It ensures that only valid users can use the application (authentication).
它确保只有有效用户才可以使用应用程序(身份验证)。
If you want to restrict the users who can access a share, use the valid users parameter.
如果您希望限制可以访问共享的用户,那么可以使用valid users参数。
Once established, all valid users can reuse this trusted connection without re-authentication.
连接建立后,任何有效用户都可以重用该可信连接,无需重新验证。
One might capture such information by observing the data generated for valid users of the system as it whizzes by on a wire.
当为系统的正当用户而生成的数据在导线中传输时,可以通过观测来获取这类信息。
The % s macro used as the list of valid users means the current session name, which will be the name of the currently logged in user.
作为有效列表使用的%s宏表示当前会话名称,将为当前登录用户的名称。
We needed to ensure valid users get the pages they need, but without prompting for a username and password every time they request one — just once per session.
我们需要确保有效的用户得到他们需要的页面,但不必在每次他们请求一个页面时都提示用户名和密码—每个会话只提示一次。
The completion system includes standard functions and completions — for example, lookups of valid users on the system, home directories, hosts, networks, and so on.
完成系统包括标准的功能和完成特性——例如,系统上的有效用户、主目录、主机、网络等对象的查找。
However, if the system will accept a similar voice that sounds "sick," then it's more likely to fall prey to attackers who can reasonably mimic the voice of valid users of the system.
但是,如果系统能接受一个听起来象“病人”一样类似的声音,则会给那些适当模仿系统有效用户的声音的攻击者钻空子。
To provide users with a window whenever they click over a valid URL.
每当用户单击有效的URL时,都给他们提供一个窗口。
In the test case above, featuring an authenticated user, there is a need to populate the USERS table with a valid entry to compute the encrypted password.
在上面的测试用例中,提供一个已经通过身份验证的用户,需要用有效的数据填充users表,以便计算加密的密码。
Most users will merely be concerned with what tags and content to put in what order to construct a valid UBL document.
多数用户仅仅关心用什么样的标签和内容,以什么样的顺序,来构造一个有效的UBL文档。
All valid database users can reuse the trusted connections established by APP_USER without re-authentication.
所有有效的数据库用户都可以重用APP_USER建立的可信连接,无需重新验证。
Using groups, you can literally group users together, and the groups are valid AIX groups.
可以把用户直接分组在一起,这些组是有效的aix组。
To help protect users from malware and to maintain portability, we have defined strict rules for valid modules.
为了保护用户免受恶意软件的骚扰同时保证可移植性,我们为有效模块定义了严格的规则。
This then makes them valid, and users will be able to search on them without ever knowing that they are problematic.
这就使它们有效,用户就能够搜索它们而不会出现奇怪的现象。
If the credentials of the users are valid, the front end will receive a session id that can be used to track the users through the site or retrieve other account information.
如果用户的凭证有效,前端将收到一个会话id,可以用它在站点中跟踪用户或检索其他的账号信息。
For example, if DB2 is configured with an operating-system-based authentication mechanism, users need valid operating system user IDs and passwords.
例如,如果DB 2使用一个基于操作系统的验证机制配置,则用户需要验证操作系统用户ID和密码。
Users belonging to a valid AIX group can be included in sudoers, making the sudoers file more manageable with fewer entries per user.
属于有效的aix组的用户可以包含在sudoers中,这样针对单一用户的条目更少,sudoers文件更容易管理。
The evaluation license is valid for 30 days from the installation date and allows up to 5 concurrent virtual users.
评价证书的有效期从安装之日开始计算是30天,最多允许五个并发的虚拟用户。
Also, you may recall messages from groups that include Internet addresses, but only those users in the group with valid Lotus Notes addresses receive a recall notice.
同样,可以从包含Internet地址的组收回邮件,但是只有那些具有有效LotusNotes地址的组内用户才能收到收回通知。
In addition, any Notes users expected to access the Query Views must have a valid DB2 user account, which must be set from the Domino Administration Client prior to deployment.
此外,任何要访问查询视图的Notes用户都必须具有一个有效的DB2用户帐户,该帐户必须在部署之前在DominoAdministration客户机上进行设置。
The DatePicker lets users easily select valid dates from a dropdown calendar.
这个日期选择器能让用户非常方便地从下拉框中选择正确格式的日期。
Configure WebSphere Application Server to use a valid user registry to authenticate users.
配置WebSphereApplicationServer使用有效的用户注册来验证用户身份。
It is suggested that you configure this role to include only the particular system users that would have a valid reason for accessing MDM Server.
建议配置这个角色,使之只包括具有访问MDMServer的有效权限的特定系统用户。
Add ten users not in the range of valid workload users to the rule.
在规则中添加10个不属于有效工作负载用户的用户。
Additionally, many Web sites do not want to maintain, or require users to continually provide, the same profile-related information just to ensure that the user credentials are valid.
另外,许多Web站点不愿意自行维护用户个人信息,也不愿意要求用户提供这些信息。
For instance, users may want to delete their account on your site (obviously unfortunate that they want to leave, but they may have valid reasons).
例如,用户可能想要删除他们在您站点中的帐户(这显然是件遗憾的事情,他们想要离开,但是他们可能有正当的理由)。
For instance, if you require a valid E-mail address from your users, don't make up stupid rules to define what is valid.
例如,如果您需要获得用户的有效电子邮件地址,就不要炮制出一些愚蠢的条款来强硬定义何为有效。
Looking at the users overrides of system defaults, one can then determine if the attributes for the users set are valid according to the implemented security policy.
通过查看用户账户覆盖系统默认设置的情况,就可以判断用户的属性集对于实现的安全策略是否合法有效。
Looking at the users overrides of system defaults, one can then determine if the attributes for the users set are valid according to the implemented security policy.
通过查看用户账户覆盖系统默认设置的情况,就可以判断用户的属性集对于实现的安全策略是否合法有效。
应用推荐