You will need your X.509 certificate files and your access keys.
您将需要您的X . 509证书文件和您的访问密匙。
Each X.509 certificate published by the primary server has an expiration date.
由主服务器发布的每个X . 509证书都有一个有效期。
With the entire message now in the open, the X.509 certificate passed in the SOAP header can be accessed to retrieve its public key.
现在,通过公开的整个消息,就可以访问在soap头中传送的X . 509证书来检索它的公钥。
After the entire message is in the open, the X.509 certificate passed in the SOAP header can be accessed to retrieve its public key.
在整个消息公开以后,就可以访问SOAP报头中传送的X . 509证书,以便检索它的公钥。
Once the message has been signed, the X.509 certificate itself is included in the SOAP header as a binary security token.
一旦消息被签名,X . 509证书本身就作为二进制安全性令牌包含进soap头了。
With the SPKM security mechanism, the DB2 UDB client and the DB2 UDB server are authenticated on the basis of the X.509 certificate they possess.
对于SPKM安全机制,DB2UDB客户机和 DB2 UDB服务器是基于其所持有的 X.509证书来完成身份验证的。
For example, an X.509 certificate that's bound to an XKMS key is destroyed when this operation is called.
例如,当调用这个操作时,绑定到一个XKMS密钥的X . 509凭证将被销毁。
In fact, a standard X.509 certificate contains much more identity information and includes, among other things, the DN of the ca that issued the certificate.
事实上,标准x . 509证书包含更多的标识信息,其中包括颁发证书的证书颁发机构的DN。
Notice that the client is not required to have any X.509 certificate, but may need to have a PKI environment in order to validate the server's X.509 certificate.
注意,客户机不需要具有任何X . 509证书,但是可能需要具有PK I环境,以确认服务器的X . 509证书。
A familiar example of a signed security token is an X.509 certificate; it asserts a binding between one's identity and a public key.
证书就是一个熟悉的已签名安全令牌例子;它断言某人的身份和公钥之间的绑定关系。
Decrypting the message with the private key of their X.509 certificate.
使用它们的X . 509证书的私钥来解密消息。
Signing the message with the private key of their X.509 certificate.
使用它们的X . 509证书的私钥来签署消息。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
The Service Provider's SOAP runtime digitally signs the message using the private key of its own X.509 certificate.
服务提供者(Service Provider)的SOAP运行时使用它自己的X . 509证书的私钥对消息进行数字签名。
In Listing 1, -genkey indicates a public and private key pair entry, as well as an X.509 v1 self-signed, single-element certificate chain that includes the generated public key.
在清单1中,- genkey表示一个公共、私有密钥对项,以及一个X . 509v 1自签署的单个元素证书链,其中包含生成的公共密钥。
To address this need, WS-Security was set up to provide the Consuming Application's X.509 certificate as a binary security token within web services requests.
为了满足这个需求,设置Web服务安全性(WS-Security)来提供消费应用程序(Consuming Application)的 X.509证书作为 Web 服务请求中的二进制安全性令牌。
Encrypting the message with the public key of the receiver's X.509 certificate to ensure that only they can access the message content.
使用接收方的X . 509证书的公钥来加密消息,以便确保只有它们才能访问消息内容。
The signature is performed using the private key of the Consuming Application's X.509 certificate.
签名是利用消费应用程序(Consuming Application)的X . 509证书的私钥来执行的。
A common practice is to use the private key of the sender's X.509 certificate to digitally sign the SOAP body of a web service request.
一个常用的实践方法是使用发送方的X . 509证书的私钥对Web服务请求的SOAPBody进行数字签名。
STEP 2: Generating X.509 certificate signing request [server.csr].
步骤2:生成x . 509证签名请求[server . csr]。
STEP 3: Generating X.509 certificate signed by Snake Oil CA [server.crt]
步骤3:生成SnakeOilCA签署的 X.509证书 [server.crt]
On the DB2 UDB server: an X.509 certificate, a PKI environment, and a LIPKEY-enabled server-side GSS-API security plug-in.
在DB2UDB服务器中:一张 X.509证书,一个PKI环境,以及一个支持 LIPKEY 的服务器端GSS-API安全插件。
To put this process in place, let's start with Ellie and use the Domino 6 ca process to create an X.509 certificate for her.
为实现这个过程,我们首先从Ellie开始,使用Domino6CA进程为她创建一个X . 509证书。
In the command, filename is the X.509 certificate file name under the directory as shown in the list above.
在这个命令中,filename是上面列出的目录下的X . 509证书的文件名。
To delete the FS agent's X.509 certificate.
删除FS代理的X . 509证书。
Registration authority (ra) authentication: the X.509 certificate of the ra and private key of the ra are used.
注册中心(registrationauthority,ra)认证:使用ra的X . 509证书和ra的私钥。
A more complex example is one that USES an X.509 certificate issued from a trusted certificate Authority (such as Verisign).
一个更复杂的例子是,使用由信任的认证机构(Certificate Authority)(比如verisign)签发的X . 509证书。
The structure of an X.509 v3 digital certificate is as follows
v3数字证书的结构如下
You can use an X.509 certificate to provide client side authentication for the WAP proxy's SSL communications.
证书可以对SSL通信提供验证。
Each party imported the other's X.509 certificate into their keystores, so that if a request or response is not signed with a known certificate in their keystore, the message is rejected.
每一方都将另一方的X . 509证书导入到它们的keystore中,因此,如果请求或响应不是用它们的keystore中已知的证书签名的,这个消息就将被拒绝。
应用推荐