Creating a trusted host environment using SSH.
使用SSH创建一个可信的主机环境。
Finally, I mention the trusted host environment as an alternative to setting up public-private SSH key pairs.
最后,我要提一下作为一种替代方案来设置公私ssh密钥对的可信主机环境。
However, host-based authentication is only allowed between two trusted hosts. This trust is based on two criteria.
然而,基于主机的认证只是在两个受信任的主机之间被允许。
Using the following config settings, a user on a trusted host can log onto the remote machine without providing the password.
通过使用以下配置设置,可信主机上的用户就可以登录远程计算机,不需要提供密码。
A trusted host can provide information (evidence) to the runtime about assemblies that are loaded into the application domain.
受信任的主应用程序可将有关载入应用程序定义域中的组件资讯(辨识项)提供给执行阶段。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
In the trusted host name field, enter the name of the system that you wish to register as a trusted host (typically the physical server name, for instance servername).
在Trusted Hostname字段中,输入想将其注册为可信主机的系统的名称(通常指的是物理服务器名,例如servername)。
This information, called evidence, is provided by the loader or a trusted host and can include items such as the digital signature of the assembly or the Web site where it originates.
这个资讯称为辨识项,由载入器或信任的主机提供,并且可以包括例如组件的数位签章或它发源的网站等项目。
Another trusted intermediary might be a message broker that handles trust relationships between requesters and an application service host.
处理请求者和应用程序服务主机之间的信任关系的消息代理可能是另一个受信任的中介。
Because implementing fixes and updates in the distribution is owned outside of your organization, the server host should be a trusted organization.
因为在您的企业之外实现发行版补丁和更新,应该确保服务器的所有者是可信的组织。
The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
Outside the host network (Intranet or extranet) are considered not to be trusted, so the application can run on the host and external services to set targeted strong security policy.
该主机以外的网络(内部网或外部网)都认为是不可信任的,因此可以针对该主机上运行的具体应用和对外提供的服务来设定针对性很强的安全策略。
The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.
经安全性分析证明,该协议可以在可信计算环境下保证密钥交换的机密性与可靠性,同时还可以保证主机完整性与主机匿名性。
When a guest trusted his host, he would then just touch or clink the host's glass with his own.
当客人信任他的主人,他然后会接触或使与他自己的主人的玻璃叮当响。
In addition, an assembly or a trusted application domain host can provide custom evidence as a resource that is part of the assembly.
另外,程序集或受信任的应用程序域宿主还可以提供自定义证据作为程序集组成部分的资源。
In some situations, evidence that would normally be provided by a trusted application domain host is actually provided by the loader.
在某些情况下,通常由受信任的应用程序域宿主提供的证据实际上由加载程序提供。
The runtime's policy mechanism USES the evidence from both the trusted application domain host and the assembly to determine a piece of code's membership in a code group.
运行时的策略机制使用来自受信任的应用程序域宿主和程序集的证据来确定一段代码在代码组中的成员资格。
If the trusted application domain host does not have permission to provide evidence, the assembly or application domain receives the permissions that have been granted to the host.
如果受信任的应用程序域宿主没有提供证据的权限,则程序集或应用程序域会收到已授予宿主的权限。
If the digital signature is valid, the trusted application domain host passes the signature information as evidence to the runtime's policy mechanism.
如果数字签名有效,则受信任的应用程序域宿主将签名信息作为证据传递给运行时的策略机制。
Other evidence, such as an assembly's digital signature, is inherent in the code itself and can come from the loader or a trusted application domain host.
其他的辨识项(例如组件的数位签章)是程序码本身就有的,可来自载入器或受信任的应用程序定义域主机。
Some evidence, such as where the code originates, usually comes from the trusted application domain host because only the host knows this information.
有些辨识项(例如程序码来源的位置)通常来自受信任的应用程序定义域主机,因为只有主应用程序知道这项资讯。
Some evidence, such as where the code originates, usually comes from the trusted application domain host because only the host knows this information.
有些辨识项(例如程序码来源的位置)通常来自受信任的应用程序定义域主机,因为只有主应用程序知道这项资讯。
应用推荐