网站首页  词典首页

请输入您要查询的英文单词:

 

单词 authentication
释义

authentication

美 [??θent??ke??(?)n]
英 [???θent??ke??(?)n]
  • n.认证;鉴定
  • 网络验证;身份验证;鉴别
n.
verification,confirmation,substantiation,validation,certification
n.
1.
确定,鉴定,证明;认证

例句

释义:
1.
The system could not be unlocked. The smartcard certificate used for authentication was not trusted.
系统无法解锁。用于授权的智能卡证书不被信任。
angel.w15.5tom.cn
2.
At this point everything is ready to recycle the TM1 server and activate the LDAP authentication.
现在,一切就绪了,可以重新启动TM1服务器并激活LDAP身份验证。
www.ibm.com
3.
In many cases, an authentication data alias is often used in client requests for database interaction.
在很多情况下,进行数据库交互的客户机请求中会用到一个身份验证数据别名。
www.ibm.com
4.
This has been a great step forward for scaling identity management, but it must go further - LDAP password authentication is not enough.
这对于身份管理的可伸缩性来说是重要的一步,不过还要做的更多——LDAP密码认证还不够。
www.infoq.com
5.
Some of these relationships are shown in Figure 1, an authentication object model for your database.
这些类之间的关系。其中一些关系如图1所示,这是数据库的验证对象模型。
www-128.ibm.com
6.
At times, printers in the domain can require domain authentication before you're able to use them, as they might be a shared resource.
有时候,域中的打印机可能是共享的资源,需要先进行域身份验证,然后才能使用它们。
www.ibm.com
7.
Shiro is a framework implemented in the Java language that provides both authentication and authorization in an easy-to-use API.
Shiro是一个用Java语言实现的框架,通过一个简单易用的API提供身份验证和授权。
www.ibm.com
8.
NOTE: that there is no authentication with this feature! Do not setup such a port unless you are sure what you are doing.
该特性没哟进行任何认证。除非你知道你在干什么,否则不要设置这样的端口。
cms.sidersoft.com
9.
Certificates are also used for authentication and encryption to help secure communications between a Client Access server and clients.
证书还可用于身份验证和加密,以帮助保护客户端访问服务器与客户端之间的通信。
technet.microsoft.com
10.
This client becomes widely used for authentication simply because it's easy to set up as a default since the OS is widely used.
这种客户端广泛用于认证,因为这种OS被广泛使用,所以很容易将它设定为预设值。
www.ibm.com
1.
The authentication process will allow a user to employ the services any device, public or not, as if it were its own.
认证过程将允许一个用户去雇用任何设备、公共服务与否,好像是自己的。
zhidao.baidu.com
2.
HTTP authentication has been widely used, and does allow for a little bit of security, and possibly a little bit of state.
HTTP身份验证得到了广泛应用,可以提供一定的安全性,还能够存储少量状态。
www.ibm.com
3.
At this point an authentication box should pop up and ask you for your username and password - users are listed in the principals. zcml.
这时将会弹出一个要您输入用户名和密码的认证框,用户将在principals.zcml文件中列出。
wiki.ubuntu.org.cn
4.
There is no standard yet for how a Web service supports registration and authentication, but such a standard will no doubt emerge soon.
还没有标准规定Web服务如何支持注册和认证,但毫无疑问这个标准很快就会有了。
www.ibm.com
5.
Do not choose Digest authentication unless your deployment meets all the requirements for that mode.
不要选择摘要式身份验证,除非部署满足该模式的所有要求。
technet.microsoft.com
6.
Lotus Domino 7 also allows you to lock out a user account and to force a password change on the next authentication.
LotusDomino7还允许锁定用户帐号,在下次身份验证时强制更改口令。
www-128.ibm.com
7.
Domain-only certificates are available to any webmaster at low cost and with no verification, providing no guarantee of authentication.
域的唯一凭证,可到任何较低的成本和没有验证的网站管理员,不提供担保的认证。
www.jisuxz.com
8.
You might be thinking at this point that enabling SSL would provide the authentication required.
您可能此时会认为,启用SSL将提供所需的身份验证。
www.ibm.com
9.
An SMS-based one- time password generated by the bank and sent to your mobile phone for additional identity authentication .
银行向你的手提电话发出只用一次的密码短讯,作为额外核证之用。
www.bing.com
10.
It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.
所以,有这样的可能性:用户虽然通过了身份验证可以登录到一个系统,但是未经过授权,不准做任何事情。
www.ibm.com
1.
While peer authentication is clearly important, it is often just as important to authenticate shared resources - content in particular.
对等认证无疑是重要的,但通常同样重要的是对共享资源的认证特别是内容。
www-128.ibm.com
2.
CSRF (Cross Site Request Fogery) allows attackers to bypass cookie based authentication. I blogged about it a while ago.
一个是CSRF(CrossSiteRequestForgery,跨站点伪造请求攻击),它允许攻击者绕过基于cookie的身份认证,前些天我曾在Blog上介绍过这种攻击。
archive.cnblogs.com
3.
The AuthHelper class is added in Version 2 to make it easy to add Basic and Form-based authentication support to any third party plug-in.
Version2中增加了AuthHelper类,以便于为任何第三方插件增加Basic和基于表单的认证支持。
www.ibm.com
4.
This interaction is referred to as authentication and is shown in the bottom half of Figure 1.
这种交互称为身份验证,显示在图1的下半部分。
www.ibm.com
5.
This parameter might be a query, an edit or delete operation, an authentication request, or any one of the other supported actions.
该参数必须是一个查询、一个编辑或删除操作、一个认证请求、或者所支持的任何一个操作。
www.ibm.com
6.
Acegi is now ready to process incoming requests for authentication and authorization.
Acegi现在可以对传入的请求执行身份验证和授权了。
www.ibm.com
7.
The recycle time of the authentication key is at least one-third, and not more than one-half, that of the cookie time-out value.
身份验证密钥的再循环时间至少是Cookie超时值的三分之一,并且不得超过一半。
technet.microsoft.com
8.
An authentication error will occur if the user trying to connect is not same as the user whose credential is in the Kerberos cache.
如果试图连接的用户与其凭证保存在Kerberos缓存中的用户不一致,将发生身份验证错误。
www.ibm.com
9.
