网站首页  词典首页

请输入您要查询的英文单词:

 

单词 auth.
释义

auth.

美 
英 
  • abbr.(=authentic)(=author)
  • 网络认证报文;主要作者;然后出理这次入侵事件
abbr.
1.
(=authentic)
2.
(=author(ess))
3.
(=authorized)

例句

释义:
1.
Therefore, it is common to see both a client auth plug-in and a server auth plug-in specified on a database server.
因此,常常可以看到在一个数据库服务器上同时指定了客户机身份验证插件和服务器身份验证插件。
www.ibm.com
2.
The login name that you define in the Build Forge server auth must be able to access the source files to run the analysis.
您定义在BuildForge服务器上的登陆名认证必须要能够访问到源文件来执行分析过程。
www.ibm.com
3.
Ideally, the targeted OU contains all the objects that you are trying to auth restore.
最好是目标OU包含您试图授权还原的所有对象。
support.microsoft.com
4.
If you perform the auth restore on a global catalog, one of these files is generated for every domain in the forest.
如果对全局编录执行授权还原,将为林中的每个域生成上述文件之一。
support.microsoft.com
5.
The younger Bush, Auth implies, has no patience for the advocates of prudence.
而小布什呢,奥特暗示,他没有耐心听那些主张花钱谨慎的人说话。
blog.sina.com.cn
6.
The $SSH_AUTH_SOCK (short for SSH Authentication Socket) is the location of a local socket which applications can use to speak to ssh-agent.
$SSH_AUTH_SOCK(即SSHAuthenticationSocket的缩写)是一个本地套接字的位置,应用程序使用它与ssh-agent通信。
www.ibm.com
7.
Mr. Auth says that over the course of this quarter his firm has been moving money in its international portfolios to Asia from Europe.
奥斯说,本季度公司一直在把国际投资组合中的资金从欧洲转移到亚洲。
www.bing.com
8.
Question: If I'm developing a Web Services client to talk to Web services through an HTTP server that has basic auth on, how do I do it?
问:如果我正在开发通过HTTP服务器(它有基本认证)与Web服务进行谈话的Web服务客户机,我应该怎样做?
www.ibm.com
9.
This means that only those callers, who are part of the Payroll Auth role, are allowed to access the service and others will be denied.
这意味着只有这些调用者-PayrollAuth角色的一部分-才被允许访问服务,其他的将被拒绝。
www.ibm.com
10.
Let us consider the previous use case where the Payroll service was secured and only users of the Payroll Auth role are allowed access.
我们看一下之前使用的案例,其中Payroll服务是安全的,只有允许PayrollAuth角色用户访问。
www.ibm.com
1.
If you do not want cell A to trust cell B, use certificate authentication for the server to server authentication step, not basic auth.
如果不希望计算单元A信任计算单元B,则请在服务器身份验证步骤中为服务器使用证书身份验证,而不是采用基本身份验证。
www.ibm.com
2.
Since the format of the file has changed, a new javax. security. auth. Policy subclass is needed to parse the file.
既然文件格式已经改变,就需要一个新的javax.security.auth.Policy子类来解析文件。
www.ibm.com
3.
Restore the system state and auth restore each of the local security groups that contains the deleted users.
还原系统状态,并对包含已删除用户的每个本地安全组执行授权还原。
support.microsoft.com
4.
As shown in Figure 9, we have defined the security permission qualifier on the entire payroll service by defining a "Payroll Auth" role.
如图9所示,通过定义一个“PayrollAuth”角色,我们已经在整个薪金服务上定义了安全许可限定符。
www.ibm.com
5.
In Build Forge, create a server auth with credentials that the Management Console can use to log on to the enterprise edition computer.
在BuildForge环境下,使用受权创建服务器端认证,这样使用管理控制台就可以登陆到企业版计算机。
www.ibm.com
6.
If there is a firewall, ensure that the SMTP Command Filters on the firewall do not filter the AUTH NTLM command.
如果有防火墙,请确保防火墙上的SMTP命令筛选器不筛选AUTHNTLM命令。
www.microsoft.com
7.
A session cookie in conjunction with a random auth token or auth login validation is both reasonable mechanisms.
一个连接中的会话cookie与一个随机鉴定标识或者鉴定登陆审核都是合理的机制。
www.ibm.com
8.
In the Test Results, verify that the Management Console can connect to the enterprise edition computer with the server auth credentials.
