Comparing host-based authentication to public key-based authentication.
比较基于主机的认证和基于公钥的认证。
Unless your API is a free, read-only public API, don't use single key-based authentication.
除非你的API是一个免费的,只读的公开api,否则不要使用单一的基于密钥的验证。
At this point, ssh public key-based authentication is now complete, and you can proceed to " DB2 configuration."
至此,ssh 基于公钥的认证已经完成,现在可以进入“DB2配置”。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
S/MIME encryption also uses a key-based approach, but it has some significant advantages in convenience and security.
MIME加密也使用基于密钥的方式,但它在便利和安全上有着一些优势。
The SSH daemon does not allow key-based authentication if the home directory if people other than the user can write to it.
如果除应用程序用户以外还有人能够修改home目录,那么SSH守护进程就不支持基于密钥的认证。
No SSH server configuration is necessary, since, by default, SSH will attempt to use public key-based authentication before password based authentication.
这里不需要ssh服务器配置,因为在默认情况下,在基于密码的认证之前,ssh将尝试使用基于公钥的认证。
Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).
而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问)。
As of today, the only security mechanism supported by most of the GSS-API offerings is the popular symmetric key-based mechanism called Kerberos [IETF RFC-1964].
到目前为止,大部分GSS - API产品所支持的惟一的安全机制就是名为kerberos [ietfRFC - 1964]的流行的基于对称密钥的机制。
Based on the findings, the researchers suggest that the key to boosting your willpower is to believe that you have an abundant supply of it.
基于这些发现,研究人员认为增强意志力的关键在于相信自己有充足的意志力。
Here are some others key tips based on my own speaking experience and what I've noticed in other good speakers.
这是其它一些关键技巧,根据我自己的演讲经验以及从其他优秀演讲者身上发现的总结的。
The lifecycle of what we call "BPM Enabled by SOA" is to iteratively model, deploy and monitor, and BPMN provides a key standards based technology for the entire lifecycle.
我们称之为“SOA支持的BPM”的生命周期就是建模、实施和监视的迭代,而且BPMN提供了基于整个生命周期技术的关键标准。
XSLT Version 2.0 offers some key improvements based on collective experience with XSLT 1.0, but it is closely tied to XPath 2.0, which is somewhat controversial.
XSLTVersion 2.0在集中 XSLT 1.0 使用体验的基础上提供了一些关键改善,但是它与XPath 2.0 的联系更加紧密,而后者还存在一些争议。
In some cases, you might find that guidelines for choosing the proper partitioning key based on collocation and data balancing contradict one another.
在某些情况下,您可能会发现根据并置和数据平衡选择恰当的分区键的准则会相互矛盾。
This perspective has covered some of the key connectivity trends we are seeing in banks currently, and some key implementation recommendations based on engagements with financial institutions.
图中揭示了我们当前在银行中看到的一些关键连接趋势,以及一些与金融机构合作得到的关键实现建议。
A key component of SOA-based business processes management is the tooling and runtime framework which is used to create business processes from those services.
基于SOA的业务流程管理中的一个关键组件是工具和运行时框架,用于从这些服务创建业务流程。
The size of the discount is a key business decision based on the type of customer.
折扣的多少是一个基于客户类型的重要业务决策。
If you choose a partitioning key based on your query workload, the partitioning key should typically consist of either a joined column or a set of columns that is frequently used in many queries.
如果基于查询工作负载选择一个分区键,那么此分区键通常应该包含一个合并列或常被用于很多查询的一组列。
The majority of the Amazon storage patterns were based on primary key access leading to single value or object.
亚马逊的大多数存储模式都建基于通过主键访问某个值或对象。
The key objective behind this type of work is to break existing process silos in order to create homogeneous business architecture based on key business functions.
这种类型工作的背后,是将已存在的过程分解,以创建基于关键业务功能的同类业务架构。
It then encrypts the index using a searchable encryption scheme and encrypts the unique key with an attribute-based encryption scheme under an appropriate policy.
然后它会使用可搜索的加密模式对索引进行加密,用基于属性的加密模式以恰当的手段对唯一密钥加密。
The optimizer will deduce key value selection based on the functional dependency of the column within the row.
优化器将根据行中列的函数依赖性来推断关键值选择。
Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.
公钥-私钥组合是公共密钥基础设施的核心,建立在非对称密码的基础上。
This password check is done even if the user is following the public key or host-based authentication.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
The article concludes with a high-level summary of key performance results based on internal case studies.
本文最后将基于一些内部案例研究简要总结关键性能结果。
RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。
As you saw in Part 1, this public key would be based on the RSA algorithm.
您从第1部分中可以看到,这个公钥是基于rsa算法生成的。
The cache request mediation generates a cache key based on the request message, and searches for a response in the cache.
缓存请求中介基于请求消息生成缓存键,并在缓存中搜索响应。
Typically, the partitioning key is time-based, resulting in a design that directs data for a given week, month, or quarter to be stored in a certain partition.
通常,分区键是基于时间的,因此这种设计会把某一周、月或季度的数据存储在特定分区中。
Typically, the partitioning key is time-based, resulting in a design that directs data for a given week, month, or quarter to be stored in a certain partition.
通常,分区键是基于时间的,因此这种设计会把某一周、月或季度的数据存储在特定分区中。
应用推荐