For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
The system use case makes references to screens and reports, such as "UI23 Security Login Screen" and "UI89 Enrollment Summary Report."
系统用例提及屏幕和报告,如“UI23安全性登录屏幕”和“UI89登记摘要报告”。
You create a simple login system where users can visit and log in using form-based authentication and J2EE declarative security using Geronimo's SQLLoginModule.
将使用Geronimo的SQLLoginModule创建一个简单的登录系统,用户可以用基于表单的认证和J2EE声明式安全性访问和登录系统。
Additional security through TF-A and system login requirements.
通过TF - A与系统登录需求的其他安全性设置。
It is the practical and operable, the system is also designing a login password to ensure system security.
在使其具有实用性和可操作性的同时,系统还设计了登录密码,以保证系统的安全性。
Aiming at the character of the distributed application system, the system verifies the long-distance login, and fulfils the security need of the system.
针对分布式应用系统的特点,系统对远程登录进行权限验证,满足了网络数据传输的安全需要。
Aiming at the character of the distributed application system, the system verifies the long-distance login, and fulfils the security need of the system.
针对分布式应用系统的特点,系统对远程登录进行权限验证,满足了网络数据传输的安全需要。
应用推荐