We are an authentication thing because we do not know probably and have done the inclosure again.
因为我们大概不知道和未再做封入物,我们是认证事。
ks.cn.yahoo.com
10.
Single sign-on uses the centralized server for authentication, so the same credentials can be used for accessing any of the client systems.
单点登录使用集中的服务器执行身份验证,可以使用相同的凭证访问任何客户机系统。
www.ibm.com
1.
The stored passwords can only be accessed by the use of a master password or other authentication method defined by the user.
存储的密码只能访问使用一个主密码或其他身份验证方法由用户定义。
www.orderble.com
2.
The project is still in its early stages (authentication is expected to be added in an upcoming version), but it's fun to watch it develop.
项目仍然处在早期阶段(今后的版本将增加身份验证),但是值得关注其进展。
www.ibm.com
3.
Authentication is delegated to the operating system for bindings mode connections or to a channel security exit for remote connections.
身份验证被委托给操作系统(对于绑定模式的连接)或委托给通道安全出口(对于远程连接)。
www.ibm.com
4.
This type of attack is possible because authentication typically is only done at the start of a TCP session.
由于通常只在TCP会话开始时进行认证,所以此类攻击是可能的。
www.educity.cn
5.
If it's possible to tamper with the authentication device, such data capture should not be all that difficult.
如果有可能篡改认证设备,则获取这样的数据并不会很困难。
www.ibm.com
6.
Use any form of authentication that requires passwords to be encrypted. Do not encrypt data.
使用要求加密密码的任何格式的身份验证。不要加密数据。
angel.w15.5tom.cn
7.
Given this behavior, it seems more secure to ask for some sort of authentication as part of accepting a deposit slip.
考虑到这种行为,接受存款单的同时还要求某种验证似乎更安全些。
www.ibm.com
8.
Kerberos, which provides a secure means of authentication for network users, is one of the most popular authentication mechanisms.
Kerberos为网络用户提供了一种安全的身份验证手段,是最流行的身份验证机制之一。
www.ibm.com
9.
Digital signature has been a primary means of identity authentication in era of network information.
数字签名已经成为网络信息时代身份认证的重要手段之一。
kns50.chkd.cnki.net
10.
This might be caused by an authentication problem between the monitor server instance and the secondary server instance.
这可能是由于监视服务器实例和辅助服务器实例之间的身份验证问题引起的。
msdn2.microsoft.com
1.
The form of authentication used for database mirroring by a server instance is a property of its database mirroring endpoint.
服务器实例对数据库镜像使用的验证形式是其数据库镜像端点的一种属性。
technet.microsoft.com
2.
Authentication is core to all grid activities, yet until recently, there was no complete end-to-end system for grid authentication.
认证是所有网格操作的核心,但是到目前为止,网格认证还没有一个完整的端到端的系统。
www-128.ibm.com
3.
Merbful Authentication - A look at a new (as of January 2008) plugin for Merb that provides an easy to use authentication system.
Merb风格的认证-介绍了一个新的(2008年一月)Merb插件,用于快速搭建认证系统。
www.bing.com
4.
To reduce complexity and simplify debugging of any potential problems, I recommend that you not use client authentication initially.
为了降低复杂性并简化任何潜在问题的调试,我不推荐在一开始就使用客户端身份验证。
www-128.ibm.com
5.
Note that this URL is the value of the Local part of the authentication token shown in Figure 11.
注意此URL是图11所示的身份验证令牌的Localpart的值。
www.ibm.com
6.
In addition, keystroke dynamics is one of the few fields where biometrics can be used for continuous authentication.
此外,击键力学是使用生物测量学进行连续身份验证的少数领域之一。
www.ibm.com
7.
Select "Use for authentication" if this directory contains users accounts that someone will use for login or to authenticate for services .
如果此目录包含某人将用于登录或鉴定服务的用户帐户,请选择“用于鉴定”。
www.bing.com
8.
This procedure is only one of a series of steps that you must perform when deploying RSA SecurID two-factor authentication.
此过程只是在部署RSASecurID双要素身份验证时必须执行的一系列步骤之一。
technet.microsoft.com
9.
It can be used for the data authentication, integrity as well as the general confidentiality.
他不仅具有传统的信息加密能力,并且能够用于验证信息的真实性、完整性和有效性。
www.fabiao.net
10.
This sort of table is commonly used when employing forms authentication, and in many applications the passwords are stored as clear text.
使用窗体身份验证时通常使用此类型的表,而且在许多应用程序中,密码以明文形式存储。
www.cnblogs.com
1.
Double key secure authentication is one of the protection methods used to verify access across different systems.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
www.ibm.com
2.
A publish point or registry with which WSRR needs to be synchronized may be secured by additional authentication.
需要与WSRR同步的发布点或注册表可能由额外的身份验证机制保护。
www.ibm.com
3.
Because nonrepudiation is a direct result of authentication, message encryption also does not provide nonrepudiation.
由于认可是身份验证的直接结果,因此邮件加密也不提供认可。
www.kuenglish.info
4.
In addition, mouse dynamics is one of the few fields where biometrics can be used for continuous authentication.
此外,鼠标力学是少数几个可以使用生物测量学进行连续验证的领域之一。
www.ibm.com
5.
The authentication failed error is usually caused by an incorrect user id or password.
身份验证失败错误通常由一个错误的用户ID或密码导致。
www.ibm.com
6.
The system could not be unlocked. The smartcard certificate used for authentication has expired.
系统无法解锁。用于授权的智能卡证书已经过期。
angel.w15.5tom.cn
7.
It's hence necessary to promote at least one user to administrator before finally switching to LDAP authentication.
因此,在切换到LDAP身份验证之前,需要把至少一个用户提升为管理员。
www.ibm.com
8.
In this model the trust between the ESB and a provider service is the same as the previous case where the ESB executes the authentication.
在此模型中,ESB和提供者服务之间的信任与前面ESB执行身份验证时的情况一样。
www.ibm.com
9.
If applicant is a foreign legal person or other form of organization, they shall submit related ratification and authentication materials.
申请人是外国籍法人或者其他组织的,应当提交相应的公证和认证材料。
www.bing.com
10.
A report server requires at least one authentication extension , data processing extension , and rendering extension .
不能使用自定义身份验证扩展插件来连接到报表服务器数据库。
www.bing.com
1.
