Traditional security and authentication can not guarantee the safety of authentication.
传统的保密与认证方式已经越来越难以保证认证的安全性。
NET remoting client configuration file that includes security and authentication options.
NET远程处理客户端配置文件,该文件包括安全和身份验证选项。
After creating a new virtual directory, you can configure security and authentication for the virtual directory.
在创建新的虚拟目录后,可以为该虚拟目录配置安全性和身份验证。
Single sign-on solutions can be that unified framework for security and authentication, alleviating much of the burden on users, administrators, and developers.
单点登录解决方案为安全性和身份验证提供了统一的框架,这大大减轻了用户、管理员和开发人员的负担。
Assign a unique User ID and Password between WebSphere Business Integration Connect companies to increase the security and authentication level of communication.
在WebSphere业务集成连接公司之间分配唯一的用户ID和密码来加强安全性和通信的验证级别。
Authentication and Authorization security.
认证和授权安全。
Data security by providing support for username and password authentication and for digital certificates.
通过支持用户名和密码认证以及数字证书的数据安全。
A full discussion of the nuances of common services — how they're started, how they react to client, inherent security issues and authentication methods — is beyond the scope of this document.
对常见服务之间细微差别的完整讨论-它们怎么启动、它们如何对客户机作出反应、其内在安全性问题和认证方法-已超出了本文的范围。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
For Authentication and Authorization checks a security token needs to be supplied.
对于身份验证和授权检查,需要提供安全令牌。
Authentication and privacy are security issues that have been largely standardized and productized.
在安全方面,身份验证和隐私已基本标准化和产品化。
Typically an ESB will contain mechanisms for logging, auditing, authentication (security), and management, etc, above and beyond the services listed above.
除了上面列出的服务,ESB通常还要包括记日志、审计、认证(安全)和管理等机制。
This article USES example code to demonstrate mouse dynamics for enhancing the security of applications in authentication and continuous usage contexts.
本文将使用示例代码来演示鼠标力学,从而增强在验证和连续使用应用程序时的安全性。
It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.
文中还介绍了DB 2UDB安全模型,包括用户身份验证、用户和组授权以及超级用户。
Database-level security measures including authentication and authorization might also be used to enhance application security.
数据库级的安全措施,包括身份验证和授权,也可以用于加强应用程序的安全性。
Both the DB2 and IDS security model consist of two main components: authentication and authorization.
DB2和IDS安全模型都由两个主要组件组成:身份验证和授权。
As a consequence, architects often intend to also leverage existing security mechanisms such as authentication and authorization of the source systems.
因此,架构师经常还希望利用现有的安全机制,如源系统的身份验证和授权。
IBM DB2 CM provides various levels of security through authentication and authorization.
IBMDB 2CM通过身份验证和授权提供了各种级别的安全性。
1 - Security - Authentication and Authorization services.
安全——认证和授权服务。
Enabling security for user authentication and group permissions for access to requirements and documents
要访问需求和文档,就要为用户的鉴定和组权限激活其安全性
Spring Security is a powerful and highly customizable authentication and access-control framework.
SpringSecurity是功能强大的并高度可定制的认证和访问控制框架。
Spring Web Flow provides a JSF platform model and authorization of States, Flows, and Transitions. It USES Spring Security for authentication and authorization purposes.
SpringWebFlow能够提供一个JSF平台模型,并提供状态、流和transition的授权,其中,认证和授权的实现应用到了SpringSecurity。
IPSec for IPv6 provides the same level of authentication and security as it does for IPv4.
ipsec为ipv 6提供了与IPv4的相同级别的认证和安全。
Integrated security features including authentication and authorization support integrated with existing enterprise security infrastractures
集成的安全特性包括对认证和授权的支持并与现有的企业安全基础设施相集成。
And while most security frameworks stop at authentication and authorization, Shiro provides much more.
虽然多数安全框架止于授权和认证,但Shiro提供了更多功能。
Encina applications typically use the DCE security registry to store user accounts and groups, and the DCE security service for authentication.
Encina应用程序特别使用了DCE安全注册来存储用户的帐号和分组,以及用于身份验证的DCE安全服务。
For example, security (include both authentication and authorization), offline capability, and deployment.
例如,安全(包括身份验证和授权)、脱机功能和部署。
Invoke security services, including authentication and authorization, to avoid any unnecessary layer trips.
调用安全服务,包括身份验证与授权使用,从而避免任何重复的层访问。
Then we look at securing a Web server through Web authentication, server security, and data security.
然后将查看如何通过Web身份验证、服务器安全性和数据安全性来确保Web服务器的安全。
Then we look at securing a Web server through Web authentication, server security, and data security.
然后将查看如何通过Web身份验证、服务器安全性和数据安全性来确保Web服务器的安全。
应用推荐