• This is also referred as pass-through authentication.

    称为传递身份验证

    youdao

  • Conceptual background for pass-through authentication.

    直通身份验证概念背景

    youdao

  • Pass-through authentication covers many other scenarios.

    直通身份验证还涉及许多其他场景

    youdao

  • IBM DB2 CM provides various levels of security through authentication and authorization.

    IBMDB 2CM通过身份验证授权提供了各种级别安全性

    youdao

  • If the value of this attribute is _disable_, then pass-through authentication is disabled for this entry.

    如果属性为_ DISABLE_,那么将对此条目禁用直通身份验证。

    youdao

  • This is not allowed because the pass-through authentication feature does not update any value on the pass-through server.

    是因为直通身份验证功能不会更新直通服务器任何

    youdao

  • It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.

    所以这样的可能性:用户虽然通过身份验证可以登录一个系统但是经过授权,不准任何事情。

    youdao

  • In a strategy paper published last week, the EU said research was needed to make tags more secure - through authentication and encryption.

    欧盟上周发表一份策略文件表示必要通过鉴定加密研究使标签安全

    youdao

  • If pass-through authentication has to be performed for an entry, remove the userpassword attribute and leave the other attribute as they are.

    如果必须一个条目执行直通身份验证,那么删除userpassword属性保留其他属性不变。

    youdao

  • To resolve this secldap limitation, this article demonstrates the usage of the pass-through authentication feature in Tivoli Directory Server.

    为了解决这个secldap限制本文介绍TivoliDirectoryServer中的直通(pass -through)身份验证功能用法

    youdao

  • Pass-through authentication is a mechanism which allows a client to bind to a directory server even if the user credential is not available locally.

    直通身份验证机制支持客户绑定一个目录服务器即使用户凭据无法在本地获得。

    youdao

  • We just need a sample user entry in the Primary Tivoli Directory Server for the users for which the pass-through authentication has to be performed.

    我们需要PrimaryTivoliDirectoryServer中的一个示例用户条目来表示必须执行直通身份验证用户

    youdao

  • Secure integration and access to business applications and information is typically achieved through authentication, authorization, and accountability.

    安全集成以及业务应用程序信息访问通常通过身份验证授权责任实现的。

    youdao

  • "Emperor poultry brand" the sauce duck, duck, duck wing flax crisp, duck palm through authentication center China green food authentication, get use green food logo.

    鸭、鸭、鸭通过中国绿色食品认证中心认证,获得绿色食品标志使用权

    youdao

  • How to set up and ascertain users 'status is what authentication does, while Access Control must assume the users have gone through authentication and obtained their proper status.

    如何建立以及确定使用者身份为“身份认证”所需负责的工作;讨论“访问控制”,则必须假设使用者经过认证的过程得到正确的身份。

    youdao

  • We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.

    我们为认证授权通过加密保护数据这些方面的安全问题提供解决方案

    youdao

  • Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.

    通过增强访问控制身份标识认证提高UDDI数据完整性从而使安全性问题得以解决。

    youdao

  • Authentication of the data is provided through a combination of Smartcards and certificates.

    通过结合智能卡证书提供数据认证

    youdao

  • Authentication happens through w3.

    身份验证通过w3进行

    youdao

  • Your automated tests will all have to access the database through some form of login or user authentication.

    自动化测试需要通过一些注册或者使用者身份验证形式访问数据库

    youdao

  • In effect, the type cataloged at the gateway ACTS as a filter that limits what authentication types are allowed through.

    实际上编目网关上类型充当一个过滤器用于限制哪些验证类型允许通过

    youdao

  • This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.

    通常为了进行网络访问授权身份验证内容筛选通过缓存更好地利用网络带宽而进行活动

    youdao

  • All authentication tasks should be done through SQL so that external DB2 applications can manage this information either locally or remotely.

    所有身份验证任务应该通过SQL执行这样外部DB 2应用程序就可以本地远程地管理这些信息

    youdao

  • What if a hacker discovers a vulnerability in the security mechanism that allows him to break through the authentication without the need to know the required user's authentication information?

    如果黑客安全机制发现了一个漏洞可以破解身份验证,而不需要了解用户身份验证信息,那么会怎么样?

    youdao

  • Besides the JDBC provider, data source and JAAS authentication have also been configured through JACL scripts.

    jdbc提供程序之外,数据源JAAS身份验证通过jacl脚本进行配置

    youdao

  • Steps 1 through 6 show the authentication process, and steps 7 though 9 show the authorization process.

    步骤16显示身份验证流程步骤7到9显示了授权流程。

    youdao

  • If it isn't then the authentication handler will be used, which runs through a number of steps and only after successful authentication will re-issue the original request for further processing.

    如果没有身份验证处理器使用处理器运行几个步骤只有身份验证成功通过后重新发出原始请求进行后续处理

    youdao

  • AIX security commands and applications can be configured to call PAM modules through the use of existing loadable authentication framework.

    可以对AIX安全性命令应用程序进行配置,以便通过使用现有加载式验证框架来调用PAM模块

    youdao

  • The request is then forwarded to the authentication module through the SPI.

    然后通过SPI将请求转发身份验证模块

    youdao

  • The request is then forwarded to the authentication module through the SPI.

    然后通过SPI将请求转发身份验证模块

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定