SSL security on dedicated server.
SSL安全专用服务器上。
Complete the following steps to configure IIS and enable SSL security.
完成以下步骤,以配置IIS和启用ssl安全性。
Complete the following steps to configure WebSphere Application Server and enable SSL security.
完成以下步骤,以配置WebSphereApplicationServer和启用ssl安全性。
For the SSL security configuration, we use both server authentication and client authentication.
对于SSL安全配置,我们将使用服务器身份验证和客户端身份验证。
SEC_MAX_VALUE — Use the highest SSL security level that is defined (currently this is 128 bits).
SEC_MAX_VALUE——使用已定义的(当前是128位)最高级的SSL安全。
SSL security can be used for establishing communications inbound from (and outbound to) an endpoint.
SSL安全可用于建立来自端点的入站通信和指向端点的出站通信。
This means that you need to configure SSL security and set up certificates before WS-AT can operate across the two platforms.
这意味着需要配置ssl安全性,并在WS - AT跨两个平台进行操作之前设置证书。
SEC_CIRCUIT_AUTH — Use SSL security for privacy and integrity protection only on the initial request (while establishing the connection).
SEC_CIRCUIT_AUTH——仅在初始化的请求中(当建立连接时)使用SSL安全用于私有性及完整性保护。
Because WebSphere Application Server and IIS are running with SSL security enabled, you must configure Registry in order to discover services from them.
因为WebSphereApplicationServer和IIS都是在启用ssl安全性的情况下运行,因此必须对Registry进行恰当配置,以发现来自这些环境的服务。
This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.
这种攻击并不意味着整个互联网或者SSL安全已经被突破,但的确意味着厂商应该不再用MD 5作为签名算法。
You can set up an ISP that provides limited-bandwidth SSL sites to customers with low-traffic sites that offer low-volume sales transactions that requires SSL security.
如果客户具有提供小额零售业务的低流量站点,而且需要ssl安全性,那么您可以为其设置一个提供有限带宽ssl站点的ISP。
SEC_PACKET_INTEGRITY — Use SSL security for privacy and integrity protection on the initial request (while establishing the connection) and for integrity protection on all other requests.
SEC_PACKET _ INTEGRITY——在初始化的请求中(当建立连接时)使用SSL安全用于私有性及完整性保护,并在所有其它的请求中用于完整性保护。
We also showed how to use SSL to set up bind and link security.
我们还展示了如何使用SSL建立绑定和链接安全性。
You have seen how to lock down administrative access when strong authentication methods such as SSL or channel security exits are not immediately available.
您已经了解如何在不能直接采用SSL或通道安全出口之类的强身份验证方法时锁定管理访问权限。
As you learned in the last article of this series, SSL-secured connections can provide excellent security for most purposes in this type of environment.
正如本系列上一篇文章所述,使用SSL提供保护的连接可以为这类环境中的大部分应用提供出色的安全性。
In the next section we set up user security over IP connectivity with SSL.
下一节我们将使用经ssl加密的IP连接建立用户安全性。
In the next section we set up link security with SSL over IP connectivity.
下一节我们将使用经ssl加密的IP连接建立链接安全性。
Enabling SSL, a security exit, or some combination of the two on every inbound channel is usually required to assure that your authorization scheme is enforced properly.
要确保授权模式得到正确的执行,通常需要在每一个入站通道中启用SSL、安全退出或同时结合两者。
Understanding the answer to that question is the key to building meaningful security using SSL.
理解该问题答案的关键是使用SSL构建有意义安全性的关键。
IPIC supports bind security by the exchange of SSL client certificates.
IPIC通过SSL客户端证书的交换来支持绑定安全性。
Because a MAC can be computed faster than a digital signature, it is practical for transport layer security like SSL, where a large volume of data is transmitted.
由于MAC的计算要比数字签名快,因此它对于诸如ssl等数据传输量很大的传输层安全性来说是实用的。
SSL configurations are managed from the global security panel in the SSL area.
SSL配置是通过SSL区域中的全局安全性面板管理的。
This article should help solution architects and software architects set up security over IP connectivity with SSL in an enterprise environment.
本文有助于解决方案架构师和软件架构师使用通过ssl加密的IP连接在企业环境中构建安全性。
Ideally, for security, you would want to use digest authentication over SSL.
在理想情况下,为了安全,应该通过SSL使用数字摘要身份验证。
In the previous example, the decision to use SSL is likely driven by business security requirements, and thus they should be referenced here.
在前面的示例中,使用SSL的决策可能由业务安全需求驱动,因此应在这里引用。
While SSL is generally accepted as being secure, security researchers have claimed SSL communications can be intercepted.
SSL一直被普遍认为足够安全,但部分安全研究人员曾经声称SSL通信可以被拦截。
SSL can send a security certificate, which the other party can accept or reject.
SSL可以发送安全证书,对方可以接受或拒绝该安全证书。
There are no adverse effects to the internal SSL nor does it raise security concerns, hence this is what is described below.
这对于内部SSL没有不利影响,也不会造成安全问题,因此下面介绍这种方法。
Password authentication is not directly comparable to SSL authentication in terms of security.
就安全性来说,密码身份验证无法与SSL 身份验证进行直接的比较。
When you configure this IP connectivity with SSL, you can make the link security more stringent by adding few more checks through SSL configuration.
使用SSL配置该IP连接时,可以通过SSL配置添加更多检查来加强链接安全性。
应用推荐