In practice, however, APP clients are likely to see a variety of authentication mechanisms.
但实际上,APP客户机很可能遇到各种形式的身份验证机制。
www.ibm.com
2.
Because you are using IIS for this walkthrough , do not use impersonation for the authentication for your site .
因为将在本演练中使用IIS,所以不要对您的站点身份验证使用模拟。
www.bing.com
3.
Enterprises must be able to use more than one type of authentication depending on the level of risk associated with an app.
企业必须能够使用一种以上的认证,具体要看和应用相关的威胁的级别。
www.infoq.com
4.
Outlook does not allow you to use Basic authentication when connecting to your RPC proxy server without using SSL encryption.
不使用SSL加密而连接到RPC代理服务器时,Outlook禁止使用基本身份验证。
technet.microsoft.com
5.
With such a limitation, it becomes a requirement for the single LDAP server to store all the user authentication information.
有了这一限制,就需要单一LDAP服务器存储所有用户身份验证信息。
www.ibm.com
6.
Subscriber Authentication Failures is the number of authentication failures that have occurred since the service was started.
SubscriberAuthenticationFailures是自服务启动后发生的验证失败数。
technet.microsoft.com
7.
The assumption is that this token is not consumable by any other IBM Cognos 8 authentication provider directly.
假设任何其他IBMCognos8身份验证提供者都无法直接使用这种令牌。
www.ibm.com
8.
Verify that the Web site is accessible and that you do not encounter authentication errors when you access the site.
验证该网站是否可以访问,并且在访问该网站时不会遇到身份验证错误。
technet.microsoft.com
9.
The identity authentication's role is to user's identity undertakes differentiating, is one of the important foundation of network security.
身份认证的作用是对用户的身份进行鉴别,是网络安全的重要基础之一。
zhidao.baidu.com
10.
The Access Key ID is the key (20-character, alphanumeric sequence) needed to request authentication or to read queue items.
AccessKeyID(由20个字母和数字组成)是请求身份验证或读取队列项所需的密匙。
www.ibm.com
1.
This sort of authentication is widespread, but has a number of associated problems.
这类认证被广泛采用,但存在许多相关问题。
www-128.ibm.com
2.
Resolution depends on the authentication and authorization methods being used in the database, as well as the connection string.
解决办法取决于正用于数据库的身份验证和授权方法以及连接字符串。
msdn2.microsoft.com
3.
For this walkthrough , do not use impersonation authentication for your site .
对于该演练,请不要对您的站点使用模拟身份验证。
www.bing.com
4.
This behavior provides compatibility with earlier releases of MobiLink that did not allow user authentication.
此行为为不支持用户鉴定的MobiLink的以前版本提供了可兼容性。
www.ianywhere.com
5.
This incentive obviously needs to be removed, and I think this can be achieved by improving the authentication arrangements.
毫无疑问,我相信改进认证安排可以解决这个问题。
www.info.gov.hk
6.
The credentials sent as part of a digest authentication over HTTP must be mapped to a valid Windows domain account.
作为摘要式身份验证的一部分通过HTTP发送的凭据必须映射到有效的Windows域帐户。
msdn2.microsoft.com
7.
KDC is responsible for key distribution and all the authentication processes which may take place in the network.
KDC负责密钥分发和可能在网络上发生的所有身份验证过程。
www.ibm.com
8.
When using client certificate authentication for Web clients, realize that the Web server is now part of your trust domain.
在对Web客户端使用客户端证书身份验证时,要意识到Web服务器现在是信任域的一部分。
www-128.ibm.com
9.
Signing certificates for any client certificates owned by clients with which you expect CICS to communicate using client authentication.
属于客户端的任何客户端证书的签名证书,CICS可使用客户端身份验证与该证书通信。
www.ibm.com
10.
Since the SA account is only accessible when you choose to install using Windows Authentication, the SA password need never be revealed.
由于只有在您选择使用Windows身份验证进行安装时,SA帐户才可以访问,所以SA密码永远不需要显示。
msdn2.microsoft.com
1.
It should also be relatively easy to incorporate into your existing authentication schema, such as Active Directory or LDAP.
同时它还应该能相对容易地融入您现有的身份验证系统中,如活动目录(ActiveDirectory)或LDAP。
shi-wei.net
2.
As the foundation of Grid communication security, research on the authentication and key agreement mechanism is one of the hot topics.
作为网格通信安全的基础,安全认证密钥协商机制是研究的热点问题之一。
www.boshuo.net
3.
By default, login controls integrate with ASP. NET membership and forms authentication to help automate user authentication for a Web site.
默认情况下,登录控件与ASP.NET成员资格和Forms身份验证集成,以帮助实现网站的用户身份验证过程的自动化。
msdn2.microsoft.com
4.
If the terminal server expects an authenticated connection, set this up in CSM or turn off authentication altogether.
如果终端服务器需要验证过的连接,请在CSM中设置验证或把验证都关闭。
www.ibm.com
5.
Detects the user's authentication state and toggles the state of a link to log in to or log out of a Web site .
检测用户的身份验证状态,并将链接的状态切换为网站的登录或注销。
www.bing.com
6.
You can use the Web service API with Forms Authentication just as you would with Windows Authentication.
您可以将Web服务API与窗体身份验证一起使用,就像与Windows身份验证一起使用一样。
msdn2.microsoft.com
7.
POP3 interface should be able to use authentication and SSL connection if necessary to connect to the appropriate mail account.
的POP3接口应该能够使用身份验证和SSL连接,如果需要连接到相应的邮件帐户。
www.bing.com
8.
It's the only one that supports Kerberos authentication and supports LDAP with an Active Directory server -- that type of thing.
它是唯一一个支持Kerberos认证和带有活动目录服务器的LDAP(此类东西)的后端。
www.ibm.com
9.
AIX security commands and applications can be configured to call PAM modules through the use of existing loadable authentication framework.
可以对AIX安全性命令和应用程序进行配置,以便通过使用现有的加载式验证框架来调用PAM模块。
www.ibm.com
10.
This allows you to set up users for administration through Webmin that are not in the normal Unix authentication scheme.
这就使得您不通过常规的Unix验证机制就可以通过Webmin来设置进行管理的用户。
www-128.ibm.com
1.
