Next, you can create a user mapping to register remote authentication information to the data sources if necessary
接下来,可以创建用户映射以便在需要时将远程认证信息注册到数据源
The inventive remote authenticating system for a biologic sample can realize quick and remote authentication fro the biologic sample.
本发明的生物标本远程鉴定系 统可实现生物标本的快速、远程鉴定。
TACACS is an encryption protocol and therefore less secure than the later TACACS + and Remote Authentication Dial-In User Service protocols.
TACACS是一个安全的加密协议,因此低于后来TACACS +和远程认证拨号用户服务协议。
After remote authentication registration, if pass-through is supported for the data source, you can use it to test the connection to that data source.
在远程认证注册后,如果数据源的pass -through受支持,那么可以用它来测试到那个数据源的连接。
This paper introduces a method of authentication based on hash function to realize remote authentication on network, which makes use of the one-way characteristic of hash function.
鉴于散列函数的单向不可逆性,介绍了一种利用散列函数实现网络远程身份鉴别的方法。
You'll learn how to set up and configure a Remote authentication Dial-In user Service server (RADIUS) on a Linux system to perform authentication, authorization, and accounting (AAA) for users.
您将学习如何在Linux系统上建立和配置一个Remote AuthenticationDial - inUserService服务器(RADIUS),以执行对用户的验证、授权和记帐(AAA)。
Authentication of remote connections: There are a number of common practices that are related to authorization of client connections and channels from other queue managers.
远程连接的身份验证:对于客户端连接和来自其他队列管理器的通道,存在许多与身份验证相关的常用实践。
Instead, the site requires a nickname and authentication remote key.
相反,站点需要一个昵称和远程认证密钥。
To eliminate the variable of remote user authentication, the application servers mentioned in this article are local user repositories (that do not use LDAP).
为了估计远程用户认证的变量,在本文中提到的程序服务器是本地的用户储存库(并不使用LDAP)。
Enhanced authentication support that provides stronger processes for establishing secure remote sessions and authenticating users.
增强认证支持,对建立安全的远程会话和用户认证提供了更强大的处理能力。
Similar authentication techniques use the MAC address of the remote host's network card, or any sort of unique ID associated with that machine (such as a Pentium III processor ID, if available).
类似的认证技术使用远程主机网卡的mac地址,或者与该机器关联的任何类型的唯一标识(例如,如果可用,PentiumIII处理器标识)。
In the authentication Profile field, enter the authentication method to use to validate remote user credentials.
在Authenticationprofile字段中,输入用于验证远程用户凭证的认证方法。
This article introduces you to a few of those tools, including a useful technique that both facilitates access to remote systems and protects your authentication credentials.
本文将向您介绍其中的一些工具,包括一个有用的技巧,它可以简化对远程系统的访问并保护您的身份验证凭据。
Syncing security information for remote service authentication and techniques to consistently brand and personalize applications are just a couple of examples of how best to use the bridge.
为远程服务验证同步安全信息,以及提供品牌一致的技术,以及打造个性化应用程序,这些仅仅演示了桥接的一部分最佳应用。
The login information (credentials), later used for authentication or validation, travels together with the effective remote call, not as a separate package preceding the call.
登录信息(凭据),稍后用于身份验证或者验证,与有效的远程调用一同传输,而不是在调用之前作为单独的数据包。
Anyone implementing these configurations is strongly advised to do so as the first phase of a longer term plan that ultimately implements a strong authentication mechanism for remote connections.
我们强烈建议实现此配置的任何人将其作为长期计划的第一阶段,以最终实现远程连接的强身份验证机制。
When configured with public key authentication, your key proves your identity to remote SSH hosts.
当配置为公钥身份验证时,您的密钥证明您在远程ssh主机上的身份。
The authentication database can be either local or remote.
身份验证数据库可以是本地的,也可以是远程的。
This enables an authentication session to be transferred securely between remote processes.
通过这样,可以在远程进程之间安全地传输身份验证会话。
The service can be used by remote filesystems or other kernel services to manage cryptography, authentication tokens, cross-domain user mappings, and other security concerns.
远程文件系统和其他内核服务可以使用这个服务来管理密码学、身份验证标记、跨域用户映射和其他安全问题。
From a compliance perspective, the two prime factors to be considered for remote login sessions of these utilities are authentication with secure transmission and automatic logoff of remote sessions.
从遵从性角度来说,这些实用工具的远程登录会话有两个主要因素需要考虑:利用安全传输进行的身份验证和远程会话的自动下线。
When dealing with authentication or file placement issues on a remote host, it is a good practice to debug the FTP session.
当在远程主机上遇到身份验证或文件位置问题时,就应该调试FTP会话。
When dealing with authentication or file placement issues on a remote host, it is a good practice to debug the FTP session.
当在远程主机上遇到身份验证或文件位置问题时,就应该调试FTP会话。
应用推荐