• Creating a trusted host environment using SSH.

    使用SSH创建一个可信主机环境

    youdao

  • Finally, I mention the trusted host environment as an alternative to setting up public-private SSH key pairs.

    最后要提一下作为一种替代方案设置公私ssh密钥对的可信主机环境

    youdao

  • However, host-based authentication is only allowed between two trusted hosts. This trust is based on two criteria.

    然而基于主机认证只是两个受信任主机之间被允许

    youdao

  • Using the following config settings, a user on a trusted host can log onto the remote machine without providing the password.

    通过使用以下配置设置可信主机用户就可以登录远程计算机需要提供密码

    youdao

  • A trusted host can provide information (evidence) to the runtime about assemblies that are loaded into the application domain.

    信任的应用程序有关载入应用程序定义域中的组件资讯(辨识项)提供执行阶段。

    youdao

  • Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.

    可信主机用户希望登录远程计算机(可以可信系统)时,使用SSH基于主机身份验证

    youdao

  • In the trusted host name field, enter the name of the system that you wish to register as a trusted host (typically the physical server name, for instance servername).

    Trusted Hostname字段中输入其注册可信主机系统名称(通常指的是物理服务器例如servername)。

    youdao

  • This information, called evidence, is provided by the loader or a trusted host and can include items such as the digital signature of the assembly or the Web site where it originates.

    这个资讯称为辨识载入器信任主机提供并且可以包括例如组件数位签章发源网站等项目。

    youdao

  • Another trusted intermediary might be a message broker that handles trust relationships between requesters and an application service host.

    处理请求者应用程序服务主机之间信任关系消息代理可能一个信任中介

    youdao

  • Because implementing fixes and updates in the distribution is owned outside of your organization, the server host should be a trusted organization.

    因为企业之外实现发行版补丁更新应该确保服务器所有者可信组织

    youdao

  • The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.

    可信主机身份验证公私ssh密钥对身份验证方法类似的很大程度上实现相同结果

    youdao

  • Outside the host network (Intranet or extranet) are considered not to be trusted, so the application can run on the host and external services to set targeted strong security policy.

    主机以外网络(内部网外部网)认为是不可信任的,因此可以针对该主机运行具体应用对外提供的服务设定针对性很强的安全策略。

    youdao

  • The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.

    安全性分析证明协议可以可信计算环境保证密钥交换机密性可靠性,同时还可以保证主机完整性与主机匿名性

    youdao

  • When a guest trusted his host, he would then just touch or clink the host's glass with his own.

    客人信任主人然后接触使自己主人玻璃叮当响。

    youdao

  • In addition, an assembly or a trusted application domain host can provide custom evidence as a resource that is part of the assembly.

    另外,程序信任应用程序宿主还可以提供自定义证据作为程序集组成部分资源

    youdao

  • In some situations, evidence that would normally be provided by a trusted application domain host is actually provided by the loader.

    某些情况下通常信任的应用程序宿主提供证据实际上由加载程序提供。

    youdao

  • The runtime's policy mechanism USES the evidence from both the trusted application domain host and the assembly to determine a piece of code's membership in a code group.

    运行时策略机制使用来自信任的应用程序宿主程序证据确定代码在代码组中的成员资格。

    youdao

  • If the trusted application domain host does not have permission to provide evidence, the assembly or application domain receives the permissions that have been granted to the host.

    如果信任的应用程序宿主没有提供证据权限,则程序集应用程序域会收到授予宿主的权限。

    youdao

  • If the digital signature is valid, the trusted application domain host passes the signature information as evidence to the runtime's policy mechanism.

    如果数字签名有效受信任的应用程序宿主将签名信息作为证据传递运行时策略机制。

    youdao

  • Other evidence, such as an assembly's digital signature, is inherent in the code itself and can come from the loader or a trusted application domain host.

    其他辨识项(例如组件数位签章)程序本身就有的,来自载入信任的应用程序定义域主机。

    youdao

  • Some evidence, such as where the code originates, usually comes from the trusted application domain host because only the host knows this information.

    有些辨识项(例如程序来源位置)通常来自信任的应用程序定义域主机因为只有应用程序知道这项资讯。

    youdao

  • Some evidence, such as where the code originates, usually comes from the trusted application domain host because only the host knows this information.

    有些辨识项(例如程序来源位置)通常来自信任的应用程序定义域主机因为只有应用程序知道这项资讯。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定