NTLM authentication is required in networks where the server receives requests from clients that do not support Kerberos authentication.
在服务器接收客户端的请求而客户端不支持Kerberos身份验证的网络中,必须使用NTLM身份验证。
support.microsoft.com
2.
So the internal network is trusted, but only up to a point, and even on the internal network authentication and authorization are essential.
因此,内部网络固然可信,但应该有一个限度,即使是在内部网络上,身份验证和授权也很关键。
www.ibm.com
3.
Listing 4 shows how an authentication mechanism might remember the name of the last user to have logged on.
清单4展示了身份验证机制如何记忆最近一次登录的用户的名字。
www.ibm.com
4.
Kerberos is an authentication protocol that uses 'tickets' to verify the identity of a user in an unprotected network.
Kerberos是一种身份验证协议,它使用‘票据’验证未受保护的网络中的用户的身份。
www.ibm.com
5.
Upon authentication of a party in a web services transaction, a company's security policy often needs to be enforced.
当验证Web服务事务中的一方时,通常需要强制执行公司的安全性策略。
www.ibm.com
6.
Enter the primary and alternate RADIUS servers that this server will use for remote authentication and accounting.
输入此服务器要为远程身份验证和记帐使用的主要和辅助RADIUS服务器。
www.fan6.net
7.
Data sent with Basic and Digest Authentication is not encrypted, so the data can be seen by an adversary.
使用基本和简要身份验证发送的数据并不加密,因此,竞争对手也可能会看到这些数据。
msdn2.microsoft.com
8.
The technology, also known as two-factor authentication, provides users with an algorithmically generated number that is only briefly valid.
这项技术又被称为双重认证,向用户提供一个根据专门的算法生成的短期有效的数字组合。
www.cn.wsj.com
9.
SSD data in OTA authentication must be updated frequently by means of a security measure of a high level.
OTA鉴权中SSD数据需要以一种高级别的安全措施经常更新。
www.ceps.com.tw
10.
If you use Basic authentication , we strongly recommend that you use Transport Layer Security ( TLS ) encryption to help improve security .
如果您使用基本身份验证,我们强烈建议您使用传输层安全性(TLS)加密来帮助提高安全性。
www.bing.com
1.
Users and groups can be centralized into a single repository, allowing multiple servers to share the same user and authentication data.
用户和组可以集中管理,让多个服务器共享相同的用户和身份验证数据。
www.ibm.com
2.
To connect, you must provide at least the name of the server and the correct authentication information.
若要连接,您至少要提供服务器名称和正确的身份验证信息。
msdn2.microsoft.com
3.
By default, login controls integrate with ASP. NET membership to help automate user authentication for your Web site.
默认情况下,登录控件与ASP.NET成员资格集成,以帮助使网站的用户身份验证过程自动化。
msdn2.microsoft.com
4.
The related certificates of the company supplied by local office in foreign country or reign . (notarization and authentication).
由同外国(地区)企业有业务往来的金融机构出具的资本信用证明书;
bbs.ecocn.org
5.
Make sure that the Application Domain name on the XB60 matches that of the samples (hubowner), to avoid authentication failures.
确保XB60机器上的ApplicationDomain名称匹配样例的名称(hubowner),从而避免身份验证失败。
www.ibm.com
6.
The implementation of the Teaching Certificate Authentication System signifies that education has entered into a new stage.
教师资格制度的实行是教育事业进入新的发展阶段的标志。
www.ceps.com.tw
7.
In a resource forest, one forest is used for accounts and authentication, and a separate Exchange forest is used for Exchange.
在资源林中,某个林用于帐户和身份验证,而一个单独的Exchange林用于Exchange。
technet.microsoft.com
8.
Biro told me that his request for millions of dollars from the Parkers came after he had finished his authentication of their painting.
比罗告诉我,他要求帕克夫妇支付上百万美元是因为他已完成了他们的油画认证。
www.bing.com
9.
But, it is possible for WebSphere Application Server to trust other components in your infrastructure to perform the authentication.
但WebSphereApplicationServer也可能信任您的基础设施中的其他组件,由其执行身份验证。
www-128.ibm.com
10.
Typically, you use a cookie for this form of authentication, which is called cookie-based authentication.
通常,对于这种形式的身份验证您会使用Cookie,这称作基于Cookie的身份验证。
msdn2.microsoft.com
1.
Authentication: Authentication assertion deals with authentication of a subject by a specific mechanism at a particular time.
验证:验证断言处理主体在特定时刻、特定机制下的身份验证。
www.ibm.com
2.
Use any form of authentication that requires encrypted passwords. Do not encrypt data.
使用要求加密的密码的任何格式的身份验证。不要加密数据。
angel.w15.5tom.cn
3.
TLS with mutual authentication differs from TLS as it is usually implemented.
具有相互身份验证的TLS与通常实现的TLS不同。
technet.microsoft.com
4.
If an attacker can tamper with the authentication hardware, it might be possible to inject falsified digital data directly into the device.
如果攻击者可以篡改认证硬件,则可能将伪造的数字数据直接发射到设备中。
www-128.ibm.com
5.
The value you choose for the AUTHENTICATION parameter depends on your particular environment as well as local security policies.
为AUTHENTICATION参数选择的值依赖于具体环境和本地安全策略。
www.ibm.com
6.
Dynamic crosscutting is commonly used to facilitate the addition of logging or authentication to various methods in an object hierarchy.
动态横切通常用于帮助向对象层次中的各种方法添加日志记录或身份认证。
www-128.ibm.com
7.
Certificates provide for a powerful form of authentication and are highly desirable from security perspective.
证书提供一种强大的身份验证形式,从安全性的角度来说非常不错。
www.ibm.com
8.
For this reason, decided to conduct postal financial business fingerprint authentication system construction.
为此,决定进行邮政金融业务指纹身份认证系统建设。
www.fabiao.net
9.
Do not choose Digest authentication unless your deployments meets all the requirements for Digest authentication.
除非您的部署满足摘要式身份验证的所有要求,否则请不要选择摘要式身份验证。
msdn2.microsoft.com
10.
Along with authentication and in-transit data protection, XMPP can be applied at a variety of levels and is ideal as a middleware protocol.
通过结合身份验证和传输中的数据保护,XMPP可以应用在不同的层次,而且可以作为一个理想的中间件协议。
www.ibm.com
1.
