这是需要它,使私人密码匙为客户端和公共密钥服务器。
It is needed for it to make private key for client and public key for server.
密钥服务器为你保存你的公钥,以便你的朋友可以解开你的信息。
Key servers store your public keys for you so that your friends can decrypt your messages.
在所述实施例中,密钥管理器24被保持在与存储驱动器2分离的密钥服务器22上。
In described embodiments, the key manager 24 was maintained on a key server 22 separate from the storage drive 2.
我将哈希(?)用户的位置与该键后,客户端,然后使用相同的密钥服务器恢复数据。
I would then hash (?) the users location with that key client side, post that, and then use the same key server side to restore the data.
除了Samba服务器之外,有些人发布的假 Samba包可能会破坏这个密钥服务器。
Somebody distributing a fake Samba package would then need to compromise this key server in addition to the Samba server.
如果你不选择使用密钥服务器,你也可以手动发送你的公钥,将它包括在你的签名文件中,或将它放入你的个人主页。
If you choose not to use a key server, you can manually send your public key, include it in your signature file, or put it on your own Web page.
现在,您的应用服务器密钥和信任文件的所有证书都已处于正确的位置。
All the certificates are now in the right places for your application server key and trust files.
将加密的会话密钥发送给服务器。
我们还有一个问题:如何防止出现以正文文本格式将密钥从LDAP服务器发送到 LDAP客户机上的情况。
You have a problem of how to avoid initially sending the single secure key from the LDAP server to the LDAP client in plain text.
在标识断言场景中,这些服务器并不使用LTPA密钥来建立信任关系。
In the identity assertion scenario, the servers are not using LTPA keys to establish trust.
为了让SSO正常工作,所有服务器必须同意密钥、用户信息和各种其他配置数据。
For SSO to function properly, all servers must agree on cryptographic keys, user information, and miscellaneous other configuration data.
做到这一点的最简单方式是使用来自内容服务器的配置密钥文件。
The simplest way to do this is to use the key file from your content server's configuration.
为服务器创建密钥数据库并生成一个CSR。
为服务器创建密钥数据库并生成相应的证书。
Create a key database for the server and generate the corresponding certificate.
目标服务器将使用此会话密钥来确认客户端的身份。
This session key will be used by the target server to confirm the identity of the client.
很可能需要将用于LDAP服务器证书的签名密钥(证书)放在信任存储库中。
You'll most likely need to place the signing key for the LDAP server's certificate into the trust store.
在此身份验证信息交换过程中生成的会话密钥可用于客户端/服务器与KDC之间的所有未来通信。
The session keys generated during this authentication exchange can be used for all the future correspondences among client/server and KDC.
客户端保留会话密钥,将票证按原样转发给服务器。
The client retains the session key and forward the ticket to the server as it is.
既然已经创建了密钥存储,我们将为服务器和客户机配置安全性。
Now that the key stores are in place, we'll configure the security for the service and clients.
对于SHARED _ PUSH _ PULL,只有对象的唯一密钥发送到所有其他服务器;而对象本身保留在创建它的本地缓存实例。
In the case of SHARED_PUSH_PULL, only the unique key of the object is sent to all other servers; the object itself remains in the local cache instance where it was created.
密钥存储库是存储服务器证书和密钥对的文件。
The keystore is the file in which the server's certificate and keypair are stored.
加密密钥用于加密nas和RADIUS服务器之间的数据传输。
The encryption key is used to encrypt the data transfer between the NAS and the RADIUS server.
将浮点许可密钥导入工作台服务器。
在这个例子中,许可密钥被导入到许可服务器之中,它位于工作台机器上,并且将密钥提供给所有的远程机器。
In this example, the license key is imported into the license server, which resides on the workbench machine and serves the key to all remote machines.
这是存储公开密钥的一种主要方式,在不能物理访问服务器的时候是不能获取到这些密钥的。
This is a great option for storing a public key that is difficult to retrieve without physical access to the server.
如果服务器初始化到部署管理器的连接,则服务器需要拥有对应于部署管理器个人密钥的签名者(它们事先已拥有)。
If the servers initiate connections to the deployment manager then the servers need to have the signer that corresponds to the deployment manager personal key (which they already have).
对于双向ssl,我们需要客户机密钥和服务器密钥。
接收进入服务器密钥数据库的服务器证书。
Receive the server certificate into the server's key database.
在创建客户机信任存储之前,必须已经使用上面服务器部分中的命令创建服务器密钥存储并导出服务器公钥证书。
You must have already created the server key store and exported the server's public key certificate using the commands in the server section above before creating the client trust store.
身份验证服务器使用目标服务器的一个密码密钥将票据提供给客户端。
A ticket is provided by an authentication server to the client using a cryptographic key of the intended server.
应用推荐