查看返回的测试结果,确认管理控台可以使用服务器授权认证连接到企业版计算机。
www.ibm.com
9.
In comparison, Cisco's Catalyst 3750E required no configuration changes for any of our scenarios except for multi- auth .
相较之下,思科公司的催化剂3750e无须配置更改为我们的任何情况,除了多权威性。
dictsearch.appspot.com
10.
Auth restore all the deleted user accounts, and then permit end-to-end replication of those user accounts.
对所有已删除的用户帐户执行授权还原,然后允许对这些用户帐户进行端到端复制。
support.microsoft.com
1.
If the user chooses to opt out of specifying the user ID and password, DB2 employs the client auth plug-in to get the default login context.
如果用户选择不指定用户ID和密码,则DB2使用客户端身份验证插件来获得默认登录上下文。
www.ibm.com
2.
SEC_CIRCUIT_AUTH -- Use SSL security for privacy and integrity protection only on the initial request (while establishing the connection).
SEC_CIRCUIT_AUTH——仅在初始化的请求中(当建立连接时)使用SSL安全用于私有性及完整性保护。
www.ibm.com
3.
The last commented line shows the password mapping for ldap_auth authentication mode.
最后的注释行显示了用于ldap_auth身份验证模式的密码映射。
www.ibm.com
4.
Per_Connection_Factory corresponds to the Application value of the res-auth deployment descriptor.
Per_Connection_Factory与res-auth部署描述符的Application值一致。
www.ibm.com
5.
Run the application with the java. security. auth. login. config property set to the login configuration file's full path name.
通过java.security.auth.login.config属性运行应用程序,该属性设置为登录配置文件的完整路径名。
www.ibm.com
6.
The auth method checks to see if a User is in the session.
auth方法将执行检查,查看某个User是否在会话中。
www.ibm.com
7.
Client Auth Required: If this field is set, then clients connecting through this connector must supply a valid client certificate.
ClientAuthRequired:如果设置此字段,那么通过此连接器连接的客户机必须提供有效的客户机证书。
www.ibm.com
8.
Tony Auth's cartoon weighs in on the side of the manned space program.
托尼-奥斯的这幅漫画支持载人航天飞行。
edu.sina.com.cn
9.
The callback handler must implement the javax. security. auth. callback. Callback interface.
回调处理器必须实现javax.security.auth.callback.Callback接口。
www.ibm.com
10.
For your own CallbackHandler implementation, you must provide the javax. security. auth. callback.
对于您自已的CallbackHandler实现,必须提供javax.security.auth.callback.CallbackHandler接口;
www.ibm.com
1.
For unix_auth mode, Windows does not generate the crypt password when an AD user is UNIX-enabled.
对于unix_auth模式,当AD用户支持UNIX时,Windows将不生成crypt密码。
www.ibm.com
2.
Outbound-replicate the auth-restored objects from the recovery domain controller to the domain controllers in the domain and in the forest.
将已授权还原的对象从恢复域控制器出站复制到域和林中的域控制器上。
support.microsoft.com
3.
auth-constraints contains two extra features that aren't being used in the example.
auth-constraints包含两个额外特性,但是并没有在这个例子中使用。
www.ibm.com
4.
Auth restore only the OU or Common-Name (CN) containers that host the deleted user accounts or groups.
只对承载已删除用户帐户或组的OU或公用名(CN)容器执行授权还原。
support.microsoft.com
5.
We need to capture more then what was authorized; re-auth for the new amount.
我们需要得到比审定的更多;再次审定新增加的数量。
topic.csdn.net
6.
Auth restore the domain name (dn) path for each deleted user account, computer account, or deleted security group.
授权还原每个已删除用户帐户、计算机帐户或已删除安全组的域名(dn)路径。
support.microsoft.com
7.
The javax. security. auth. Subject instance is created by login module after authentication.
在执行身份验证后,由登录模块创建javax.security.auth.Subject实例。
www.ibm.com
8.
The OAM stores authorization records, or profiles, on a queue: SYSTEM. AUTH. DATA. QUEUE.
OAM将授权记录或概要文件储存在一个队列上:SYSTEM.
www.ibm.com
9.