In fact, custom code written for authentication or authorization is generally pretty easy to find or hack holes in.
事实上,在为进行身份验证或授权而编写的自定义代码中通常很容易找到漏洞或对漏洞进行攻击。
www.ibm.com
2.
At least, they really should all implement digest authentication, and stop using (or warn users about) basic authentication.
至少应该真正地实现数字摘要身份验证,停止使用基本身份验证(或者向用户发出警告)。
www.ibm.com
3.
At this point we immediately encounter two problems: peer authentication and authorization.
这里我们马上遇到了两个问题:对等的认证和授权。
www-128.ibm.com
4.
Let's also assume the userid used for authentication is contained in an LDAP attribute called uid.
再假定用作身份验证的userid包含于一个名为uid的LDAP属性中。
www.ibm.com
5.
The system could not log you on. The smartcard certificate used for authentication has expired.
系统无法让您登录。用于授权的智能卡证书已经过期。
www.fan6.net
6.
Before the directory server can be used in an LDAP realm, authentication data needs to be added to the directory server.
在LDAP域中使用目录服务器之前,需要将身份验证的数据添加到该目录服务器。
www.ibm.com
7.
SAML authentication and identity attribute statements are allowed to be passed into the MDM Server using the control object.
可以使用控制对象把SAML身份验证和身份属性语句传递给MDMServer。
www.ibm.com
8.
What was the encryption type requested during authentication handshake?
在身份验证握手期间请求的加密类型
www.ibm.com
9.
host-based authentication is not complete, however, until the ssh client has been configured to use host-based authentication, as well.
但是,在将ssh客户机也配置成使用基于主机的认证之前,基于主机的认证还没有完成。
www.ibm.com
10.
This value is typically set to the fully qualified hostname of the LDAP or RADIUS server used for authentication.
该值通常设为用于认证的LDAP或RADIUS服务器的全限定主机名。
www.ibm.com
1.
The last of these pushed the authentication service over its maximum capacity before we could complete putting new capacity in place.
最后我们还没来得及增加新的服务能力,身份验证服务就被推到了极限。
www.infoq.com
2.
Please contact your Administrator to ensure that the certificate being used for authentication is valid.
请与管理员联系以确保用于身份验证的证书是有效的。
www.kuenglish.info
3.
Here, the privilege service of DCE enhances the authentication service by adding the concept of privilege attribute certificates (PAC).
在这里,DCE的特权服务通过加入特权属性证书(PAC),增强了身份验证服务。
www.ibm.com
4.
By itself, Digest authentication is only a small improvement over Basic authentication.
式验证本身只是基本验证的稍微改良;
technet.microsoft.com
5.
A ticket is provided by an authentication server to the client using a cryptographic key of the intended server.
身份验证服务器使用目标服务器的一个密码密钥将票据提供给客户端。
www.ibm.com
6.
But authentication service in Kerberos is just a component of key-distribution service.
但身份验证服务在Kerberos中只是密钥分发服务的一个组成部分。
www.ibm.com
7.
Next, we investigated the effect of various server authentication methods on the time required to move binaries in and out of Subversion.
接下来,我们调查不同服务器认证方法对将二进制文件移入和移出Subversion所需时间的影响。
www.ibm.com
8.
Thus, to be able to use LDAP authentication, you need to write your own plug-in and enable it for DB2 to use it.
因此,为了能够使用LDAP身份验证,需要编写自己的插件并启用它,以使DB2能够使用它。
www.ibm.com
9.
930: The authentication server did not respond to authentication requests in a timely fashion.
930:身份验证服务器未及时响应身份验证请求。
support.microsoft.com
10.
Use any form of authentication required including clear text. Do not encrypt data.
使用要求的任何格式的身份验证,包括明文。不要加密数据。
angel.w15.5tom.cn
1.
HTTP are the verbs: GET, PUT and POST as well as a number of thoroughly tested solutions in the fields of authentication and encryption.
HTTP是动词:GET、PUT和POST以及很多在身份验证和加密领域经过仔细测试的解决方案。
www.ibm.com
2.
Performing proper authentication is usually a highly complex process.
执行合适的验证通常是一个高度复杂的过程。
www.ibm.com
3.
Until you are ready to implement a real authentication scheme, this is a good compromise.
在准备好实现真正的身份验证模式之前,这是一个很好的折衷办法。
www.ibm.com
4.
With users' passwords traveling over the network in plain text, you do not meet the requirement for secure authentication.
由于用户密码是在网络上以正文文本格式传输的,因此这并不能满足安全身份验证的需求。
www.ibm.com
5.
Windows negotiates the authentication method or an endpoint certificate can be used for authentication.
由Windows协商身份验证方法,或者使用端点证书进行身份验证。
technet.microsoft.com
6.
Out of these, authentication is one of the most important components.
在这些组件中,身份验证是最重要的。
www.ibm.com
7.
If every program had to define its own authentication logic, it would be a mess.
如果每个程序不得不定义自己的身份验证逻辑,就会很混乱。
www.ibm.com
8.
Listing 1 shows the relevant part of a PAM (pluggable authentication module), which places every user except root into a private namespace.
清单1给出一个PAM(pluggableauthenticationmodule,可插入身份验证模块)的部分代码,它将除根用户之外的每个用户放在一个私有名称空间中。
www.ibm.com
9.
Database-level security measures including authentication and authorization might also be used to enhance application security.
数据库级的安全措施,包括身份验证和授权,也可以用于加强应用程序的安全性。
www.ibm.com
10.
To ensure the maximum performance, memcached does not provide any form of security, either in authentication or encryption.
为了确保最佳性能,memcached并未提供任何形式的安全性,没有身份验证,也没有加密。
www.ibm.com
1.
Classes for authentication and to help secure information transmitted between a client and a server.
类进行身份验证,并帮助保护在客户端和服务器之间传输的信息的安全。
msdn2.microsoft.com
2.
Of course, like the other authentication credentials it stores, Active Directory will also store biometric data encrypted.
当然,正如保存的其他身份验证凭据一样,活动目录也会将生物特征识别数据加密保存。
shi-wei.net
3.
Do not send the secret through the chat window, or this authentication method could be compromised with ease.
此时请不要将此秘密写到您的聊天视窗中,否则以后就很容易被破解了。
translations.launchpad.net
4.
