客户机和服务器之间传递。
At this time, the decision was made to remove the ability to authenticate on a gateway machine, thereby making the gateway a passive player in authentication type negotiation.
此时,做出删除网关机器上的验证能力的决定,使得网关成为验证类型协商中的一个消极参与者。
Since our runtime cannot determine the userid and password that is used in HTTP authentication, we cannot use this to connect to the database.
由于我们的运行时不能确定在HTTP认证中所使用的用户标识和口令,因此我们不能使用该用户连接到数据库。
In either method, authentication must take place first.
在这两种方法中,必须先进行认证。
In doing so authentication and identity management needs to be addressed.
要完成这些工作,首先要解决的就是认证和身份管理。
Its components may have to be changed due to deficiencies found in the authentication algorithms or to changes in requirements for system authentication.
由于发现了认证算法中存在的缺点,或者由于系统认证需求的变化,有时候需要更改认证框架的组件。
Authentication in IBM Cognos 8.
IBMCognos8中的身份验证。
In most applications, authentication is done through a combination of a user name and password.
在大多数应用程序中,身份验证是通过用户名和密码的组合完成的。
The third step is to create, in the authentication database, a schema and the related database objects within that schema.
第三步是在身份验证数据库中创建一个模式,并在这个模式中创建相关的数据库对象。
In summary, authentication must be performed locally on the receiving queue manager.
总之,必需在接收到队列管理器时在本地执行身份验证。
The following are the main steps in the authentication protocol.
下面是这个身份验证协议中的主要步骤。
Server-level security is a kind of security in which authentication can be passed to another server.
在采用服务器级安全性时,可以把身份验证信息传递给另一个服务器。
The schema is implied and coincides with the user ID specified in the authentication alias, at the time the BPC is configured.
模式是通过隐含方式确定的,与在配置BPC时在身份验证别名中指定的用户ID 一致。
The challenge in using keystroke dynamics in an authentication or verification context is to discern acceptable variations from incorrect credentials.
在身份验证或检验环境中使用击键力学的挑战是把可接受的变化与不正确的凭证辩别开来。
This article discussed the importance of security in general and authentication in particular.
本文讨论了安全性尤其是身份验证的重要性。
This usually indicates some internal problem with the provider and renders authentication impossible, no further request must be send in this authentication transaction.
这通常表示提供者内部出现了某种问题,不可能执行身份验证,在这个身份验证事务中不必发送新请求。
However, they don't discuss the authentication in detail.
然而,这两部分并没有详细讨论身份验证。
In multifactor authentication, the authenticity of an identity is verified and validated using more than one validation mechanism.
在多因素身份验证中,使用多种检验机制检查身份的真实性。
Information security in general and authentication in particular are key aspects for any IT-based solution.
信息(尤其是身份验证信息)的安全性是任何基于IT的解决方案的关键方面。
应用推荐