• Unable to add the key for node node1. ha. lab to the trusted keys list.

    无法节点node1. ha . lab密钥添加信任的密钥列表。

    youdao

  • Unable to add the key for node node2. ha. lab to the trusted keys list.

    无法节点 node2.ha.lab密钥添加信任的密钥列表。

    youdao

  • Notice that the server does not need to have the client's key in its trust store (and vice versa) because the ca is trusted.

    注意服务器需要客户端的密钥信任存储区中(反之亦然),因为CA受信任的。

    youdao

  • The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.

    可信第三通过使用其自己签名发出证书公开密匙识别信息做证明。

    youdao

  • Another section in the key database is the trust store and it contains all of the public keys of things that are trusted by the queue manager.

    密钥数据库中的一部分信任存储区包含队列管理器信任数据的所有公钥

    youdao

  • Among the various ways of doing this, the most widely used is to have one or more trusted third parties vouch for the public key.

    实现目的方法许多种,其中常用公开密匙使用一个多个可靠第三证明

    youdao

  • When opened, you can create, modify, and delete private key and trusted certificate entries.

    打开时可以创建修改删除受信任证书

    youdao

  • Kerberos was designed based on secret key cryptography and using trusted third party authentication.

    Kerberos根据秘密密钥加密使用可信第三身份验证而设计的。

    youdao

  • All keystore entries (key and trusted certificate entries) are accessed with unique aliases.

    所有keystore(密钥信任的证书项)都是唯一别名访问的。

    youdao

  • Initialize this instance using the current trust manager (encapsulating the trusted CAs) and the key manager (encapsulating the client's credential).

    使用当前信任管理员(封装信任CA)以及密钥管理员(封装客户端的证书)初始化实例

    youdao

  • XKMS allows for easy management of public key infrastructure (PKI) by abstracting the complexity of managing the PKI from client applications to a trusted third party.

    通过管理公钥基础设施(PublicKey Infrastructure,pki)复杂性客户机应用程序提取一个可信任第三机构中,XKMS使得管理PK i变得非常容易

    youdao

  • Finally, I mention the trusted host environment as an alternative to setting up public-private SSH key pairs.

    最后要提一下作为一种替代方案设置公私ssh密钥对的可信主机环境

    youdao

  • The output is likely to continue with a message to the effect that the key is not certified with a trusted signature.

    输出结果可能继续条消息,大致意思是密钥不能被一个可信签名所认证

    youdao

  • This mechanism ensures that only the trusted party can perform the decryption of the message, being the only one owning the right private key.

    机制确保只有可以执行消息解密,而此受信方只能拥有正确方。

    youdao

  • Because our client certificate will be self-signed, we'll need to configure the client's public key certificate as a trusted signer for the server.

    因为我们客户机证书签署的,所以我们需要将客户机公钥证书配置服务器受信任签署者。

    youdao

  • In our case, because the server's certificate will be self-signed, we need to configure the server's public key certificate as a trusted signer for the client.

    我们示例中由于服务器证书签署的,我们需要服务器的公钥证书配置客户机受信任签署者。

    youdao

  • A key benefit here is that you may find potential new hires with the added benefit of personal recommendations from what may be a trusted source.

    这里一个关键好处可能发现潜在的新的雇员,并且可以获得可靠的个人建议

    youdao

  • When an SSL-protected page is requested, the browser identifies the server as a trusted entity and initiates a handshake to pass encryption key information back and forth.

    请求SSL 保护的页面时,浏览器认为服务器可信任实体,并且启用一个连接来回传递加密信息

    youdao

  • When receiving the encrypted message, the trusted party USES its private key to decrypt the session key and then USES it to decrypt the message.

    收到加密消息时,信任使用解密会话密钥然后使用解密消息。

    youdao

  • The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.

    可信主机身份验证公私ssh密钥对身份验证方法类似的很大程度上实现相同结果

    youdao

  • Authentication is provided in the form of a service ticket, issued by a trusted authentication service in the domain and encrypted with the target resource manager's secret key.

    认证是以服务令牌(service ticket)形式提供,这域中一个可信认证服务发出的,使用目标资源管理器密钥进行了加密

    youdao

  • Conversely, when the search engine key words to determine the page, the picture instead of ALT-attribute is a trusted reference point.

    反过来讲搜索引擎判断网页关键词时,图片ALT -代替属性一个可信任参考

    youdao

  • Export the client public key certificate so it can be imported into the service's store of trusted client certificates by typing the following command.

    通过键入下面命令,导出客户机公钥证书导入受信任的客户机证书服务器存储中。

    youdao

  • In the real world, the certificates are typically themselves signed by some trusted authority such as VeriSign or an internal entity so you know that the public key is legitimate.

    现实世界中,证书通常一些受信任机构(versign)或者某个内部实体进行签名,这样便可以知道公钥合法的。

    youdao

  • This paper discusses key security technologies for a smart grid system, including public key infrastructures and trusted computing.

    本文讨论一个智能电网系统关键安全技术问题,包括公钥基础设施可信计算

    youdao

  • The digital credential would be a "voluntary trusted identity" system that would be the high-tech equivalentof a physical key, a fingerprint and a photo ID card.

    数字证书可以成为一个自愿受信身份系统,从而成为物理密钥指纹以及身份证高科技等价物

    youdao

  • The digital credential would be a "voluntary trusted identity" system that would be the high-tech equivalentof a physical key, a fingerprint and a photo ID card.

    数字证书可以成为一个自愿受信身份系统,从而成为物理密钥指纹以及身份证高科技等价物

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定