In this case, the server-side authentication lets you know that you really are connected to your bank and not some look-alike imposter.
在此情况下,服务器端身份验证让您能够知道已确实连接到了您的银行,而不是某个貌似的钓鱼网站。
www.ibm.com
5.
Object, which can be used to determine the identity of the calling client when the client used integrated security for authentication.
对象,该对象可用于在客户端使用身份验证的集成安全性时确定调用客户端的标识。
msdn2.microsoft.com
6.
Two services need to be configured for LDAP authentication to work correctly, the system naming service and the authentication service.
LDAP身份验证要想正确地工作,需要配置两个服务:系统命名服务和身份验证服务。
www.ibm.com
7.
Authentication shows the search policy used for authentication and most other administrative data.
鉴定显示用于鉴定和大多数其他管理数据的搜索策略。
docs.info.apple.com
8.
With economic development, seal has been applied to people's daily life as a means of identity authentication.
随着经济的发展,印鉴作为一种身份认证手段已广泛应用于人们的日常生活中。
www.fabiao.net
9.
Delegate responsible for selecting the certificate used for authentication.
委托,负责选择用于身份验证的证书。
msdn2.microsoft.com
10.
The user details service returns details of the user or throws an authentication exception if it cannot find details of the user.
userdetailsservice返回用户的详细信息,或者,如果找不到用户详细信息则抛出身份验证异常。
www.ibm.com
1.
We add the word "robust" because an easily forged authentication is of little value.
我们加了“可靠”这个词,这是因为容易被伪造的身份验证是没有价值的。
www-128.ibm.com
2.
None of the authentication methods supported by your IMAP server ( if any ) are supported on this computer .
您的IMAP服务器(如果有的话)所支持的任何验证方式在这台计算机上均不受支持。
www.bing.com
3.
Therefore, a speech content authentication method is needed to authenticate whether the speech content is tampered or not.
所以需要通过语音内容认证方法来检测语音内容是否被篡改过。
www.fabiao.net
4.
The system could not log you on. The smartcard certificate used for authentication has been revoked.
系统无法让您登录。用于授权的智能卡证书已经被吊销。
www.fan6.net
5.
with-xauth=DIR -- This option specifies the location of the xauth command used for X authentication.
with-xauth=DIR——此选项指定用于X身份验证的xauth命令的位置。
www.ibm.com
6.
Principals share their cryptographic key with the authentication server of the realm to which they belong.
主体与它们所属领域的身份验证服务器共享密钥。
www.ibm.com
7.
WebSphere Application Server administrative services are used for authentication and role management.
WebSphere应用服务器管理服务可用于身份验证和角色管理。
www.ibm.com
8.
As one of its main appeals , RSA and DSA authentication promise the capability of establishing connections to remote systems .
就能够同远程系统建立连接,这是它的主要魅力之一。
www.bing.com
9.
The same realm can be shared between WebSphere administration and for application security authentication and authorization.
WebSphere管理和应用程序安全身份验证与授权之间可以共享同一个领域。
www-128.ibm.com
10.
It is easy to confuse the mechanism of authentication with that of authorization.
认证和授权的机制很容易被混淆在一起。
www.bing.com
1.
Fix: The Kerberos authentication protocol requires that the clock skew between a server and a client is no greater than 5 minutes.
解决方案:Kerberos身份验证协议要求服务器和客户机之间的时钟差不大于5分钟。
www.ibm.com
2.
This attack can be combined with Replay attack to bypass authentication, and with Single message XDoS to increase its impact.
这种攻击可以与应答攻击联合使用,以绕过身份验证,并且再加上单消息XDoS来增加其危害程度。
www.ibm.com
3.
The service was unable to write the authentication or accounting record. Make sure the drive is not full and is connected to the server.
服务无法写入验证或计帐记录。请确认驱动器尚未满并连接至服务器。
angel.w15.5tom.cn
4.
The first thing we're going to need is authentication and the concept of a current user.
我们将要面对的第一点就是认证和当前用户的概念。
www.ibm.com
5.
At this point, client has the session key that client can use for authenticating itself to the authentication service.
现在,客户端拥有了会话密钥,它可以使用该密钥向身份验证服务验证自身。
www.ibm.com
6.
This cookie enables subsequent requests to the same WebSphere SSO domain to be sent without a re-authentication needing to occur.
此Cookie允许在不需要出现重新身份验证的前提下发送对相同WebSphereSSO域的后续请求。
www.ibm.com
7.
Because there is no authentication currently set in your application, performing a retrieving the remoteUser at this point will return null.
因为在当前的应用中并未采用身份认证,此时执行remoteUser检索将会返回空值。
www.ibm.com
8.
The first step is to specify in the plug-in configuration file the name of the authentication database and the user connection information.
第一步是在插件的配置文件中指定身份验证数据库和用户连接信息。
www.ibm.com
9.
Similarly, the private key used to sign the receipt in the HTTP response should be the same as the one for the SSL server authentication.
同样地,用来在HTTP响应中签名收据的专用密钥也应与用于SSL服务器身份验证的密钥相同。
www.ibm.com
10.
Many users find the requirement for a specific duration of password to be a nonburdensome addition to their authentication process.
许多用户发现密码的特定输入时间要求不会给验证过程带来太多困扰。
www.ibm.com
1.
PAM offers database and system developers a great deal of flexibility and control over authentication policies.
PAM为数据库和系统开发人员提供了很大的灵活性以及对身份验证策略的控制能力。
www.ibm.com
2.
If you don't have a Twitter account, you need one to get started or, at least, access to a Twitter account's authentication credentials.
如果没有Twitter帐户,则需要一个帐户来启动程序,或者至少访问Twitter帐户的身份验证凭证。
www.ibm.com
3.
Be very wary of going beyond the authentication mechanisms provided by the Java EE specification.
要注意不要脱离JavaEE规范提供的验证机制。
www.ibm.com
4.
These can be used for sender authentication, where the HTTP client is supposed to send a message.
它可以用于发送方身份验证,在这种情况下HTTP客户机应该用来发送消息。
www.ibm.com
5.
The Authentication namespace provides a set of enumerations that describe the security of a connection.
Authentication命名空间提供一组描述连接安全性的枚举。
msdn2.microsoft.com
6.
