• 本文讨论为了地理解DB 2安全插件需要知道方方面面,并讨论不同类型安全插件它们为什么如此重要以及如何使用它们

    This article discusses everything you need to know to have a good understanding of DB2 security plug-ins, the different types of security plug-ins, why they are important, and how to use them.

    youdao

  • 安全插件按每个实例实现的,因此可以创建不同实例使用不同的安全插件实现

    Security plug-ins are implemented per instance, therefore you can create different instances, and have different security plug-in implementations.

    youdao

  • 本文安全插件进行了概述首先提到了安全插件优点以及安全插件标准安全设施相比的优势。

    This article provided you with an overview of security plug-ins, starting with the benefits of security plug-ins and their advantages over standard security facilities.

    youdao

  • DB 2提供安全插件基础设施一些缺省安全插件

    DB2 provides the security plug-in infrastructure and some default security plug-ins.

    youdao

  • RM可有多种方法、插件方式其他安全模型工作。

    In many ways RM just plugs in with whatever other security model is already in place.

    youdao

  • 通过本文还可以了解安全插件一些限制使用安全插件可能遇到的一些常见问题,从而有助于实现自己的安全插件调试问题。

    You learned about restrictions on security plug-ins, and common errors encountered while working with them to help you debug problems when implementing security plug-ins on your own.

    youdao

  • 开发安全插件时,需要实现DB 2udb调用标准身份验证函数

    When you develop a security plug-in, you will need to implement the standard authentication functions that DB2 UDB invokes.

    youdao

  • 系列第2部分主要关注DB 2安全插件是实现DB 2安全方法

    Part 2 of this series focuses on DB2 security plug-ins, the new method that implements DB2 security.

    youdao

  • 然后将描述如何通过使用新的具有可定制DB 2UDB安全插件GSS - API安全机制实现基于公钥技术身份验证

    It then describes how you can achieve authentication based on public key technology, using the new GSS-API security mechanisms with the customizable DB2 UDB security plug-ins.

    youdao

  • 如果没有明确配置安全插件,则使用默认安全插件

    If a security plug-in has not been explicitly configured, the default plug-in is used.

    youdao

  • 为了允许定制DB2UDB身份验证行为,DB2 UDB 提供了可用修改现有插件构建新的安全插件API

    To enable you to customize DB2 UDB authentication behavior, DB2 UDB has exposed APIs that you can use to modify existing plug-ins or build new security plug-ins.

    youdao

  • 用于身份验证DB 2UDB安全插件

    DB2 UDB security plug-in for authentication.

    youdao

  • 操作系统确认bob/bobpsw组合是否有效,把信息返回安全插件

    The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.

    youdao

  • 注意JCC客户机支持定制的基于用户ID/密码安全身份验证插件定制的查找安全插件

    Note that the JCC client does not support customized user ID/password-based security plug-ins for authentication or customized group lookup security plug-ins.

    youdao

  • 如果不想使用缺省插件那么可以编写自己安全插件,也可以第三供应商购买安全插件

    If you don't want to use the default plug-ins, you can either write your own security plug-ins, or buy them from a third-party vendor.

    youdao

  • 现在知道如何使用安全插件loader测试定制安全插件loader可以下载部分中找到

    You should now understand how to use the security plug-in loader, which is found in the Download section, to test customized security plug-ins.

    youdao

  • 安全插件文件包括插件中。

    Include the security plug-in header files in your plug-in.

    youdao

  • 步骤1:将安全插件文件包括插件中。

    Step 1: Include the security plug-in header files in your plug-in.

    youdao

  • 注意DB 2UD b手册详细描述如何开发安全插件并解释安全插件api

    Note: the DB2 manuals have a section that describes in detail how to develop security plug-ins, as well as explanations of the security plug-in APIs.

    youdao

  • 插件历来网络恶意软件攻击主要对象——尤其是AdobeFlashAcrobat插件安全问题人诟病已久。

    Plug-ins have historically been a major attack vector for Internet malwareparticularly Adobe's Flash and Acrobat plug-ins, which are notoriously insecure.

    youdao

  • 基于前文所述安全插件职责建议安全插件至少进行下面测试

    Based on the duties of the security plug-in that was described in the previous section, it is suggested that the security plug-in should go through the following testing at a minimum.

    youdao

  • 此外Windows7需要安全软件插件必须频繁更新

    Also, Windows 7 still requires add-on security software that has to be frequently updated.

    youdao

  • 组成员查找安全插件(即插件)。

    Group membership lookup security plug-in (group plug-in).

    youdao

  • 编写支持SPKM/LIPKEY安全机制定制GSS-API 安全插件

    Write customized GSS-API security plug-ins that will support SPKM/LIPKEY security mechanisms.

    youdao

  • 如果运行最新插件计算机容易安全攻击因为插件没有最新安全补丁

    Your computer iseven more vulnerable to security attacks if you're running plug-ins that aren'tup to date, because out-of-date plug-ins don't contain the latest securityfixes.

    youdao

  • 本文描述如何设计开发一种特定类型安全插件这种安全插件使用DB2数据库存储身份验证信息

    This article describes the design and development process of a specific type of security plug-in, one that uses a DB2 database to store authentication information.

    youdao

  • 系列第10部分描述了如何部署定制安全插件

    Part 10 of this series described how customized security plug-ins can be deployed.

    youdao

  • 这样确保定制安全插件正确登录用户凭证返回DB2

    This ensures the right login user credential is returned by the customized security plug-in to DB2.

    youdao

  • 本文提供了一些安全插件程序示例展示如何逐步实现它们

    It also includes sample security plug-in programs, and shows you how to implement them step by step.

    youdao

  • 2展示安全插件所提供灵活性可扩展性

    Figure 2 shows the flexibility and extensibility provided by using security plug-ins.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定