The example KDC setup below shows the steps needed to set up an MIT Kerberos authentication system.
下面的示例KDC设置展示了设置MITKerberos身份验证系统所需的步骤。
User and group authentication is managed in a facility external to DB2, such as the operating system, a domain controller, or a Kerberos security system.
用户和组的身份验证是在DB 2外部的一个设施中,例如操作系统、域控制器或Kerberos安全系统中进行管理的。
Therefore, administrators do not need to do any extra work during a system failure to failover Kerberos authentication service to the backup server.
因此在系统失败时,管理员不需要做额外工作就可以将Kerberos身份验证服务故障转移到备份服务器。
User and group authentication is managed in a facility external to DB2 UDB, such as the operating system, a domain controller, or a Kerberos security system.
用户和组身份验证由DB 2udb外部的设施管理,比如操作系统、域控制器或者Kerberos安全系统。
In DB2 UDB, user and group authentication is managed in a facility external to DB2 UDB, such as the operating system, a domain controller, or a Kerberos security system, in the form of a plug-in.
在DB 2UD b中,用户和组身份验证由DB 2UDB的外部设备以插件的形式来管理,如操作系统、域控制器或者Kerberos安全系统。
Kerberos is a third-party authentication system that originated at MIT as part of Project Athena.
Kerberos是来自MIT的第三方身份验证系统,是a thena项目的一部分。
Network file system Version 4 (NFS V4), the up-and-coming enterprise file system, USES the Kerberos security mechanism to address privacy, authentication, and integrity requirements.
即将推出的企业文件系统Net workFileSystemVersion4 (NFSV4)使用Kerberos安全性机制解决隐私、身份验证和完整性需求。
Db2auth USES a db2 database to store authentication information instead of an external authentication repository, such as an operating system or Kerberos.
db2auth使用db 2数据来存储身份验证信息,而不借助外部身份验证存储库,比如操作系统或Kerberos。
By utilizing the loadable identification and authentication framework of AIX, the system directs authentication requests to use Kerberos instead of standard UNIX authentication.
通过利用可加载的AIX识别和身份验证模块,系统将引导身份验证请求使用Kerberos代替标准的UNIX身份验证。
By utilizing the loadable identification and authentication framework of AIX, the system directs authentication requests to use Kerberos instead of standard UNIX authentication.
通过利用可加载的AIX识别和身份验证模块,系统将引导身份验证请求使用Kerberos代替标准的UNIX身份验证。
应用推荐