The type of authentication an instance uses depends on the AUTHENTICATION option for the Service Broker endpoint of each instance.
实例使用的身份验证类型取决于每个实例的ServiceBroker端点的AUTHENTICATION选项。
msdn2.microsoft.com
7.
And, of course, authorization is of little value without robust authentication.
当然,如果没有可靠的身份验证,授权也就失去了价值。
www.ibm.com
8.
By default, Cloudscape does not require a userID and password to establish a connection, as it relies on operating system authentication.
默认情况下,Cloudscape建立连接不需要userID和口令,因为它依靠操作系统身份验证。
www.ibm.com
9.
As one of the pivotal technologies of information security, digital signature provides authentication, integrality and incontestableness.
数字签名提供认证性、完整性和不可否认性,是信息安全的核心技术之一。
www.fabiao.net
10.
At least one authentication method must be specified.
至少要指定一个身份验证方法。
www.fan6.net
1.
Configuring authentication for Derby databases is available; however, this has not been set up for the airlinesDB database.
对Derby数据库是可以配置认证的,但是这里还没有为airlinesDB数据库设置认证。
www-128.ibm.com
2.
Property contains the name of the data provider that provides the authentication information for the.
控件提供身份验证信息的数据提供程序的名称。
msdn2.microsoft.com
3.
Gets the algorithm used for generating message authentication codes ( MACs ) .
获取用于生成消息身份验证代码(MAC)的算法。
www.bing.com
4.
Signer authentication, also known as digital signatures, ensures that the identity of the message is valid.
签名者身份验证(也称为数字签名)确保消息发送者的身份是有效的。
www.ibm.com
5.
The administrator may also allow additional users to be administrators of the authentication information.
管理员还可以允许其他用户管理身份验证信息。
www.ibm.com
6.
Allow multiple authentication mechanisms to be configured and leveraged within the Linux operating system.
允许在Linux操作系统中配置并权衡使用多个认证机制。
www-128.ibm.com
7.
Most users would be hard-pressed to clear their HTTP authentication credentials for a site by any means other than logging out.
用户常常被要求以某种方式清除他们对某个站点的HTTP身份验证凭证。
www.ibm.com
8.
Configuring SSL to filter on the distinguished name in a certificate provides an effective form of authentication.
将SSL配置为根据证书中的专有名称进行筛选,这样可以提供一种有效的身份验证方式。
www.ibm.com
9.
If ExchangeServer is enabled as an authentication mechanism, the certificate selection process continues to the next step.
如果已将ExchangeServer作为身份验证机制启用,证书选择过程会继续进行下一步。
technet.microsoft.com
10.
Use this authentication method if you want to be able to manage printers from any browser.
如果您希望能够从任何浏览器管理打印机,请使用此身份验证方法。
support.microsoft.com
1.
This organization of projects allows you to use Windows authentication to gain access to the database and test your application.
这种项目结构使您得以使用Windows身份验证来访问数据库和测试应用程序。
msdn2.microsoft.com
2.
As the entry point for mashup applications, the mashup server is responsible for the authentication and authorization of each user.
作为mashup应用程序的进入点,mashup服务器负责每个用户的认证和授权。
www.ibm.com
3.
A login is used for user authentication and a database user account is used for database access and permissions validation.
登录用于用户身份验证,而数据库用户帐户用于数据库访问和权限验证。
www.cnblogs.com
4.
Using Windows Authentication (also known as integrated security) is a more secure way to control access to a database.
若要控制对数据库的访问,一种较为安全的方法是使用Windows身份验证(也称为集成安全性)。
msdn2.microsoft.com
5.
It is only through user authentication and end-system security assessment, the terminal can access to a dynamic network.
只有通过了用户身份鉴别且终端系统安全状况评估后,终端才能够接入到动态的网络中。
www.fabiao.net
6.
As a primary means of authentication in Information security technology, digital signature has been widely used.
作为信息安全技术中一种主要的认证手段,数字签名得到了广泛的应用。
www.zidir.com
7.
By the time you are prompted for a password, the desired form of authentication has already failed.
当您被提示输入密码时,期望形式的认证已经失败。
www-128.ibm.com
8.
Gets or sets the domain name to be used for basic authentication and digest authentication.
获取或设置要用于基本身份验证和简要身份验证的域名。
msdn2.microsoft.com
9.
At least in the case of MDBs, you can specify the authentication information on the activation specification.
至少对于MDB,可以在活动规范中指定身份验证信息。
www.ibm.com
10.
One of the first tasks was to integrate the Metaverse authentication process with the IBM Bluepages intranet login.
首要任务之一是把Metaverse的身份验证过程与IBMBluepages内部网登录集成起来。
www.ibm.com
1.
And supply the Internet URL and the Windows Authentication credentials used to access the Web server over a secure HTTPS connection.
并提供用于通过安全HTTPS连接访问Web服务器的InternetURL和Windows身份验证凭据。
msdn2.microsoft.com
2.
SSL was developed to address these problems of confidentiality and server authentication, and is now widely used .
开发SSL就是为了解决这些保密性和服务器身份验证问题的,它现已得到了广泛使用。
www.ibm.com
3.
I encourage you to use a well-formed strong password, but it's not that important if you stick with Windows Authentication Mode.
我提倡您使用格式规范的强密码,但是如果使用Windows身份验证模式,这一点就并不那么重要了。
msdn2.microsoft.com
4.
So far the implementation of two-factor authentication has been progressing satisfactorily.
迄今推行双重认证的进度令人满意。
www.info.gov.hk
5.
By default, the certificates that are used for authentication and encryption for TLS are self-signed certificates.
默认情况下,用于TLS的身份验证和加密的证书是自签名证书。
technet.microsoft.com
6.
Password authentication is not directly comparable to SSL authentication in terms of security.
就安全性来说,密码身份验证无法与SSL身份验证进行直接的比较。
www-128.ibm.com
7.
By default, Excel Services will attempt to use Windows integrated authentication to connect to external data sources.
默认情况下,ExcelServices将尝试使用Windows集成身份验证连接到外部数据源。
office.microsoft.com
8.
Dialog security provides encryption, remote authentication, and remote authorization for a specific conversation.
对话安全模式可以为特定会话提供加密、远程身份验证和远程授权。
msdn2.microsoft.com
9.
