The Design and Implementation of user authentication System based on digital certification;
身份认证服务器提供口令认证和数字证书认证两种方式。
SFGACS includes four parts: SOAP protocol system, user authentication system, certificate system and authorization filtrating system.
SFGACS包括SOAP协议系统、用户认证系统、证书系统和授权过滤系统等四个部分。
The system login uses information such as source ID (SID), domain and system user name for authentication, so it is considered secure.
系统登录会使用到诸如源ID(安全识别符),域和系统用户名等信息进行身份验证,因此被认为是安全的。
Authentication information is registered with the federated system as user mappings.
身份验证信息以用户映射的形式向联邦系统注册。
It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.
所以,有这样的可能性:用户虽然通过了身份验证可以登录到一个系统,但是未经过授权,不准做任何事情。
You can select or omit specific software, determine the file system layout, choose user ID authentication methods, and even set the root user's password.
可以选择或省略特定的软件、决定文件系统布局、选择用户ID身份验证方法,甚至设置根用户的密码。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
Ideally, the external user should not have to reregister or even be aware that a new system was managing the authentication behind the scenes.
理想情况下,外部用户不应必须注册,甚至不应注意到是新系统在后台管理身份验证。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
By default, global security USES the local operating system user registry for authentication.
默认情况下,全局安全性使用本地操作系统用户注册表进行身份验证。
For example, a content Management System (CMS) may be distributed over many smaller modules like user authentication, presentation, content parsing, and viewing statistics.
例如,一个内容管理系统(Content Management System,CMS)可能分布在许多诸如用户认证、显示、内容解析和查看统计信息等较小的模块上。
In a complete authentication system, you still need to write a policy decision point to decide if a user may access a Web page.
在完整的认证系统中,您仍需要编写策略决策点,以确定用户是否可以访问web页面。
Although the MDM Server entrusts end user authentication to the system user, it is necessary for it to know the identity of the end user in order to provision transactional and data authorization.
虽然MDMServer将终端用户认证委托给系统用户,但是它必须知道终端用户的身份,以提供事务性授权和数据授权。
With the system login setting enabled, the Rational DOORS user authentication confirms that the user is the same one as the user logged into the operating system.
支持系统登录设置之后,RationalDOORS用户认证会确认,使用的用户与登录到操作系统之上的用户是同一个人。
The Subject class is used to represent an authenticated user in a given system (that is, a populated Subject is the outcome of the JAAS authentication process).
subject类用于表示在给定系统中认证的用户(即填充的Subject是JAAS认证过程的结果)。
When using Local OS for any operating system as the user registry, WebSphere Application Server makes native OS calls for authentication to the underlying user registry.
在任何操作系统上,如果用户注册表保存在本地,WebSphereApplicationServer就需要执行本地操作系统调用,用于对底层用户注册表进行认证。
When the user attempts to log into the client system, the PAM authentication service gets the username, in our example ldapuser, from the user.
当用户试图登录客户机系统时,PAM身份验证服务就会从用户那里获取用户名,在我们的例子中是ldapuser。
The system administrator runs the newkey command for each user to generate unique public and secret keys for the user who wants to use DES authentication.
系统管理员为每个用户运行newkey命令,以便为希望使用DES身份验证的用户生成唯一的公钥和机密密钥。
Given the facts above, the MDM Server trusts the system user to perform adequate authentication and credential validation.
基于以上事实,MDMServer信任系统用户执行适当的身份验证和凭证验证。
In DB2 UDB, user and group authentication is managed in a facility external to DB2 UDB, such as the operating system, a domain controller, or a Kerberos security system, in the form of a plug-in.
在DB 2UD b中,用户和组身份验证由DB 2UDB的外部设备以插件的形式来管理,如操作系统、域控制器或者Kerberos安全系统。
Informix integrates operating system security functions for user authentication and network permissions.
Informix集成了操作系统安全性功能来对用户进行身份验证和管理网络权限。
This feature allows an authentication provider to request additional information from either the user or the system.
这个特性让身份验证提供者能够向用户或系统请求更多信息。
For example, if DB2 is configured with an operating-system-based authentication mechanism, users need valid operating system user IDs and passwords.
例如,如果DB 2使用一个基于操作系统的验证机制配置,则用户需要验证操作系统用户ID和密码。
Using the credential vault alleviates the user from being challenged for authentication to each separate system from which the portal aggregates data.
使用凭据库免除了用户必须向各个系统(门户从其收集数据)进行验证。
User and group authentication is managed in a facility external to DB2, such as the operating system, a domain controller, or a Kerberos security system.
用户和组的身份验证是在DB 2外部的一个设施中,例如操作系统、域控制器或Kerberos安全系统中进行管理的。
Can increase the application system, time, IP address, user name and other factors of authentication and authorization management.
可以增加对应用系统、时间、IP地址、用户名等多种因子的身份认证和授权管理。
User and group authentication is managed in a facility external to DB2 UDB, such as the operating system, a domain controller, or a Kerberos security system.
用户和组身份验证由DB 2udb外部的设施管理,比如操作系统、域控制器或者Kerberos安全系统。
This cookie or header is then passed onto that system (and sometimes several other systems), and the user is no longer prompted for authentication.
然后将此cookie和header传递到将要登录的系统中(有时是其他几个系统),系统不会再提示用户进行身份验证。
That's right, user corresponds to the standard domain authentication system.
就是这样,user对应于标准域身份验证系统。
That's right, user corresponds to the standard domain authentication system.
就是这样,user对应于标准域身份验证系统。
应用推荐