网站首页  词典首页

请输入您要查询的英文单词:

 

单词 authentication and authorization
释义

authentication and authorization

  • 网络验证和授权;鉴别与授权;认证与授权
1.
验证和授权
验证和授权(Authentication and Authorization)因为缺省角色实质上是被分配给每一个用户的,它通常需要伴随一个业务规则用 …
hc1988.diandian.com
2.
鉴别与授权
计算机常用英语 – 铁血网 ... Aactive Network 动态网络 Authentication and Authorization 鉴别与授权 Auditing 审计,计审 ...
bbs.tiexue.net
3.
认证与授权
《Pro ASP.NET MVC... ... Chapter 22:Authentication and Authorization 第22章:认证与授权 Chapter 23:Deployment 第23章…
blog.csdn.net
4.
权限控制与授权
ASPNET教程,ASPNET案例:在ASP... ... 4 日记本( Diary Products) · 权限控制与授权Authentication and Authorization) ...
www.zhujiangroad.com
5.
身份验证和授权
Orchard中文 -... ... Request filters( 请求过滤器) Authentication and authorization身份验证和授权) Navigation( 导航) ...
www.orchardch.com
6.
认证和授权
Application Architecture Guide 2.0 - CH... ... Caching 缓存 Authentication and Authorization 认证和授权 ...
tech.ddvip.com
7.
验证及授权
验证及授权(Authentication and Authorization),使用者必须了解及采行相关安全防护机制。
php5.idv.tw
8.
鉴别和授权
电脑术语词典,m ... Logon and Startup Options 登录和初始化选择 Alpha AXP,DEC;Authentication and Authorization 鉴别和
www.wendian.com.cn