The credentials you supplied did not pass authentication.
提供的凭据没有通过身份验证。
www.fan6.net
10.
This parameter can be used to specify the default permissions and authentication methods that are assigned to the Send connector.
此参数可以用于指定为发送连接器分配的默认权限和身份验证方法。
technet.microsoft.com
1.
Among the authentication technologies, access authentications are described both as mobile access and fixed network access.
其中,接入认证分为移动接入和固定接入阐述;
www.fabiao.net
2.
Windows SharePoint Services will disable Kerberos authentication in Internet Information Services on your server during installation.
安装期间,WindowsSharePointServices将在您的服务器上禁用Internet信息服务中的Kerberos身份验证。
www.microsoft.com
3.
There was either an external authentication database error or you are not allowed to update your external account.
这可能是由于外部验证数据库错误或您被禁止更新您的外部账号。
en.wikinews.org
4.
To determine whether your firewall server allows for NTLM authentication, see the product documentation for your firewall product.
若要确定防火墙服务器是否允许NTLM身份验证,请参阅防火墙产品的产品文档。
technet.microsoft.com
5.
After clicking Digest authentication for Windows domain servers, you might be prompted to confirm your choice.
单击“Windows域服务器的摘要式身份验证”之后,系统可能提示您确认所做的选择。
msdn2.microsoft.com
6.
Alternatively, Apache can integrate with a multitude of authentication systems, so user-based authentication is another alternative.
另外,Apache可以集成各种身份验证系统,所以基于用户的身份验证是另一种可选方法。
www.ibm.com
7.
This provider will consume some token and deduct logon data consumable by an Authentication Provider from it.
这种提供者接受某个令牌并从中推导出身份验证提供者可使用的登录数据。
www.ibm.com
8.
Such experience could be used for reference during the authentication of home-made brandy.
应用扩展到国产白兰地,可作为判断真假时的参考和借鉴。
www.chemyq.com
9.
The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe.
Kerberos身份验证协议是一种安全协议,用于验证数据以帮助确保用户和网络服务均是安全的。
technet.microsoft.com
10.
If client authentication is to be employed for the connection, the server also sends a request for the client's certificate.
如果客户机还要为这个连接进行认证,那么服务器还会发送一个请求,索取客户机的证书。
www.ibm.com
1.
While not generally recommended, it is possible to revert back to Windows Authentication after you have tried out the sample.
虽然通常情况下不建议这样做,但体验过示例之后是可以恢复到Windows身份验证的。
msdn2.microsoft.com
2.
Even in the case of LDAP authentication, the profile information is synchronized between the database and the LDAP server.
甚至在LDAP认证的情况下,还在数据库和LDAP服务器之间同步概要文件信息。
www.ibm.com
3.
The $SSH_AUTH_SOCK (short for SSH Authentication Socket) is the location of a local socket which applications can use to speak to ssh-agent.
$SSH_AUTH_SOCK(即SSHAuthenticationSocket的缩写)是一个本地套接字的位置,应用程序使用它与ssh-agent通信。
www.ibm.com
4.
As the name suggests, this typically means performing authentication.
顾名思义,这通常意味着执行验证。
www.ibm.com
5.
Both services create an authentication token, which might be used by the client application to authenticate individual users.
两者都会创建一个认证令牌,可被客户程序用来鉴别单个用户的身份。
www.infoq.com
6.
However, cookie-based authentication is not an option for devices that do not support cookies.
但是,对于不支持Cookie的设备,则不能选择基于Cookie的身份验证。
msdn2.microsoft.com
7.
If TLS is used for mutual authentication , both the sending server certificate and the receiving server certificate must be validated .
如果TLS用于相互身份验证,则发送服务器证书和接收服务器证书都必须验证。
www.bing.com
8.
It therefore lets you to plug in the appropriate authentication service to meet your security requirements.
它使您可以插入合适的身份验证服务来迎合您的安全需求。
www.ibm.com
9.
You also received an introduction on the basics of the DES authentication process and examined a code snippet of a Secure RPC application.
您还了解了有关DES身份验证过程的基本内容,并研究了安全RPC应用程序的代码片段。
www.ibm.com
10.
In most applications, authentication is done through a combination of a user name and password.
在大多数应用程序中,身份验证是通过用户名和密码的组合完成的。
www.ibm.com
1.
This article describes a fingerprint authentication system with an universally applicable characteristics.
本文介绍的指纹认证系统具有普遍适用的特点。
www.fabiao.net
2.
This article assumes that you will use a third-party certificate authority (CA) to provide authentication for your Web server.
本文假定您使用第三方证书颁发机构(CA)为您的Web服务器提供身份验证。
blog.163.com
3.
He frames the answer as a set of questions that provide insights into the appropriate authentication option.
他把这些解释组织成一组问题,来检视适合的验证机制。
www.infoq.com
4.
Check the documentation of your host to determine which authentication provider it uses and what roles users can belong to.
请查看主机的文档,确定它使用的身份验证提供程序以及用户可以属于的角色。
msdn2.microsoft.com
5.
Visit the OpenID Foundation for information on authentication as well as the goals of the Foundation within the open source community.
访问OpenIDFoundation,了解关于身份验证的信息以及这个基金会打算在开放源码社区中实现的目标。
www.ibm.com
6.
Specifies the URL to which the request is redirected for logon, if no valid authentication cookie is found.
指定如果找不到任何有效的身份验证Cookie,将请求重定向到的用于登录的URL。
msdn2.microsoft.com
7.
Keystroke rhythm is an identity authentication technique which takes persons behaviour characteristics as the basis.
击键韵律是以人的行为特征为基础的身份认证技术。
www.ceps.com.tw
8.
The project proposal in applying for the establishment of an inspection and authentication institution involving foreign investment.
申请设立外商投资进出口商品检验鉴定机构的项目建议书。
www.sh360.net
9.
Know why my short description of ARP doesn't mention any sort of authentication method?
知道为什么在我对ARP的简短描述中没有提到任何形式的认证方法吗?
www.bing.com
10.
However, in the conclusion of his article he urges readers "to follow someone else's example and not roll your own authentication scheme" .
然而,在文章的结论中他建议读者“最好参照别人的例子,而不应自创认证模式”。
www.infoq.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/1/12 6:29:22