The target server must list the sending server on the trusted servers list.
目标服务器必须将发送服务器列入到受信任的服务器列表中。
The target server has to list the sending server on the trusted servers list.
目标服务器必须将发送服务器列入到受信任的服务器列表中。
To solve that problem, you need to add the server to the list of "trusted servers" with regard to XForms.
要解决这个问题,我们需要在 Xforms的 “信任服务器”列表中添加服务器。
Add the sending server's server ID to the Trusted servers field; in our example: cn=wasserver1,dc=demo,dc=ibm,dc=net.
将发送服务器的服务器ID添加到受信任的服务器字段,在我们的示例中:cn=wasserver1,dc=demo, dc=ibm, dc=net。
This information is stored by another trusted server in the domain that issues tamper-proof membership information to the requesting entity.
这些信息由域中的另外一个可信服务器进行保存,它可以对请求实体提供成员关系的证明信息。
The target server receives the request, retrieves the GSS token, extracts the server identity and compares it to the list of trusted server identities.
目标服务器接收请求,检索gss令牌,提取服务器标识,并与受信任的服务器标识列表进行比较。
The target server receives the request, retrieves the GSS token, extracts the server identity, authenticates it, and compares it to the list of trusted servers' identities.
目标服务器接收请求,检索gss令牌,提取服务器标识,对其进行身份验证,并与受信任的服务器标识列表进行比较。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
Because implementing fixes and updates in the distribution is owned outside of your organization, the server host should be a trusted organization.
因为在您的企业之外实现发行版补丁和更新,应该确保服务器的所有者是可信的组织。
Some common scenarios include allowing connections from trusted sources only, blocking connections to services that are not provided by the server, and allowing connections only to specific services.
一些常见的场景包括,只允许来自信任源的连接、阻止连接到服务器未提供的服务,以及只允许连接到特定服务。
If your application requests an explicit trusted connection, you cannot set the database server authentication type to CLIENT.
应用程序请求显式的可信连接时,不能将数据库服务器验证类型设置为CLIENT。
Once the authentication is complete, the receiving server will verify that the upstream server is trusted to perform identity assertion.
一旦身份验证完成,接受服务器将验证上游服务器是否受信任,可以执行标识断言。
When all attributes of an incoming connection request match all the trust attributes of any trusted context object on the DB2 server, the DB2 server implicitly grants a trusted connection.
当传入连接请求的所有属性匹配DB2服务器上任何可信上下文对象的所有信任属性时,DB2 服务器隐式地授予一个可信连接。
The relationship between a connection and a trusted context is established when the connection to the server is first created and remains for the duration of that connection.
当第一次创建到服务器的连接时,就建立了该连接与一个受信任上下文之间的关系,并且在该连接尚未断开期间该关系一直存在。
Because our client certificate will be self-signed, we'll need to configure the client's public key certificate as a trusted signer for the server.
因为我们的客户机证书将是自签署的,所以我们需要将客户机的公钥证书配置为服务器受信任的签署者。
Select the trusted root certificate or any other certificate category accordingly and import the server certificate that you had created into it.
选择可信的根证书或任何其他证书类别,把刚才创建的服务器证书导入到其中。
Notice that in the previous scenario involving client authentication, the client presents a certificate that is validated by the server against the set of trusted certificates.
请注意,在前面涉及客户端身份验证的场景中,客户端提供一个证书,然后服务器针对受信任的证书集对其进行检验。
Finally, verify that the trust attributes in the trusted context object on the federated database server actually match the trust attributes that are being presented in your connection request.
最后,验证联合数据库服务器可信上下文对象中的信任属性与连接请求中出现的信任属性相匹配。
When an SSL-protected page is requested, the browser identifies the server as a trusted entity and initiates a handshake to pass encryption key information back and forth.
当请求一个SSL 保护的页面时,浏览器认为服务器是一个可信任的实体,并且启用一个连接来回传递加密的信息。
Meanwhile the UI developers need a server that can be trusted to be stable at all times otherwise they will be unable to do their own work.
同时,UI开发人员需要一台可信的服务器,能够一直保持稳定,否则他们就无法完成自己的工作。
Ensure that you have created and enabled a trusted context object on the federation server.
确保在联合服务器上创建并启用了可信上下文对象。
After the application has established a trusted connection with the DB2 server, the application may switch users associated with the trusted context object in the backend.
在应用程序已经建立与DB 2服务器的连接之后,应用程序可以在后端切换与受信任上下文相关联的用户。
If the sending server is trusted, the execution continues.
如果该发送服务器是受信任的,那么执行过程将继续。
Finally, verify that the trusted context object on the federation server has not been disabled, dropped, or altered since your connection was established.
最后,验证联合服务器上的可信连接对象从建立连接之时起没有被禁用、放弃或改变。
The relationship between a database connection and a trusted context is established when the connection to the server is first made and that relationship remains for the life of that connection.
第一次连接到服务器时,将在数据库连接和可信上下文之间建立关系,这种关系将在连接期间一直维持。
In these cases, the Trusted target realms field must be configured for the sending server at CSIv2 outbound authentication. To test this option.
在这些情况下,必须在CSIv2出站身份验证中为发送服务器配置受信任的目标领域字段。
It assumes that the connection from WebSEAL to Application Server is completely trusted; therefore, client-side certificates for authentication are required.
它假设从WebSEAL到ApplicationServer的连接是完全信任的,因此,需要用于认证的客户端证书。
SQL Server 2008 provides the trusted, productive and intelligent platform necessary for business-critical applications.
SQLServer 2008为关键业务应用提供了必要的可靠、高效和智能化的平台。
End-to-end federated trusted contexts in WebSphere Federation Server V9.5 is a new feature that provides several benefits, including.
WebSphereFederationServerV9.5中的端到端联合可信上下文是一个新功能,可以提供以下好处。
After completing these steps, you will have created a trusted link from WebSEAL to the Web server.
完成这些步骤后,您将已经从WebSEAL到Web服务器创建了一个信任链接。
应用推荐