例句

释义:
1.
Shiro is a framework implemented in the Java language that provides both authentication and authorization in an easy-to-use API.
Shiro是一个用Java语言实现的框架,通过一个简单易用的API提供身份验证和授权。
www.ibm.com
2.
Acegi is now ready to process incoming requests for authentication and authorization.
Acegi现在可以对传入的请求执行身份验证和授权了。
www.ibm.com
3.
Resolution depends on the authentication and authorization methods being used in the database, as well as the connection string.
解决办法取决于正用于数据库的身份验证和授权方法以及连接字符串。
msdn2.microsoft.com
4.
So the internal network is trusted, but only up to a point, and even on the internal network authentication and authorization are essential.
因此,内部网络固然可信,但应该有一个限度,即使是在内部网络上,身份验证和授权也很关键。
www.ibm.com
5.
At this point we immediately encounter two problems: peer authentication and authorization.
这里我们马上遇到了两个问题:对等的认证和授权。
www-128.ibm.com
6.
Database-level security measures including authentication and authorization might also be used to enhance application security.
数据库级的安全措施,包括身份验证和授权,也可以用于加强应用程序的安全性。
www.ibm.com
7.
The same realm can be shared between WebSphere administration and for application security authentication and authorization.
WebSphere管理和应用程序安全身份验证与授权之间可以共享同一个领域。
www-128.ibm.com
8.
As the entry point for mashup applications, the mashup server is responsible for the authentication and authorization of each user.
作为mashup应用程序的进入点,mashup服务器负责每个用户的认证和授权。
www.ibm.com
9.
In the next Mastering Grails article, you'll flesh out the user authentication and authorization story more fully.
在下一篇精通Grails的文章中,您将更为全面地了解用户身份验证和授权的相关内容。
www.ibm.com
10.
Security Assertion Markup Language (SAML) is a protocol to transport authentication and authorization information in an XML message.
安全性断言标记语言(SecurityAssertionMarkupLanguage(SAML))是以XML消息传输认证和授权信息的协议。
www.ibm.com
1.
These interfaces describe aspects of the current user that are independent of a specific authentication and authorization architecture.
这些接口描述当前用户与特定身份验证和授权结构无关的方面。
msdn2.microsoft.com
2.
The "tiny little" authentication and authorization system for this "tiny little" blog application is now in place.
这个“微型”博客应用程序的“微型”身份验证和授权系统现在已经初具雏形。
www.ibm.com
3.
In the FTP server security credential page, add your Java Authentication and Authorization Services (JAAS) alias for your FTP server.
在FTPserversecuritycredential页面上,添加您的FTP服务器的Java身份验证和授权服务(JAAS)别名。
www.ibm.com
4.
Accidental changes made to the user registry often contribute to user authentication and authorization problems .
意外地修改用户注册表常常会造成用户身份验证和授权问题。
www.bing.com
5.
Identification, authentication, and authorization tokens are usually maintained as cookies.
身份识别、验证和授权标志通常以cookies形式维护。
www.ibm.com
6.
User-centric security for the Java platform was introduced with the debut of the Java Authentication and Authorization Service API (JAAS).
Java平台的以用户为中心的安全措施与Java身份认证与授权服务API(JAAS)是同时推出的。
www.ibm.com
7.
Transaction confidentiality is achieved with authentication and authorization facilities .
交易机密性通过认证和授权设施来实现。
www.bing.com
8.
From a business perspective, this request is used to check the user authentication and authorization, which should not be cached.
从业务角度看,这个请求用于检查用户验证和授权,不应该被缓存。
www.ibm.com
9.
Within the deployment descriptor, you can configure specific realms for authentication and authorization.
在部署描述中,可以为身份验证和授权配置特定的领域。
www.ibm.com
10.
The only requirement is that the attacker must have authentication and authorization privileges over Bluetooth.
唯一需要的就是攻击者必须介由蓝牙系统拥有授权和验证权限。
www.bing.com
1.
Service usage is cumbersome due to multiple Authentication and Authorization systems needed to give partners access.
由于合作伙伴需要访问多个身份验证和授权系统,因此服务的使用变得非常的繁琐。
www.ibm.com
2.
ASP. NET operates in conjunction with Internet Information Services (IIS) to provide several authentication and authorization options.
ASP.NET与Internet信息服务(IIS)组合使用,可以提供多个身份验证和授权选项。
msdn2.microsoft.com
3.
As I previously mentioned, Acegi uses security filters to provide authentication and authorization services to enterprise applications.
正如我前面提到的一样,Acegi使用安全过滤器为企业应用程序提供身份验证和授权服务。
www.ibm.com
4.
Describes conversion issues relating to Java Authentication and Authorization Service (JAAS) applications.
说明与Java身份验证和授权服务(JAAS)应用程序相关的转换问题。
msdn2.microsoft.com
5.
Authentication and Authorization extend the Equinox Security model to allow for security in a distributed system.
扩充了Equinox安全模型的认证和授权将增强分布式系统的安全性。
www.infoq.com
6.
Changing required authentication and authorization methods will require matching changes to the clients that contact this service.
对认证和授权方法的修改,与服务相联系的客户端的修改与其匹配。
www.cublog.cn
7.
The consequence of eliminating the layer of separation between authentication and authorization results in decreased security.
解除身份验证与授权之间的隔阂的后果是安全性更低。
www.ibm.com
8.
WebSphere sMash helps protect against malicious code by implementing system-level authentication and authorization.
通过实现系统级身份验证和授权,WebSpheresMash可以帮助防御恶意代码。
www.ibm.com
9.
For Authentication and Authorization checks a security token needs to be supplied.
对于身份验证和授权检查,需要提供安全令牌。
www.ibm.com
10.
You configure EJB authentication and authorization by defining security roles in the deployment descriptor under which each method executes.
EJB的身份验证和授权配置方法为:在部署描述符中定义安全角色,每个方法将依据部署描述符执行。
www.ibm.com
1.
For a link, to test authentication and authorization requests from Windows clients.
获得相关链接,它可用于测试来自Windows客户机的验证和授权请求。
www-128.ibm.com
2.
Shiro is a framework in the Apache Incubator that lets you add authentication and authorization to your applications.
Shiro是ApacheIncubator内的一个框架,可让您向应用程序中添加身份验证和授权。
www.ibm.com
3.
