• Application Server global security is enabled with Lightweight Third Party Authentication (LTPA) and using LDAP, using the following parameters.

    通过轻量级第三身份验证(LTPA)使用ldap启用了ApplicationServer全局安全,使用参数如下

    youdao

  • The third step is to create, in the authentication database, a schema and the related database objects within that schema.

    第三身份验证数据库创建一个模式这个模式中创建相关的数据库对象

    youdao

  • The SAML standard provides interfaces that allow third parties to send their requests for authentication and authorization.

    SAML标准提供了允许第三实体请求验证授权信息接口

    youdao

  • Third, they provide you the capabilities to implement powerful authentication, authorization, and audit facilities for your MDM solution.

    最后能够MDM解决方案实现强大的身份验证授权审计工具

    youdao

  • With the DB2 UDB security plug-in architecture, you can customize its authentication behavior by either developing your own plug-ins, or buying plug-ins from a third party.

    利用DB 2UDB安全插件架构可以通过开发自己插件第三购买插件的方式来定制身份验证行为

    youdao

  • SSL authentication is when the client and server exchange certificates that have been signed by a third party who has unquestioned credentials.

    SSL身份验证客户机服务器交换具有可靠凭证第三签发证书

    youdao

  • To avoid these shortcomings, you can use the Light-weight Third Party Authentication (LTPA) token approach discussed below to provide the single sign-on capability.

    为了避免这些缺陷可以使用下面将要讨论轻量级第三认证(Light-weight Third Party AuthenticationLTPA令牌方法提供点登录功能

    youdao

  • The sample Web service provider application is configured to use WS-Security with a lightweight Third Party Authentication (LTPA) token.

    实例Web服务提供者应用程序配置通过轻量级第三认证(Lightweight Third Party Authentication,LTPA)令牌使用WS-Security。

    youdao

  • This protocol can realize mutual authentication and generate a session key acknowledged by both sides of communication. Besides, the generation of session key has no third party involved.

    协议可以实现通信双方相互认证,同时产生双方认可会话密钥并且会话密钥的产生需要其他第三的参与。

    youdao

  • In the third mobile communication systems, access security includes the confidentiality of the subscriber identity, entity authentication and the security of data.

    第三移动通信系统中接入安全主要包括身份保密实体认证数据安全三个方面。

    youdao

  • The third part is about the consequences of invalid labor contract, and it is divided as the authentication procedure and law consequences.

    第三部分无效劳动合同法律后果分为无效劳动合同确认程序无效劳动合同的法律后果两个方面。

    youdao

  • The third part gives a detailed analysis to the rights and obligations of all parties during the course of electronic signature authentication.

    第三部分详细分析电子签名认证过程各方当事人之间权利义务

    youdao

  • The current proxy blind signature are based on the identity or certificate, needing reliable third-party authentication. Public key system without the certificate has to overcome this shortcoming.

    当前代理签名都是基于身份证书的,需要可靠第三方认证无证书公钥系统克服这种缺点

    youdao

  • The third method is effective integrate the former two algorithms, which proposed dual watermarking algorithm for digital image authentication.

    第三算法两种空域和变换域算法进行有效融合从而提出了双重多功能性水印数字图像认证算法。

    youdao

  • The proof of over 3 years in domestic inspection and authentication business in the capacity of a third person;

    第三身份依法在国内从事检验鉴定业务3年以上证明

    youdao

  • The products with ROHS request can all offer a authentication report to the third party.

    ROHS要求产品均可提供第三认证报告

    youdao

  • The products with ROHS request can all offer a authentication report to the third party.

    ROHS要求产品均可提供第三认证报告

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定