It accepts requests from any host without authentication.
它会在不进行身份验证的情况下接受来自任何主机的请求。
The ability to switch the connection user to a different user ID with or without authentication.
将连接用户切换为不同用户的能力,不一定需要验证。
Of course that doesn't mean much without authentication where you supply a proof that shows that you really are who you claim you are.
当然,如果没有认证,这就没有太多的意义。通过认证,您提供一个证明,表示您的确就是所声称的那个人。
You can switch the user to usr2 without providing authentication information, because usr2 is defined as a user of TCX1 without authentication.
您可以从用户切换到usr2,无需提供身份验证信息,因为 usr2 被定义为 TCX1 无需身份验证的用户。
You can run all the setmqaut commands you want, but without authentication the only people bound by them are the honest people that you don't need to worry about.
您可以运行您希望的所有setmqaut命令,但是如果没有身份验证,这些命令只能约束那些不需要担心的最诚实的人。
The system encrypts the sensitivity information in database so that there is no access without authentication in order to ensure the security access of the system.
通过调用存储过程对安全数据库进行操作,进而实现系统的安全访问。对数据库表内的敏感信息进行加密存储,未经授权不能访问。
Furthermore, the ability to switch users with minimum connection resources and without authentication, makes trusted context an ideal choice for business applications.
而且,由于可以以很少的连接资源切换用户,而不需要身份验证,受信任上下文是商业应用程序的理想选择。
Spreadsheet feeds, such as worksheet, list, and cell feeds, might even be accessed without authentication, depending on the security settings of the corresponding spreadsheet.
根据相应的电子表格的安全设置,也可以在未进行身份验证的情况下访问电子表格提要,如工作表、列表、单元格提要。
If you chose external authentication source in the previous step, you can get by without additional users.
如果在上一步您选择的是外部认证源,那么不需要有另外的用户就可以继续进行。
Without the physical token, the argument goes, authentication should not be possible.
如果没有物理标记,勿庸质疑,就不可能进行认证。
With the PAM framework, multiple authentication technologies can be added without changing any of the login services, thereby preserving existing system environments.
通过使用pam框架,可以添加多种认证技术,而不必更改任何登录服务,从而可以保留已有的系统环境。
Without SSO, the user's authentication is now lost and those authorization will fail.
没有SSO,用户的认证将丢失并且这些认证将失败。
Subsequent calls to the service get the security of password authentication without actually having to incur the overhead of a database connection or corporate LDAP directory lookup.
对这个服务的后继调用可以获得密码认证的安全性,而实际上不一定会导致数据库连接或公司LDAP目录查找的开销。
Users may select encryption without specifying authentication, but this action leaves the packets vulnerable to active attacks, which can lead to an outside entity breaking the encryption.
用户可以选择不用特定的认证进行加密,但是这样会让包容易受到攻击,导致让别人破坏加密。
Finally, if you want the best authentication without regard for CPU resources, use sha1, as it's the hardest to crack.
最后,如果您想要得到最好的认证,而不考虑CPU资源的使用,那么请使用sha1,因为它最难破解。
Catalog database dbase1 (without specifying authentication, or specifying authentication as server_encrypt).
编目数据库dbase1(不指定身份验证,或指定server_encrypt身份验证)。
Catalog database dbase3 (without specifying authentication, or specifying authentication as gssplugin).
编目dbase3(不指定身份验证,或指定gssplugin身份验证)。
Catalog database dbase2 (without specifying authentication, or specifying authentication as kerberos).
编目dbase2(不指定身份验证,或指定kerberos身份验证)。
This approach allows the authentication architecture of a system to be modified and enhanced as needed without requiring the system to be rebuilt or modified internally.
这一方法允许系统的身份认证架构根据需要进行修改和完善,并不用对系统的身份认证架构进行内部重建或修改。
What if a hacker discovers a vulnerability in the security mechanism that allows him to break through the authentication without the need to know the required user's authentication information?
如果黑客在安全机制中发现了一个漏洞,让他可以破解身份验证,而不需要了解用户的身份验证信息,那么会怎么样?
When prompted, they broadcast their unique identifier in plain text, without any form of encryption or authentication, to anyone who is listening.
一启动,芯片身份证就会把独有的身份信息以纯文本格式播放出来,没有任何形式的加密或验证,任何人都会听到。
In particular, you must take steps to prevent unauthorized clients or impostors from sending events or from triggering the billing process without the right authentication or permission.
尤其是,必须采取措施防止没有经过身份验证或授权的客户或冒名顶替者发送事件或触发账单流程。
And, of course, authorization is of little value without robust authentication.
当然,如果没有可靠的身份验证,授权也就失去了价值。
This method even allows you to modify the authentication rules on the fly, because all PAM-aware programs start applying the new rules without the need for any changes in their code.
这种方法还允许方便地修改身份验证规则,所有感知PAM 的程序都会自动地应用新规则,不需要修改它们的代码。
If this executes without exceptions, then authentication is successful.
如果执行过程没有异常,身份验证就成功了。
SAML provides a mechanism for transferring assertions about authentication of entities between various cooperating entities without forcing them to lose ownership of the information.
SAML为在相互协作的各个不同实体之间传输关于实体认证的断言提供了一种机制,这样就不必迫使这些实体失去对信息的所有权。
If the user loses the certificate or the certificate is stolen, hackers can access this information without being challenged for authentication.
如果用户的证书丢失或被盗,黑客就能够访问信息而不用经过身份验证。
A simple hash, as sometimes used in HTTP Basic authentication, is subject to replay attacks because one can easily sniff the traffic and replay the hash without knowing the password.
简单的哈希(例如有时在HTTP基本身份验证中使用的哈希)易受到回复攻击的威胁,因为攻击者可以很容易地探查到通信并能够在不知道密码的情况下回复哈希。
It allows both unilateral and mutual authentication to be accomplished without the use of secure timestamps.
它不需使用安全时间戳即可完成单向和双向身份验证。
All valid database users can reuse the trusted connections established by APP_USER without re-authentication.
所有有效的数据库用户都可以重用APP_USER建立的可信连接,无需重新验证。
应用推荐