For this auth-method, you can optionally specify a value for realm-name, which will be displayed in the dialog for login.
对于这个auth-method,您可以有选择地指定一个用于realm-name的值,它将在用于登录的对话框中显示。
www.ibm.com
10.
Auth restore the domain name (dn) path for each deleted user account, computer account, or security group.
对每个已删除的用户帐户、计算机帐户或安全组的域名(dn)路径执行授权还原。
support.microsoft.com
1.
Choose the role, namely Payroll Auth, and click Map users to add particular users or Map groups for adding groups.
选择一个角色,命名为PayrollAuth,然后单击Mapusers为添加组添加特殊用户或者Mapgroups。
www.ibm.com
2.
Also, you can use include rules, as in auth include common-account, to include rules from other files.
另外,可以使用include规则以包含其他文件中的规则,比如authincludecommon-account。
www.ibm.com
3.
Set the sfmAlias as the auth alias where required, as shown in figure 21.
设置sfmAlias作为身份验证别名,如图21所示。
www.ibm.com
4.
The except list contains the closures that should be exempted from the auth call.
except列表包含了应当从auth调用中移除的闭包。
www.ibm.com
5.
pam_wheel only provides root access to members of group wheel; the required line is auth required pam_wheel. so.
pam_wheel只向wheel组的成员提供根访问权;必需的行是authrequiredpam_wheel.so。
www.ibm.com
6.
Auth restore the lowest common parent container that holds the deleted objects.
对保存已删除对象的最不通用的父容器执行授权还原。
support.microsoft.com
7.
Its default implementation is provided by the com. sun. security. auth. PolicyFile class.
它的缺省实现是由com.sun.security.auth.PolicyFile类提供。
www.ibm.com
8.
Auth restore the deleted user accounts, the deleted computer accounts, or the deleted security groups.
对已删除的用户帐户、计算机帐户或安全组执行授权还原。
support.microsoft.com
9.
The javax. security. auth. Policy abstract class is used to represent the JAAS security policy.
Policy抽象类被用于表示JAAS安全性策略。
www.ibm.com
10.
No auth uses file-system authentication only, accessed locally.
Noauth只使用文件系统认证,在本地访问。
www.ibm.com
1.
Right-click on the String value, select Modify, and enter the value example. auth. service.
右键单击String值,选择Modify并输入值example.
www.ibm.com
2.
Corrected the description of the auth_scheme column.
更正了对auth_scheme列的描述。
technet.microsoft.com
3.
The value could be auth, account, session or password module types.
值可以是auth、account、session或password模块类型。
www.ibm.com
4.
The auth method gets invoked before each closure call by the beforeInterceptor.
在beforeInterceptor调用每个闭包之前,auth方法将得到调用。
www.ibm.com
5.
c option: The fully qualified path and the plug-in name for the client-side auth plug-in.
coption:客户端身份验证插件的全限定路径和插件名称。
www.ibm.com
6.
s option: The fully qualified path and the plug-in name for the server-side auth plug-in.
soption:服务器端身份验证插件的全限定路径和插件名称。
www.ibm.com
7.
Set either the srvcon_auth parameter or the AUTHENTICATION database manager configuration parameter to server.
将srvcon_auth参数或AUTHENTICATION数据库管理器配置参数设置为server。
www.ibm.com
8.
There are even the DKIM headers and a new headercalled "X-Google-Sender-Auth" .
甚至还有的DKIM头和一个新的标题所谓的“X-谷歌,发件人验证”。
bbs.kafan.cn
9.
The BASIC auth-method is used in some of the sample applications with this article.
在本文提供的某些示例应用程序中,使用了BASICauth-method。
www.ibm.com
10.
It requires that the connector use TLS before it tries AUTH.
它要求连接器在尝试AUTH之前使用TLS。
technet.microsoft.com
1.
Once connected, you call the auth method with the password.
一旦连接上了,您可以使用密码来调用auth方法。
www.ibm.com
2.
You are not auth restoring security groups or their parent containers.
您当前未对安全组或其父容器执行授权还原。
support.microsoft.com
3.
You are using method 1 to auth restore deleted users or computer accounts by their distinguished name (dn) path.
