Authentication is the process of validating user-supplied credentials using a security mechanism, as discussed in Part 1 of the DB2 security series.
身份验证是使用安全机制对用户提供的凭证进行确认的过程,这已在DB 2安全系列文章的第1部分中进行了讨论。
In this document the background of the authentication process is provided along with descriptive information on how to use the provided SDK to handle SSO.
在本文档中,提供身份验证过程的背景知识并描述如何使用提供的SDK处理SSO。
The debug output displays important information which you might not otherwise see, in addition to offering a high level view of how the authentication process works.
除了能够让您从高层次了解认证过程的工作原理之外,调试输出还能够显示通过其他方式可能无法看到的重要信息。
This article describes the design and development process of a specific type of security plug-in, one that uses a DB2 database to store authentication information.
本文描述如何设计和开发一种特定类型的安全性插件,这种安全性插件使用DB2数据库存储身份验证信息。
Table 7 provides a simplified illustration of the basic client-server flows involved in the GSS-API authentication process.
表7简单地解释了在GSS-API身份验证过程中客户机 - 服务器之间的基本流程。
In particular, you must take steps to prevent unauthorized clients or impostors from sending events or from triggering the billing process without the right authentication or permission.
尤其是,必须采取措施防止没有经过身份验证或授权的客户或冒名顶替者发送事件或触发账单流程。
Figure 1 shows the basic process of creating a certificate using a ca and distributing it, in this case, to perform server authentication with SSL.
图1中显示了使用CA创建证书和分发的基本流程,对于本例,用于通过SSL执行服务器身份验证。
Table 8 shows the steps involved in a client-server flow when DB2 is involved in the GSS-API authentication process.
表8展示了在GSS-API 身份验证过程中涉及DB2时客户机 - 服务器之间流程中的步骤。
The section HTTP authentication with PHP of the PHP manual describes the process in detail.
PHP手册中的使用 PHP 进行HTTP身份验证一章详细介绍了这个过程。
Instead, you must specify, likely during the deployment process, the authentication information for each resource reference in the application (in this case the authentication method does not matter).
而必须像在部署期间一样,在应用程序中执行每个资源引用的身份验证信息(此时身份验证方法并不重要)。
The Subject class is used to represent an authenticated user in a given system (that is, a populated Subject is the outcome of the JAAS authentication process).
subject类用于表示在给定系统中认证的用户(即填充的Subject是JAAS认证过程的结果)。
This chapter is going to provide a comprehensive description of the concepts and components involved with the authentication process in IBM Cognos 8.
本章全面描述IBMCognos8中的身份验证过程涉及的概念和组件。
In Listing 3, org.acegisecurity.providers.ProviderManager is the manager class that manages acegi's authentication process.
在清单3中,or g .acegisecurity . providers . ProviderManager是一个管理器类,它管理acegi的身份验证过程。
As seen from the previous details, the authentication service being implemented by the DCE is very similar to the process followed in Kerberos protocol.
从前面的细节可以看到,DCE实现的身份验证服务非常类似于Kerberos协议中所遵循的过程。
Figures 2 and 3 represent a virtualized organization structure implementation, in which the authentication process in a multi-tenant context is as follows.
图2和图3是一个虚拟的组织结构实现,采用这种实现的多租户身份验证过程如下。
In Process Server, authentication is supported by the following four mechanisms.
在ProcessServer中,身份验证通过下面4种机制支持。
The time necessary for making a supplement to or re-collecting the authentication materials in the process of authentication shall not be counted in the authentication time limit.
在鉴定过程中补充或者重新提取鉴定材料所需的时间,不计入鉴定时限。
In that case, the user's identity changes from the assigned anonymous user identity to the identity provided by the authentication process.
在这种情况下,该用户的标识会从分配的匿名用户标识更改为身份验证进程提供的标识。
Authentication is the process of proving an association or identity between an agent (the end-user in our case) and a defined degree of trust.
认证是证明关联或识别的过程,关联和识别发生在代理人(最终用户在我们这里的情况下)和定义信任的程度之间。
In the design process, system security and data integrity are ensured by user authentication and encryption respectively.
在设计过程中,通过对用户的认证与数据加密机制来确保系统的安全性与数据的完整性。
The authentication (authentication in court) and the authentication after court, two different stages of authentication, make authentication, a complete process.
法庭调查中的认证(当庭认证)与法庭辩论后的认证是认证的两个不同阶段,两者构成认证的完整的过程。
If an mistake appearing in the process of Rights authentication and management, which leads Digital rights hurt, is going to bring the serious damage to author and affect their create enthusiasm.
如果在版权认证与管理的过程中出现差错,将导致作用数字版权受到侵害,并给版权所有者带来损害,严重影响他们的创作积极性。
Security overall process is taken into account in the scheme, which is not only provided with id Authentication, but function of configuration to crypto chip and destroy of sensitive data.
该方案充分考虑了密码卡实际应用全过程的安全性,不仅具有认证功能,而且设计了配置密码芯片和销毁敏感数据的功能。
And narrated author's in software development process attainment to realize manager after identification authentication might have the complete jurisdiction management system management system.
并且叙述了作者在软件开发过程中的心得体会管理员通过身份验证后可以拥有完全的权限管理系统。
In order to provide the anti-counterfeiting for brand authentication, a fragile watermark algorithm is designed and implemented based on the analysis of the process of cloth manufacturing.
针对提花织物防伪问题,在分析提花织物生产工艺的基础上,提出了一种用于真伪认证的基于小样图的易损盲水印算法。
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.
身份验证是一个过程,确定某人或某事,事实上,谁或者什么声明它。
Combining the authentication of GJB 2725A-2001, how to carry the software testing process was discussed in this paper, it does a practical role in software testing area.
结合本单位软件评测实验室GJB 2725A-2001《测试实验室和校准实验室通用要求》的认可工作,对软件测试质量管理体系的构建和运行进行了研究和实践,具有指导作用。
In order to carry put the process, you are required to select the target PC, and set up the authentication parameters (username, password, domain).
为了做好放的过程中,您需要选择目标PC,并设置身份验证参数(用户名,密码,域)。
In order to carry put the process, you are required to select the target PC, and set up the authentication parameters (username, password, domain).
为了做好放的过程中,您需要选择目标PC,并设置身份验证参数(用户名,密码,域)。
应用推荐