• DCE implements three network services effectively. These are.

    DCE有效地实现了三种网络服务它们

    youdao

  • If you obey these rules, Benchmark should completely prevent DCE.

    如果遵守这些规则Benchmark应该会完全防止DCE

    youdao

  • ADFS now USES SARPC for communication instead of the DCE RPC.

    ADFS现在使用SARPC进行通信使用DCERPC

    youdao

  • Encina relies on DCE security services for authorization checking.

    Encina依赖DCE安全服务进行授权检查

    youdao

  • Requires the user to enter their DCE user name and DCE password.

    需要用户输入他们DCE用户dce密码

    youdao

  • The idea behind PLAM cropped up as part of a DCE-replacement strategy.

    PLAM背后思想就是dce替换策略一部分

    youdao

  • DCE Glossary: Learn about the different technical terms being used in DCE.

    dce术语了解DCE使用不同技术术语

    youdao

  • From Session 1, the user sends a resource request to the DCE application server.

    会话1中用户发送一个DCE应用服务器资源请求

    youdao

  • A user must log in to the DCE account to enjoy the services provided by DCE.

    用户必须登录DCE帐户才能使用DCE提供服务

    youdao

  • First of all, a user must log in to DCE to enjoy the services provided by DCE.

    首先用户必须登录DCE,以使用DCE提供服务

    youdao

  • This typical scenario is used when customers want to migrate from DCE/DFS to NFS V4.

    这种典型场景常常用于客户希望DCE/DFS迁移NFS V4 时。

    youdao

  • Migration of legacy systems (like DCE) and transferring authentication data to IBM NAS.

    迁移遗留系统(比如dce)身份验证数据传递IBMNAS

    youdao

  • Authentication flag: this flag shows whether this PAC was authenticated by DCE security.

    身份验证标志标志显示PAC是否经过了DCE安全机制的身份验证

    youdao

  • The DCE authentication service is the key distribution service in the Kerberos model.

    DCE身份验证服务Kerberos模型中的密钥分发服务。

    youdao

  • To know what DCE security level and delegation constants are available, refer to Appendix a.

    参阅附录a了解dce安全级别授权常量

    youdao

  • As with EJB, CORBA, and DCE, the core abstraction for Web services is a remote procedure call.

    就像EJBCORBADCE一样Web服务核心抽象也是远程过程调用

    youdao

  • The user then passes the certificate to the server which is hosting the DCE service required by the user.

    用户然后凭证传送给承载用户所需DCE服务服务器

    youdao

  • Using this authentication service with DCE, RPC provides data availability and data privacy to users.

    DCE使用身份验证服务RPC能够用户提供数据可用性保证数据隐私保障

    youdao

  • Use these methods to set/get DCE security level used between DE-Light gateway and Encina/DCE servers.

    使用这些方法设置(或获得用于 DE-Light网关Encina/DCE服务器之间DCE安全级别

    youdao

  • Use these methods to set/get DCE Delegation type used between DE-Light gateway and Encina/DCE servers.

    使用这些方法设置(或获得)DE-Light网关Encina/DCE服务器中使用的 DCEDelegation类型

    youdao

  • Use this method to set the user name (DCE credentials) that is used for RPC calls to Encina/DCE servers.

    使用方法设置用户名称DCE凭证),用于Encina/DCE服务器RPC调用

    youdao

  • DELConnConnectionSpec specifies DCE authentication data and default parameters for RPCs issued on a connection.

    DELConnConnectionSpec指定了DCE身份验证数据用于连接中发出RPC缺省参数

    youdao

  • DCE provides a secure communication channel between a client and a server through an authenticated RPC mechanism.

    DCE通过认证RPC机制在客户机服务器之间提供了安全通信通道

    youdao

  • Thereafter, whenever the user wants to access any DCE service, it asks the security server for a security certificate.

    在这之后只要用户希望访问任何DCE服务它就安全服务器获取一个安全证书

    youdao

  • This similarity is a result of the fact that DCE authentication service was built upon the source code for Kerberos V5.

    这种相似性源于这样一个事实DCE身份验证服务建立KerberosV5源代码之上。

    youdao

  • This ID could be in the DCE UUID format (which COM programmers are familiar with) or in a local format that you specify.

    这个标识可以DCEuuid格式(COM程序员比较熟悉它)或者指定本地格式。

    youdao

  • Together with these three services in place, DCE enforces a very effective security mechanism in distributed environment.

    三种服务结合DCE分布式环境实现了一种非常有效安全机制

    youdao

  • Other information like DCE security level and transaction timeout can also be specified using this class. For example.

    其它信息(dce安全级别事务超时)通过使用该类指定

    youdao

  • We started with a note on the importance of security in a distributed environment and an overview of DCE security model.

    我们首先强调安全性分布式环境重要性概述DCE安全模型

    youdao

  • Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.

    一旦安全服务器通过秘密密钥确认了用户身份,用户登录DCE过程完成了

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定