This is also referred as pass-through authentication.
这也称为传递身份验证。
Conceptual background for pass-through authentication.
直通身份验证的概念背景。
Pass-through authentication covers many other scenarios.
直通身份验证还涉及许多其他场景。
IBM DB2 CM provides various levels of security through authentication and authorization.
IBMDB 2CM通过身份验证和授权提供了各种级别的安全性。
If the value of this attribute is _disable_, then pass-through authentication is disabled for this entry.
如果此属性的值为_ DISABLE_,那么将对此条目禁用直通身份验证。
This is not allowed because the pass-through authentication feature does not update any value on the pass-through server.
这是因为直通身份验证功能不会更新直通服务器上的任何值。
It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.
所以,有这样的可能性:用户虽然通过了身份验证可以登录到一个系统,但是未经过授权,不准做任何事情。
In a strategy paper published last week, the EU said research was needed to make tags more secure - through authentication and encryption.
欧盟在上周发表的一份策略文件里表示,有必要通过鉴定和加密研究使标签更安全。
If pass-through authentication has to be performed for an entry, remove the userpassword attribute and leave the other attribute as they are.
如果必须对一个条目执行直通身份验证,那么删除userpassword属性并保留其他属性不变。
To resolve this secldap limitation, this article demonstrates the usage of the pass-through authentication feature in Tivoli Directory Server.
为了解决这个secldap限制,本文介绍TivoliDirectoryServer中的直通(pass -through)身份验证功能的用法。
Pass-through authentication is a mechanism which allows a client to bind to a directory server even if the user credential is not available locally.
直通身份验证机制支持客户端绑定到一个目录服务器,即使用户凭据无法在本地获得。
We just need a sample user entry in the Primary Tivoli Directory Server for the users for which the pass-through authentication has to be performed.
我们需要PrimaryTivoliDirectoryServer中的一个示例用户条目来表示必须对其执行直通身份验证的用户。
Secure integration and access to business applications and information is typically achieved through authentication, authorization, and accountability.
安全集成以及对业务应用程序和信息的访问通常是通过身份验证、授权和责任实现的。
"Emperor poultry brand" the sauce duck, duck, duck wing flax crisp, duck palm through authentication center China green food authentication, get use green food logo.
“皇禽牌”酱鸭、麻酥鸭、鸭翅、鸭掌通过中国绿色食品认证中心认证,获得绿色食品标志使用权。
How to set up and ascertain users 'status is what authentication does, while Access Control must assume the users have gone through authentication and obtained their proper status.
如何建立以及确定使用者的身份,是为“身份认证”所需负责的工作;而讨论“访问控制”,则必须假设使用者已经过认证的过程而得到正确的身份。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
Authentication of the data is provided through a combination of Smartcards and certificates.
通过结合智能卡和证书来提供数据认证。
Authentication happens through w3.
身份验证通过w3进行。
Your automated tests will all have to access the database through some form of login or user authentication.
你的自动化测试将需要通过一些注册或者使用者身份验证的形式访问数据库。
In most applications, authentication is done through a combination of a user name and password.
在大多数应用程序中,身份验证是通过用户名和密码的组合完成的。
In effect, the type cataloged at the gateway ACTS as a filter that limits what authentication types are allowed through.
实际上,编目在网关上的类型充当一个过滤器,用于限制哪些验证类型被允许通过。
All authentication tasks should be done through SQL so that external DB2 applications can manage this information either locally or remotely.
所有身份验证任务都应该通过SQL执行,这样外部DB 2应用程序就可以本地或远程地管理这些信息。
What if a hacker discovers a vulnerability in the security mechanism that allows him to break through the authentication without the need to know the required user's authentication information?
如果黑客在安全机制中发现了一个漏洞,让他可以破解身份验证,而不需要了解用户的身份验证信息,那么会怎么样?
Besides the JDBC provider, data source and JAAS authentication have also been configured through JACL scripts.
除jdbc提供程序之外,数据源和JAAS身份验证也通过jacl脚本进行配置。
Steps 1 through 6 show the authentication process, and steps 7 though 9 show the authorization process.
步骤1到6显示了身份验证流程,而步骤7到9显示了授权流程。
If it isn't then the authentication handler will be used, which runs through a number of steps and only after successful authentication will re-issue the original request for further processing.
如果没有,身份验证处理器将被使用,该处理器运行几个步骤,只有身份验证成功通过后,才会重新发出原始请求进行后续处理。
AIX security commands and applications can be configured to call PAM modules through the use of existing loadable authentication framework.
可以对AIX安全性命令和应用程序进行配置,以便通过使用现有的加载式验证框架来调用PAM模块。
The request is then forwarded to the authentication module through the SPI.
然后,通过SPI将请求转发给身份验证模块。
The request is then forwarded to the authentication module through the SPI.
然后,通过SPI将请求转发给身份验证模块。
应用推荐