• Note that only the user identity from the LTPA token is passed in the SAML token.

    注意只有ltpa用户标识传入saml令牌。

    youdao

  • Together, they will associate the SAML token with a given secure conversation transaction.

    这三个样式这个SAML 令牌一个给定安全会话事务关联起来

    youdao

  • This SAML token is used for the initial exchange, and it will not be sent in the subsequent application traffic.

    这个SAML令牌用于初始通信不会后续应用程序流量发送

    youdao

  • We're going to propagate the identity provided in the inbound LTPA token to the provider gateway in a new SAML token.

    我们ltpa提供标识传播新的saml令牌中的提供者网关

    youdao

  • In our post - processing step here, we can reference some of that information in order to populate the outbound SAML token.

    在此处后处理步骤我们可以引用其中某些信息以便填充出站saml令牌。

    youdao

  • The SAML token will contain the Distinguished Name (DN) of the original invoker and will be signed by the client domain gateway.

    SAML令牌包含初始调用程序中的专有名称(DN),并客户网关签名

    youdao

  • Once the SAML token is trusted and authenticated, the holder of the token can access all application systems and does not need authentication any more.

    一旦SAML信任验证持有者可以登录所有应用系统而不用重新进行身份验证

    youdao

  • Consumers of this service must use a service request message flow which has been encrypted, and a SAML token added to the flow to access the service provider.

    服务消费者必须使用加密的服务请求消息以及一个已被添加中的SAML令牌访问服务提供商。

    youdao

  • The SSL protected communication will not be visible in tcpmon, but the SAML token included in the client request to the provider should be visible in tcpmon, like in Figure 19.

    SSL保护通信tcpmon可见包含在发送提供者客户请求中的SAML令牌在tcpmon中应该可见的,如图19所示。

    youdao

  • The article presents the policy sets and bindings required for the client and provider, as well as the Tivoli Federated Identity Manager trust service chain configuration needed to issue a SAML token.

    本文展示客户提供者所需策略绑定以及发放SAML令牌所需TivoliFederatedIdentityManager信任服务链配置

    youdao

  • The secured response contains the requested SAML security token.

    安全响应包含请求的SAML安全令牌。

    youdao

  • The client's secured initial request containing the SAML security token is sent to the service.

    客户包含SAML安全令牌受保护初始请求发送给服务。

    youdao

  • Using a SAML bearer subject confirmation token to propagate a user's identity.

    使用SAML不记名主体确认令牌传播用户身份

    youdao

  • The source site provides an SAML authentication assertion to the target site based on the token.

    站点根据标志目标站点提供SAML验证断言

    youdao

  • In all, a subject having been authenticated at the originating site gets a token from the SAML authority that it provides to the target site.

    总之站点验证主体SAML权威获得一个标志并将提供目标站点。

    youdao

  • The SAML security token is returned.

    返回SAML安全令牌

    youdao

  • Two token-exchange endpoints: REST with symmetric key and REST with SAML extension.

    两个令牌互换端点:一个是对称钥匙REST,另一个是带SAML扩展的REST。

    youdao

  • Gets or sets a uri reference that represents the format that the subject name of a SAML security token is in.

    取得设定uri参考,这个参考表示SAML安全性权杖所用主体名称格式

    youdao

  • Gets or sets a uri reference that represents the format that the subject name of a SAML security token is in.

    取得设定uri参考,这个参考表示SAML安全性权杖所用主体名称格式

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定