• The solution was to create something called a shadow password.

    解决方法创建shadow password

    youdao

  • It also provides shadow password support to enhance system security.

    为了增强系统安全性支持影子口令

    youdao

  • The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.

    MD 5密码加密算法支持更为可靠密码从而进一步提高了安全性

    youdao

  • Password file-base authentication: authentication is based on the password and shadow files or interaction with Network Information System (NIS), on the machine where the database server is installed.

    基于密码文件身份验证:身份验证基于安装数据库服务器机器的密码影子文件,或者与Net workInformationSystem (NIS)的交互

    youdao

  • Note that as the password entry is not readable, the only use of the shadow attributes is to manage password expiration.

    注意密码条目不可shadow属性惟一用处就是管理密码的过期问题。

    youdao

  • Migrate the password and shadow information.

    迁移密码shadow信息

    youdao

  • Migrate the password and shadow information.

    迁移密码shadow信息

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定