您正使用方法1按可分辨名称(dn)路径对已删除的用户帐户或计算机帐户执行授权还原。
support.microsoft.com
4.
I need an Auth-Code to initiate the transfer. I dont know how it works with SEDO.
我需要一个转移密码才能过户。我不知道在SEDO上怎样使用它。
zhidao.baidu.com
5.
This article discusses how to use Secure RPC with AUTH_DES authentication security mechanism.
本文将介绍如何通过AUTH_DES身份验证安全机制来使用安全RPC。
www.ibm.com
6.
The team is ofcourse looking for feedback on " any Auth scenarios you want [us] to explore" .
当然,这个团队也在寻求一些关于“任何你希望我们研究的验证场景”的反馈。
www.infoq.com
7.
You are using method 2 to auth restore deleted users or computer accounts by their domain name (dn) path.
您正使用方法2按域名(dn)路径对已删除的用户帐户或计算机帐户执行授权还原。
support.microsoft.com
8.
Support password change with ldap_auth mode.
支持ldap_auth模式密码更改。
www.ibm.com
9.
create a file with auth information for the server. ': 0' is a dummy.
为服务器创建一个带有认证信息的文件。
dictsearch.appspot.com
10.
If you prefer unix_auth, omit the "-A ldap_auth" from above.
如果您希望使用unix_auth,那么可以从上面的内容中省略“-Aldap_auth”。
www.ibm.com
1.
Sorry, this auth code is not valid.
对不起,该认证码错误。
translate.dokuwiki.org
2.
Once you add this code, create a file called auth. ini.
添加了此代码后,创建一个名为auth.ini的文件。
www.ibm.com
3.
If a match is not found in the files, it returns PAM_AUTH_ERR failure code.
如果没有在这些文件中找到匹配项,则返回PAM_AUTH_ERR故障代码。
www.ibm.com
4.
The example auth. ini file shown in Listing 3 now contains a record for the user; this record contains both the user name and password.
清单3内所示的auth.ini文件现在包含了一个用户记录;这个记录包含了用户名和密码。
www.ibm.com
5.
As a result, an AD user cannot log in to AIX in unix_auth mode after configuration.
因此,在配置之后,AD用户不能在unix_auth模式中登录AIX。
www.ibm.com
6.
The most important parameter passed in is a javax. security. auth. Subject.
传入的最重要的参数是javax.
www.ibm.com
7.
This configuration may be specified through the system property java. security. auth. login. config. An example configuration is
这个配置可以通过系统属性java.security.auth.login.config指定。
www.ibm.com
8.
To see if SMTP-AUTH and TLS work properly now run the following command:
要查看SMTP-AUTH及TLS能否正常工作请使用如下命令:
blog.sina.com.cn
9.
Container supplied authentication (eg BASIC auth or cookie managed session based authentication)
容器提供的认证(如BASIC认证或基于session的cookie管理的认证)
blog.sina.com.cn
10.
Again, a system property, java. security. auth. policy, is used to indicate where the JAAS policy file resides, as shown below
再一次,使用系统属性java.security.auth.policy指出JAAS策略文件驻留在何处,如下所示
www.ibm.com
1.
Because you are using forms-based authentication and not basic authentication, change the ba-auth from https to none
因为您使用的是基于窗体的认证,而不是基本认证,所以将ba-auth从https改为none
www.ibm.com
2.
to access resources protected using http basic - auth , a user has to provide a username and password
要使用httpbasic-auth访问受保护的资源,用户需要提供用户名和密码。
www.ichacha.net
3.
Research and Design for Embedded Linux System for Auth Server
嵌入式Linux下动态口令身份认证系统的研究与设计
aeroweb.cn
4.
Bus. transactions with auth. profile
带有授权参数文件的业务事务
wenku.baidu.com
5.
Auth. Object Usage in Transactions
事务中权限对象的用法
blog.sina.com.cn
6.
Call AUTH reporting tree (info sys. )
调用AUTH报表树(信息系统)
blog.sina.com.cn
7.
Add support for re-auth for additional funds
增加对审定额外资金的支持
topic.csdn.net
8.
Auth restore deleted users in the following order
按照以下顺序对已删除的用户执行授权还原
support.microsoft.com
9.
I have requested for Auth-Code transfer, which may need 3 or 4 buisness days;
我已经提出申请转移密码,这需要3-4个工作日;
zhidao.baidu.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/2/27 17:10:09