Comparing host-based authentication to public key-based authentication.
比较基于主机的认证和基于公钥的认证。
Unless your API is a free, read-only public API, don't use single key-based authentication.
除非你的API是一个免费的,只读的公开api,否则不要使用单一的基于密钥的验证。
At this point, ssh public key-based authentication is now complete, and you can proceed to " DB2 configuration."
至此,ssh 基于公钥的认证已经完成,现在可以进入“DB2配置”。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
S/MIME encryption also uses a key-based approach, but it has some significant advantages in convenience and security.
MIME加密也使用基于密钥的方式,但它在便利和安全上有着一些优势。
The SSH daemon does not allow key-based authentication if the home directory if people other than the user can write to it.
如果除应用程序用户以外还有人能够修改home目录,那么SSH守护进程就不支持基于密钥的认证。
No SSH server configuration is necessary, since, by default, SSH will attempt to use public key-based authentication before password based authentication.
这里不需要ssh服务器配置,因为在默认情况下,在基于密码的认证之前,ssh将尝试使用基于公钥的认证。
Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).
而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问)。
As of today, the only security mechanism supported by most of the GSS-API offerings is the popular symmetric key-based mechanism called Kerberos [IETF RFC-1964].
到目前为止,大部分GSS - API产品所支持的惟一的安全机制就是名为kerberos [ietfRFC - 1964]的流行的基于对称密钥的机制。
Based on the findings, the researchers suggest that the key to boosting your willpower is to believe that you have an abundant supply of it.
基于这些发现,研究人员认为增强意志力的关键在于相信自己有充足的意志力。
Here are some others key tips based on my own speaking experience and what I've noticed in other good speakers.
这是其它一些关键技巧,根据我自己的演讲经验以及从其他优秀演讲者身上发现的总结的。
The lifecycle of what we call "BPM Enabled by SOA" is to iteratively model, deploy and monitor, and BPMN provides a key standards based technology for the entire lifecycle.
我们称之为“SOA支持的BPM”的生命周期就是建模、实施和监视的迭代,而且BPMN提供了基于整个生命周期技术的关键标准。
XSLT Version 2.0 offers some key improvements based on collective experience with XSLT 1.0, but it is closely tied to XPath 2.0, which is somewhat controversial.
XSLTVersion 2.0在集中 XSLT 1.0 使用体验的基础上提供了一些关键改善,但是它与XPath 2.0 的联系更加紧密,而后者还存在一些争议。
The strategy is based on two key components
消除淋巴丝虫病战略有两个主要组成部分
In some cases, you might find that guidelines for choosing the proper partitioning key based on collocation and data balancing contradict one another.
在某些情况下,您可能会发现根据并置和数据平衡选择恰当的分区键的准则会相互矛盾。
This process is, in turn, based on the public key of the signer.
相反,这个过程是基于签名者的公有密钥的。
The size of the discount is a key business decision based on the type of customer.
折扣的多少是一个基于客户类型的重要业务决策。
If you choose a partitioning key based on your query workload, the partitioning key should typically consist of either a joined column or a set of columns that is frequently used in many queries.
如果基于查询工作负载选择一个分区键,那么此分区键通常应该包含一个合并列或常被用于很多查询的一组列。
Verification of the signature is a key in any signature-based form implementation.
签名验证在任何基于签名的表单实现中都是关键部分。
That's the key thing with location-based apps, the user must remain in control.
这一点对于基于位置的应用程序来说至关重要:用户必须享有控制。
The optimizer will deduce key value selection based on the functional dependency of the column within the row.
优化器将根据行中列的函数依赖性来推断关键值选择。
This password check is done even if the user is following the public key or host-based authentication.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
The article concludes with a high-level summary of key performance results based on internal case studies.
本文最后将基于一些内部案例研究简要总结关键性能结果。
RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。
As you saw in Part 1, this public key would be based on the RSA algorithm.
您从第1部分中可以看到,这个公钥是基于rsa算法生成的。
The cache request mediation generates a cache key based on the request message, and searches for a response in the cache.
缓存请求中介基于请求消息生成缓存键,并在缓存中搜索响应。
Data is put into and retrieved from the cache based on its key.
数据基于其键放入缓存及从中检索。
In addition, the partitioning key must still be based on relational data.
另外,分区键仍然必须基于关系数据。
The URL-based key can be easily expanded to include other characteristics of the user request.
可以容易地扩展基于URL的键,以包括用户请求的其他特征。
The URL-based key can be easily expanded to include other characteristics of the user request.
可以容易地扩展基于URL的键,以包括用户请求的其他特征。
应用推荐