Database: the database performs both identification and authentication of users.
数据库:数据库执行对用户的识别和身份验证。
It provides a unified mechanism to manage the authentication of users and implement business rules determining user access to applications and data.
它提供一个统一的机制来管理用户的身份验证,并实现业务规则来决定用户对应用程序和数据的访问。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
Besides, this system needs the different user roles who have different operation privileges. Therefore, the identity authentication of users in this system have more strict rules.
除此之外,该系统需要对于不同的用户角色有不同的操作权限,因此对身份认证有着更严格的要求。
Authentication methods seek to guarantee the identities of system users.
认证方法试图保证系统用户的身份。
Encryption is not directly related to authentication and authorization but is an important aspect of protecting data, during transit or at rest, from unauthorized users.
加密与认证和授权没有直接的关系,但是,在保护传输中的或静止的数据不受未经授权用户访问的时候,它也是一个重要的方面。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
The proxy can be extended to implement multi-factor authentication and further strengthen the authentication requirements of Internet users.
代理可以通过扩展的方式实现多重身份认证,进一步强化互联网用户的认证需求。
Software shall authenticate these credentials and upon authentication shall permit the users to access sections of the software that they have access privileges for.
软件鉴别这些证书,在鉴定通过的基础上允许用户访问那些他们有权限访问软件的功能部件。
So, for example, you can assign the task of authenticating users to an Authentication Security Service that all applications have access to and interact with.
例如,可以将用户身份验证的任务分配给AuthenticationSecurityService(所有应用程序都能够访问此服务并与之进行交互)。
Kerberos is a security authentication protocol that requires users and services to provide proof of identity.
Kerberos是需要用户和服务提供标示证明的安全性认证协议。
In Part 1, the fictional Web Apps Corp created a Web site for a client, allowing various levels of authentication for users.
在第1部分中,虚构的WebApps公司为客户创建了一个Web站点,允许不同级别的用户认证。
Although WebSphere Commerce provides a command for LDAP authentication out of the box, this command supports all types of users, and does significantly more work than is required in our case.
虽然WebSpherecommerce为ldap认证提供了现成的命令,但是这个命令支持所有用户类型,且实现的功能比我们这个案例所需的多得多。
More realistic business processes will require authentication, and human tasks will be allocated to specific users or groups of users.
更实际的业务流程将需要身份验证,并且人工任务要分配到特定的用户或用户组。
You need to provide a mechanism to support user identification and authentication that allows for the unique identification of users.
需要提供一种机制以支持用户标识和身份验证,允许用户拥有惟一的身份标识。
At this point, the administrator can create new user accounts in the authentication database, create new groups, and assign users to be members of groups.
现在,管理员可以在身份验证数据库中创建新的用户帐户、创建新的组以及把用户设置为组的成员。
We believe that the only viable strategy for authenticating users is to apply the defense in depth principle, mixing a number of authentication techniques.
我们相信用于认证用户的唯一可行的策略是以深度原则应用防御,混合多种认证技术。
The team's priorities include examining new means of authentication for users to improve security against constant threats.
该小组的研究重点包括:研究新的验证手段,提高用户安全性,应对持续不断的威胁。
For brevity, this example also omits users and sessions, formatting, and any kind of authentication and authorization.
为了尽量简洁,该例子还省略了用户和会话、格式以及各种身份验证和授权。
We assume that you will be using a test registry with users whose authentication details are not sensitive, and hence the use of plain-text passwords is acceptable.
我们假定您将与其身份验证详细信息不敏感的用户一起使用测试注册中心,因此,可以接受纯文本密码。
In this article (Part 6), you'll see how to correct all of these problems, including revamping the authentication system so that only users who have successfully logged in can see the forms.
在这篇文章中(第6部分),我将介绍如何改正所有这些问题,包括通过修补验证系统使只有成功登录的用户才能看到表单。
Many users find the requirement for a specific duration of password to be a nonburdensome addition to their authentication process.
许多用户发现密码的特定输入时间要求不会给验证过程带来太多困扰。
The presentation services of a multi-tenant hosting platform should allow for the subscribers to provide their users with a dedicated entry point for authentication accompanied with a unique branding.
多承租者承载平台的表示服务应该允许订阅者向其用户提供采用唯一品牌的专用身份验证入口点。
Single sign-on solutions can be that unified framework for security and authentication, alleviating much of the burden on users, administrators, and developers.
单点登录解决方案为安全性和身份验证提供了统一的框架,这大大减轻了用户、管理员和开发人员的负担。
As mentioned in section 2.1 to use LDAP authentication for TM1 one of the prerequisite steps is to run the ETLDAP utility to create users and groups in the TM1 database.
正如2.1节中提到的,要想让TM 1使用LDAP身份验证,必需的步骤之一是通过运行ETLDAP实用程序在TM 1数据库中创建用户和组。
The administrator may also allow additional users to be administrators of the authentication information.
管理员还可以允许其他用户管理身份验证信息。
Rather than forcing your end users to create yet another username and password combination that they will surely forget, authentication is delegated to the OpenID provider of their choice.
您的最终用户不需要创建另一个用户名和密码组合(他们肯定会遗忘),身份验证被委托给他们选择的OpenID提供商。
If users authentication is not case sensitive this must be enabled. You can also use it to force conversion of logins to lower case.
如果用户的认证是不区分大小写这必须启用。您还可以用它来迫使登录转换为小写。
Kerberos, which provides a secure means of authentication for network users, is one of the most popular authentication mechanisms.
Kerberos为网络用户提供了一种安全的身份验证手段,是最流行的身份验证机制之一。
Kerberos, which provides a secure means of authentication for network users, is one of the most popular authentication mechanisms.
Kerberos为网络用户提供了一种安全的身份验证手段,是最流行的身份验证机制之一。
应用推荐