NET remoting client configuration file that includes security and authentication options.
NET远程处理客户端配置文件,该文件包括安全和身份验证选项。
After creating a new virtual directory, you can configure security and authentication for the virtual directory.
在创建新的虚拟目录后,可以为该虚拟目录配置安全性和身份验证。
Single sign-on solutions can be that unified framework for security and authentication, alleviating much of the burden on users, administrators, and developers.
单点登录解决方案为安全性和身份验证提供了统一的框架,这大大减轻了用户、管理员和开发人员的负担。
Assign a unique User ID and Password between WebSphere Business Integration Connect companies to increase the security and authentication level of communication.
在WebSphere业务集成连接公司之间分配唯一的用户ID和密码来加强安全性和通信的验证级别。
Data security by providing support for username and password authentication and for digital certificates.
通过支持用户名和密码认证以及数字证书的数据安全。
A full discussion of the nuances of common services — how they're started, how they react to client, inherent security issues and authentication methods — is beyond the scope of this document.
对常见服务之间细微差别的完整讨论-它们怎么启动、它们如何对客户机作出反应、其内在安全性问题和认证方法-已超出了本文的范围。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
For Authentication and Authorization checks a security token needs to be supplied.
对于身份验证和授权检查,需要提供安全令牌。
In this step, we establish the relationship between the security roles that we defined previously and their authentication status.
在这一步里,我们建立了前面定义的安全角色和他们的身份验证状态之间的关系。
Authentication and privacy are security issues that have been largely standardized and productized.
在安全方面,身份验证和隐私已基本标准化和产品化。
Typically an ESB will contain mechanisms for logging, auditing, authentication (security), and management, etc, above and beyond the services listed above.
除了上面列出的服务,ESB通常还要包括记日志、审计、认证(安全)和管理等机制。
This article USES example code to demonstrate mouse dynamics for enhancing the security of applications in authentication and continuous usage contexts.
本文将使用示例代码来演示鼠标力学,从而增强在验证和连续使用应用程序时的安全性。
This article USES example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.
本文将使用示例代码来演示击键力学如何在验证及连续数据输入环境中增强应用程序安全性。
To perform the authentication, mapping, and authorization, an external security provider is required.
为了执行验证、映射和授权,就需要使用外部安全提供者。
Those subclasses work together to handle authentication, filtering, security, data transformation, and routing the incoming requests to the respective resources.
这些子类能够一起处理验证、过滤、安全、数据转换以及将传入请求路由到相应资源等操作。
It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.
文中还介绍了DB 2UDB安全模型,包括用户身份验证、用户和组授权以及超级用户。
Database-level security measures including authentication and authorization might also be used to enhance application security.
数据库级的安全措施,包括身份验证和授权,也可以用于加强应用程序的安全性。
Both the DB2 and IDS security model consist of two main components: authentication and authorization.
DB2和IDS安全模型都由两个主要组件组成:身份验证和授权。
As a consequence, architects often intend to also leverage existing security mechanisms such as authentication and authorization of the source systems.
因此,架构师经常还希望利用现有的安全机制,如源系统的身份验证和授权。
IBM DB2 CM provides various levels of security through authentication and authorization.
IBMDB 2CM通过身份验证和授权提供了各种级别的安全性。
As the name implies, a PEP is a point in the security architecture where authentication and authorization rules are enforced, based upon the policy defined in the PDP.
顾名思义,PEP是安全体系结构中基于PD p中定义的策略执行身份验证和授权规则的位置。
Enabling security for user authentication and group permissions for access to requirements and documents
要访问需求和文档,就要为用户的鉴定和组权限激活其安全性
Spring Security is a powerful and highly customizable authentication and access-control framework.
SpringSecurity是功能强大的并高度可定制的认证和访问控制框架。
You create a simple login system where users can visit and log in using form-based authentication and J2EE declarative security using Geronimo's SQLLoginModule.
将使用Geronimo的SQLLoginModule创建一个简单的登录系统,用户可以用基于表单的认证和J2EE声明式安全性访问和登录系统。
Spring Web Flow provides a JSF platform model and authorization of States, Flows, and Transitions. It USES Spring Security for authentication and authorization purposes.
SpringWebFlow能够提供一个JSF平台模型,并提供状态、流和transition的授权,其中,认证和授权的实现应用到了SpringSecurity。
IPSec for IPv6 provides the same level of authentication and security as it does for IPv4.
ipsec为ipv 6提供了与IPv4的相同级别的认证和安全。
Integrated security features including authentication and authorization support integrated with existing enterprise security infrastractures
集成的安全特性包括对认证和授权的支持并与现有的企业安全基础设施相集成。
And while most security frameworks stop at authentication and authorization, Shiro provides much more.
虽然多数安全框架止于授权和认证,但Shiro提供了更多功能。
Encina applications typically use the DCE security registry to store user accounts and groups, and the DCE security service for authentication.
Encina应用程序特别使用了DCE安全注册来存储用户的帐号和分组,以及用于身份验证的DCE安全服务。
Encina applications typically use the DCE security registry to store user accounts and groups, and the DCE security service for authentication.
Encina应用程序特别使用了DCE安全注册来存储用户的帐号和分组,以及用于身份验证的DCE安全服务。
应用推荐