• No prompting for trust levels will occur if you use Trusted Application Deployment.

    如果使用信任应用程序部署,则不会出现任何信任级别提示

    youdao

  • A full trust application can paste XAML only from another fully trusted application.

    完全信任应用程序贴上来自其他完全信任之应用程序的XAML

    youdao

  • To define a broker as a trusted application, use the -t flag on the mqsicreatebroker command.

    代理定义可信应用程序的方法是在mqsicreatebroker命令使用-t标志

    youdao

  • When the broker runs as a trusted application, WebSphere MQ API calls are processed more efficiently.

    代理作为可信应用程序来运行时WebSphereMQAPI调用高效地处理。

    youdao

  • To configure trusted application deployment, the certificate can be installed to the machine or enterprise level.

    配置受信任应用程序部署可以证书安装计算机企业级别

    youdao

  • Trusted application domain hosts can override evidence provided from the loader and can provide their own evidence.

    受信任应用程序宿主可以重写加载程序提供证据提供它们自己的证据。

    youdao

  • In addition, an assembly or a trusted application domain host can provide custom evidence as a resource that is part of the assembly.

    另外,程序信任应用程序宿主还可以提供自定义证据作为程序集组成部分资源

    youdao

  • In some situations, evidence that would normally be provided by a trusted application domain host is actually provided by the loader.

    某些情况下通常信任的应用程序宿主提供证据实际上由加载程序提供。

    youdao

  • If the digital signature is valid, the trusted application domain host passes the signature information as evidence to the runtime's policy mechanism.

    如果数字签名有效受信任的应用程序宿主将签名信息作为证据传递运行时策略机制。

    youdao

  • Some evidence, such as where the code originates, usually comes from the trusted application domain host because only the host knows this information.

    有些辨识项(例如程序来源位置)通常来自信任的应用程序定义域主机因为只有应用程序知道这项资讯。

    youdao

  • Or, maybe the database receives XML documents from a trusted application, maybe even one that you control, and you know that the XML data is always valid.

    或者数据库可能信任的应用程序处接收XML文档而且您已知这些XML数据始终有效。

    youdao

  • Other evidence, such as an assembly's digital signature, is inherent in the code itself and can come from the loader or a trusted application domain host.

    其他辨识项(例如组件数位签章)程序本身就有的,来自载入信任的应用程序定义域主机。

    youdao

  • The application USES trusted application Deployment and the digital certificate used to sign the application is not listed as a trusted publisher on the local machine.

    应用程序使用信任的应用程序部署并且没有用于为应用程序签名数字证书列为本地计算机的受信任发行者

    youdao

  • The runtime's policy mechanism USES the evidence from both the trusted application domain host and the assembly to determine a piece of code's membership in a code group.

    运行时策略机制使用来自信任的应用程序宿主程序证据确定代码在代码组中的成员资格。

    youdao

  • If the trusted application domain host does not have permission to provide evidence, the assembly or application domain receives the permissions that have been granted to the host.

    如果信任的应用程序宿主没有提供证据权限,则程序集应用程序域会收到授予宿主的权限。

    youdao

  • This model assumes, like the end to end trust, that a requesting application is known and trusted software.

    信任类似模型假定请求应用程序已知的受信任软件

    youdao

  • This example shows how to enable a trusted context and switch the user ID in an xa application environment.

    这个例子展示如何XA应用程序环境中启用一个受信任上下文切换用户ID

    youdao

  • As the requesting application is not trusted audit requirements would be met by the ESB.

    由于请求应用程序信任,因此审核要求esb满足

    youdao

  • After the trusted connection has been established, the application can then switch the user to an allowed user defined in the trusted context.

    建立信任连接之后应用程序用户切换受信任上下文中定义允许的用户。

    youdao

  • The explicit trusted connection is established under the identity of the application user APP_USER.

    将在应用程序用户APP_USER身份建立显式可信连接

    youdao

  • The attraction of running an MQ application as trusted is that it gives a performance benefit through reduced code pathlength.

    MQ应用程序作为受信任对象运行好处在于,这样可通过缩短代码路径长度提供性能优势

    youdao

  • The application program will be able to utilize the trusted connection in an distributed transactions.

    应用程序可以分布式事务使用受信任连接

    youdao

  • "Trusted code" runs in the control region, user application code runs in the servant region, which completely isolates application execution and transaction management.

    受信任代码控制区域中运行用户应用程序代码在服务区域中运行,从而将应用程序执行事务管理完全隔离

    youdao

  • After the application has established a trusted connection with the DB2 server, the application may switch users associated with the trusted context object in the backend.

    应用程序已经建立DB 2服务器连接之后,应用程序可以在后切换与受信任上下文相关联用户

    youdao

  • This lets application developers offload the task of user profile management to a third-party trusted resource, so they can concentrate on developing the application.

    这样应用程序开发人员就能够把管理用户信息任务交给可信第三资源,这减轻他们的工作负担,让他们可以集中精力开发应用程序。

    youdao

  • It assumes that the connection from WebSEAL to Application Server is completely trusted; therefore, client-side certificates for authentication are required.

    假设WebSEALApplicationServer连接完全信任的,因此需要用于认证客户端证书

    youdao

  • Trusted connection in an XA application

    XA应用程序中的受信任连接

    youdao

  • Trusted connection in a JDBC application.

    JDBC应用程序中的受信任连接

    youdao

  • After the initial setup is complete, application users can begin using the federated trusted contexts.

    完成初始设置应用程序用户可以使用联合可信上下文了

    youdao

  • Trusted connection in CLI application.

    CLI应用程序中的受信任连接

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定