• Trusted authentication by requesting application.

    请求应用程序进行信任身份验证。

    youdao

  • Authentication is provided in the form of a service ticket, issued by a trusted authentication service in the domain and encrypted with the target resource manager's secret key.

    认证是以服务令牌(service ticket)形式提供,这域中一个可信认证服务发出的,使用目标资源管理器密钥进行了加密

    youdao

  • It assumes that the connection from WebSEAL to Application Server is completely trusted; therefore, client-side certificates for authentication are required.

    假设WebSEALApplicationServer连接完全信任的,因此需要用于认证客户端证书

    youdao

  • However, host-based authentication is only allowed between two trusted hosts. This trust is based on two criteria.

    然而基于主机认证只是两个受信任主机之间被允许

    youdao

  • Set up WebSphere as a trusted container to handle authentication and authorization for Lotus Domino.

    WebSphere 设置一个可信容器LotusDomino处理授权认证的功能。

    youdao

  • DB2 has introduced trusted context authentication to permit the middle-tier to do this type of authentication.

    DB 2引入受信任上下文(trusted context)认证允许中间层进行这种类型认证。

    youdao

  • So the internal network is trusted, but only up to a point, and even on the internal network authentication and authorization are essential.

    因此内部网络固然可信,应该有一个限度即使是内部网络上,身份验证授权也很关键。

    youdao

  • Once the authentication is complete, the receiving server will verify that the upstream server is trusted to perform identity assertion.

    一旦身份验证完成接受服务器验证上游服务器是否受信任可以执行标识断言

    youdao

  • If your application requests an explicit trusted connection, you cannot set the database server authentication type to CLIENT.

    应用程序请求式的可信连接时不能数据库服务器验证类型设置CLIENT。

    youdao

  • Notice that in the previous scenario involving client authentication, the client presents a certificate that is validated by the server against the set of trusted certificates.

    注意前面涉及客户身份验证场景中,客户端提供一个证书,然后服务器针对受信任证书其进行检验。

    youdao

  • Furthermore, the ability to switch users with minimum connection resources and without authentication, makes trusted context an ideal choice for business applications.

    而且由于可以很少连接资源切换用户不需要身份验证受信任上下文商业应用程序的理想选择

    youdao

  • All valid database users can reuse the trusted connections established by APP_USER without re-authentication.

    所有有效数据库用户都可以重用APP_USER建立可信连接,无需重新验证。

    youdao

  • The policy abstraction for authentication can list alternatives, such as the types of credentials that are acceptable or which credential-issuing authorities are trusted.

    身份验证策略概括列出替代选项,可接受凭据类型所信任的凭据颁发机构。

    youdao

  • SSL enables us to use PUTAUT (CTX) when those trusted systems are in a compatible authentication domain.

    这些受信系统位于兼容身份验证域中时,SSL允许我们使用PUTAUT (CTX)。

    youdao

  • Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.

    可信主机用户希望登录远程计算机(可以可信系统)时,使用SSH基于主机身份验证

    youdao

  • The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.

    可信主机身份验证公私ssh密钥对身份验证方法类似的很大程度上实现相同结果

    youdao

  • It does the check by simply comparing the sending server's identity, after authentication, to a pre-configured list of trusted server's identities.

    进行了身份验证之后通过发送服务器标识配置的受信任服务器标识列表进行对比就可以完成这项检查工作。

    youdao

  • Once established, any valid user can use the trusted connection without re-authentication.

    连接建立后,任何有效用户都可以使用可信连接,无需重新验证。

    youdao

  • Once established, all valid users can reuse this trusted connection without re-authentication.

    连接建立后,任何有效用户可以重用可信连接无需重新验证。

    youdao

  • When using certificate authentication (client or server), you need to understand that each signer in the trust store represents a trusted provider of identity information (a certificate).

    使用证书身份验证(客户端服务器)时,需要理解信任存储库中的每个签署者都代表一个身份信息(证书)信任提供者

    youdao

  • The REMOTE_PASSWORD option does not need to be specified since JOE can reuse the trusted connections established by APP_USER without re-authentication.

    需要指定 REMOTE_PASSWORD选项因为JOE可以重用 APP_USER建立可信连接,无需重新验证。

    youdao

  • To create a trusted network path from the Web server to the application server, you configure the application server Web container SSL configuration to use client authentication.

    创建Web服务器应用服务器的可信网络路径需要配置应用服务器Web容器SSL配置使用客户机身份验证。

    youdao

  • Kerberos was designed based on secret key cryptography and using trusted third party authentication.

    Kerberos根据秘密密钥加密使用可信第三身份验证而设计的。

    youdao

  • Once you have ensured that client authentication is in use, you need to ensure that only trusted Web servers can contact the Web container.

    一旦确保正在使用客户机身份验证,需要确保只有可信Web服务器才能联系 Web 容器。

    youdao

  • In these cases, the Trusted target realms field must be configured for the sending server at CSIv2 outbound authentication. To test this option.

    这些情况下必须CSIv2出站身份验证中发送服务器配置信任的目标领域字段

    youdao

  • IBM has historically delivered strong security controls in its database solutions, including core authentication and authorization functionality, as well as advanced features such as Trusted Contexts.

    IBM数据库解决方案已经提供强大的安全控制功能包括核心身份验证授权功能以及TrustedContexts高级特性

    youdao

  • Directory Server stores user profiles and provides a trusted identity data infrastructure for authentication.

    DirectoryServer存储用户概要文件提供一个可信身份数据基础架构实现身份验证。

    youdao

  • As a result, you can achieve end-to-end identity assertion in a trusted environment with or without re-authentication.

    由此可以可信环境中实现端到端的身份断言(identityassertion),不一定需要重新验证。

    youdao

  • As a result, you can achieve end-to-end identity assertion in a trusted environment with or without re-authentication.

    由此可以可信环境中实现端到端的身份断言(identityassertion),不一定需要重新验证。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定