Trusted authentication by requesting application.
按请求应用程序进行信任身份验证。
Authentication is provided in the form of a service ticket, issued by a trusted authentication service in the domain and encrypted with the target resource manager's secret key.
认证是以服务令牌(service ticket)的形式提供的,这是由域中的一个可信认证服务发出的,并使用目标资源管理器的密钥进行了加密。
It assumes that the connection from WebSEAL to Application Server is completely trusted; therefore, client-side certificates for authentication are required.
它假设从WebSEAL到ApplicationServer的连接是完全信任的,因此,需要用于认证的客户端证书。
However, host-based authentication is only allowed between two trusted hosts. This trust is based on two criteria.
然而,基于主机的认证只是在两个受信任的主机之间被允许。
Set up WebSphere as a trusted container to handle authentication and authorization for Lotus Domino.
将WebSphere 设置为一个可信的容器,为LotusDomino处理授权和认证的功能。
DB2 has introduced trusted context authentication to permit the middle-tier to do this type of authentication.
DB 2引入了受信任上下文(trusted context)认证,以允许中间层进行这种类型的认证。
So the internal network is trusted, but only up to a point, and even on the internal network authentication and authorization are essential.
因此,内部网络固然可信,但应该有一个限度,即使是在内部网络上,身份验证和授权也很关键。
Once the authentication is complete, the receiving server will verify that the upstream server is trusted to perform identity assertion.
一旦身份验证完成,接受服务器将验证上游服务器是否受信任,可以执行标识断言。
If your application requests an explicit trusted connection, you cannot set the database server authentication type to CLIENT.
应用程序请求显式的可信连接时,不能将数据库服务器验证类型设置为CLIENT。
Notice that in the previous scenario involving client authentication, the client presents a certificate that is validated by the server against the set of trusted certificates.
请注意,在前面涉及客户端身份验证的场景中,客户端提供一个证书,然后服务器针对受信任的证书集对其进行检验。
Furthermore, the ability to switch users with minimum connection resources and without authentication, makes trusted context an ideal choice for business applications.
而且,由于可以以很少的连接资源切换用户,而不需要身份验证,受信任上下文是商业应用程序的理想选择。
All valid database users can reuse the trusted connections established by APP_USER without re-authentication.
所有有效的数据库用户都可以重用APP_USER建立的可信连接,无需重新验证。
The policy abstraction for authentication can list alternatives, such as the types of credentials that are acceptable or which credential-issuing authorities are trusted.
身份验证的策略概括可列出替代选项,如可接受的凭据类型,或所信任的凭据颁发机构。
SSL enables us to use PUTAUT (CTX) when those trusted systems are in a compatible authentication domain.
当这些受信的系统位于兼容的身份验证域中时,SSL允许我们使用PUTAUT (CTX)。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
It does the check by simply comparing the sending server's identity, after authentication, to a pre-configured list of trusted server's identities.
在进行了身份验证之后,通过将发送服务器的标识与预配置的受信任的服务器标识列表进行对比,就可以完成这项检查工作。
Once established, any valid user can use the trusted connection without re-authentication.
连接建立后,任何有效用户都可以使用该可信连接,无需重新验证。
Once established, all valid users can reuse this trusted connection without re-authentication.
连接建立后,任何有效用户都可以重用该可信连接,无需重新验证。
When using certificate authentication (client or server), you need to understand that each signer in the trust store represents a trusted provider of identity information (a certificate).
在使用证书身份验证(客户端或服务器)时,您需要理解信任存储库中的每个签署者都代表一个身份信息(证书)的受信任提供者。
The REMOTE_PASSWORD option does not need to be specified since JOE can reuse the trusted connections established by APP_USER without re-authentication.
不需要指定 REMOTE_PASSWORD选项,因为JOE可以重用 APP_USER建立的可信连接,无需重新验证。
To create a trusted network path from the Web server to the application server, you configure the application server Web container SSL configuration to use client authentication.
要创建从Web服务器到应用服务器的可信网络路径,需要配置应用服务器Web容器SSL配置以使用客户机身份验证。
Kerberos was designed based on secret key cryptography and using trusted third party authentication.
Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。
Once you have ensured that client authentication is in use, you need to ensure that only trusted Web servers can contact the Web container.
一旦确保了正在使用客户机身份验证,就需要确保只有可信的Web服务器才能联系 Web 容器。
In these cases, the Trusted target realms field must be configured for the sending server at CSIv2 outbound authentication. To test this option.
在这些情况下,必须在CSIv2出站身份验证中为发送服务器配置受信任的目标领域字段。
IBM has historically delivered strong security controls in its database solutions, including core authentication and authorization functionality, as well as advanced features such as Trusted Contexts.
IBM在其数据库解决方案中已经提供了强大的安全控制功能,包括核心身份验证和授权功能以及TrustedContexts等高级特性。
Directory Server stores user profiles and provides a trusted identity data infrastructure for authentication.
DirectoryServer存储用户概要文件并提供一个可信的身份数据基础架构来实现身份验证。
As a result, you can achieve end-to-end identity assertion in a trusted environment with or without re-authentication.
由此,您可以在可信的环境中实现端到端的身份断言(identityassertion),不一定需要重新验证。
As a result, you can achieve end-to-end identity assertion in a trusted environment with or without re-authentication.
由此,您可以在可信的环境中实现端到端的身份断言(identityassertion),不一定需要重新验证。
应用推荐