Application Server global security is enabled with Lightweight Third Party Authentication (LTPA) and using LDAP, using the following parameters.
通过轻量级第三方身份验证(LTPA)并使用ldap启用了ApplicationServer全局安全,使用的参数如下。
The third step is to create, in the authentication database, a schema and the related database objects within that schema.
第三步是在身份验证数据库中创建一个模式,并在这个模式中创建相关的数据库对象。
The SAML standard provides interfaces that allow third parties to send their requests for authentication and authorization.
SAML标准提供了允许第三方实体请求验证和授权信息的接口。
Third, they provide you the capabilities to implement powerful authentication, authorization, and audit facilities for your MDM solution.
最后,它能够为MDM解决方案实现强大的身份验证、授权和审计工具。
With the DB2 UDB security plug-in architecture, you can customize its authentication behavior by either developing your own plug-ins, or buying plug-ins from a third party.
利用DB 2UDB安全插件架构,您可以通过开发自己的插件或从第三方购买插件的方式来定制身份验证行为。
SSL authentication is when the client and server exchange certificates that have been signed by a third party who has unquestioned credentials.
SSL身份验证是指客户机和服务器交换由具有可靠凭证的第三方签发的证书。
To avoid these shortcomings, you can use the Light-weight Third Party Authentication (LTPA) token approach discussed below to provide the single sign-on capability.
为了避免这些缺陷,您可以使用下面将要讨论的轻量级第三方认证(Light-weight Third Party Authentication,LTPA)令牌方法来提供单点登录功能。
The sample Web service provider application is configured to use WS-Security with a lightweight Third Party Authentication (LTPA) token.
实例Web服务提供者应用程序配置为通过轻量级第三方认证(Lightweight Third Party Authentication,LTPA)令牌使用WS-Security。
This protocol can realize mutual authentication and generate a session key acknowledged by both sides of communication. Besides, the generation of session key has no third party involved.
该协议可以实现通信双方的相互认证,同时产生双方认可的会话密钥,并且会话密钥的产生不需要其他第三方的参与。
In the third mobile communication systems, access security includes the confidentiality of the subscriber identity, entity authentication and the security of data.
在第三代移动通信系统中,接入安全主要包括身份保密、实体认证和数据的安全三个方面。
The third part is about the consequences of invalid labor contract, and it is divided as the authentication procedure and law consequences.
第三部分为无效劳动合同的法律后果,分为无效劳动合同的确认程序和无效劳动合同的法律后果两个方面。
The third part gives a detailed analysis to the rights and obligations of all parties during the course of electronic signature authentication.
第三部分,详细分析了电子签名认证过程中各方当事人之间的权利与义务。
The current proxy blind signature are based on the identity or certificate, needing reliable third-party authentication. Public key system without the certificate has to overcome this shortcoming.
当前的代理盲签名都是基于身份或证书的,需要可靠的第三方认证,而无证书公钥系统却克服了这种缺点。
The third method is effective integrate the former two algorithms, which proposed dual watermarking algorithm for digital image authentication.
第三种算法是将前两种空域和变换域算法进行有效融合,从而提出了双重多功能性水印数字图像认证算法。
The proof of over 3 years in domestic inspection and authentication business in the capacity of a third person;
以第三方身份依法在国内从事检验鉴定业务3年以上的证明;
The products with ROHS request can all offer a authentication report to the third party.
有ROHS要求的产品均可提供第三方认证报告。
The products with ROHS request can all offer a authentication report to the third party.
有ROHS要求的产品均可提供第三方认证报告。
应用推荐