It provides the consistent authentication and authorization services necessary for universal access.
它为通用访问提供了所需的一致的身份验证和授权服务。
www.ibm.com
4.
This gets you firmly into authentication and authorization, as well as very highly customized content.
这为您带来稳定的身份验证和授权,以及高度定制的内容。
www.ibm.com
5.
Proxy authentication and authorization: The middle-tier server performs authentication.
代理身份验证和授权:中间层服务器执行身份验证。
www.ibm.com
6.
Multiple authentication and authorization of services are frustrating operators.
多种服务身份验证和授权让操作员感到无所适从。
www.ibm.com
7.
For brevity, this example also omits users and sessions, formatting, and any kind of authentication and authorization.
为了尽量简洁,该例子还省略了用户和会话、格式以及各种身份验证和授权。
www.ibm.com
8.
And it is flexible enough to accommodate a diverse variety of authentication and authorization needs.
并且RBAC拥有足够的灵活性,可以满足身份验证和授权的多样性需求。
www.ibm.com
9.
Which of the following components of SAMBA is responsible for providing authentication and authorization services?
下面选项中哪个是负责提供身份验证和授权服务的SAMBA的组件?
manage.cwzd.com.cn
10.
The SAML standard provides interfaces that allow third parties to send their requests for authentication and authorization.
SAML标准提供了允许第三方实体请求验证和授权信息的接口。
www.ibm.com
1.
Configuring the RADIUS server consists of configuring the server, the client, and the user (both for authentication and authorization).
RADIUS服务器的配置包括对服务器、客户机和用户的配置(都是用于验证和授权)。
www.ibm.com
2.
This should set the authentication and authorization methods for the report server to the default Windows security.
此操作将把报表服务器的身份验证方法和授权方法设置为默认的Windows安全性。
msdn2.microsoft.com
3.
The ability to do end-to-end authentication and authorization is key to doing real distributed, multi-org composite apps.
有能力完成端到端的认证和授权是进行真正的分布式、跨组织组合应用的关键所在。
www.infoq.com
4.
However, this will not address the need for service-level authentication and authorization.
然而,这不能满足服务层的验证和授权的需求。
www.ibm.com
5.
This topic summarizes the authentication and authorization options available to Web services built using ASP. NET.
本主题总结使用ASP.NET生成的Web服务可用的身份验证和授权选项。
msdn2.microsoft.com
6.
There are plug-ins to integrate with a directory, to provide authentication and authorization.
有一些用于与目录相集成的插件,提供验证和授权。
www.ibm.com
7.
There are essentially two authentication and authorization strategies for remote objects that are accessed by . NET Web applications.
NETWeb应用程序访问的远程对象可以使用两个基本的身份验证和授权策略。
zxianf.blog.163.com
8.
It is now easier than ever to add authentication and authorization to your Web applications.
现在向Web应用程序添加身份验证和授权比以往任何时候都简单。
msdn2.microsoft.com
9.
Log in to enter credentials for authentication and authorization as a super user.
登录以作为超级用户输入认证和授权的凭证。
www-128.ibm.com
10.
Both the DB2 and IDS security model consist of two main components: authentication and authorization.
DB2和IDS安全模型都由两个主要组件组成:身份验证和授权。
www.ibm.com
1.
All protected pages are developed using JSF components, whereas Acegi serves the login page and performs authentication and authorization.
所有受保护页面都是使用JSF组件开发的,而Acegi提供登录页面并执行身份验证和授权。
www.ibm.com
2.
This change is reflected in other applications that also use LDAP for authentication and authorization.
这种更改会反映在其他同样使用LDAP进行身份验证和授权的应用程序中。
www.ibm.com
3.
As with any administrative call, the JMX call requires authentication and authorization.
对于任何管理调用,JMX调用都要求进行身份验证和授权。
www-128.ibm.com
4.
These mediations may include any or all of validation, logging, audit, authentication and authorization.
这些中介可以包含任何或全部验证、日志记录、审核、身份验证和授权。
www.ibm.com
5.
Authentication and authorization are combined together in RADIUS.
在RADIUS中,验证和授权是组合在一起的。
www.ibm.com
6.
This allows a Realm to respond to both authentication and authorization operations as necessary.
必要时,还允许单个Realm同时响应认证和授权操作。
www.infoq.com
7.
In the next section, you will see how to set up authentication and authorization rules using LDAP.
在下一部分中,您可了解到如何利用LDAP来建立认证与授权规则。
www.ibm.com
8.
Provides a tutorial on using login controls to add a login page, authentication, and authorization.
提供有关教程,说明如何使用登录控件添加登录页、身份验证和授权。
msdn2.microsoft.com
9.
Lets you test authentication and authorization requests from a Windows client.
让您可以测试来自Windows客户的验证和授权请求。
www-128.ibm.com
10.
In any distributed environment, in order to maintain universal access, consistent authentication and authorization services are a necessity.
在任何分布式环境中,为了提供普遍的访问,都需要一致的身份验证和授权服务。
www.ibm.com
1.
If you want your site to be compatible with Passport authentication and authorization, this is the provider you should use.
如果希望您的站点与Passport身份验证及授权兼容,则应该使用该提供程序。
msdn2.microsoft.com
2.
Some SOA initiatives might need to mix and match multiple authentication and authorization mechanisms.
有些SOA活动可能需要混合使用多个身份验证和授权机制并进行匹配。
www.ibm.com
3.
At a high level, you apply authentication and authorization rigorously.
在高层上,严格应用身份验证和授权。
www.ibm.com
4.
Explains how authentication and authorization work for ASP. NET Web services.
说明如何对ASP.NETWeb服务进行身份验证和授权。
msdn2.microsoft.com
5.
At a high level, we apply authentication and authorization rigorously.
在高级别上,我们严格应用身份验证和授权。
www-128.ibm.com
6.
Demonstrates how to implement custom authentication and authorization, and how to override the application thread's default identity.
演示如何实现自定义的身份验证和授权以及如何重写应用程序线程的默认标识。
msdn2.microsoft.com
7.
Of this series showed how to build a secure portal to provide centralized authentication and authorization.
展示了如何构建一个安全门户以提供集中的验证和授权。
www-128.ibm.com
8.
Most applications need to address the issues of user authentication and authorization.
大多数应用程序需要解决用户的验证和授权问题。
www.infoq.com
9.
It is based on XML digital signatures, XML encryption, and an authentication and authorization scheme similiar to SAML.
它以XML数字签名、XML加密以及类似于SAML的认证和授权方案为基础。
www.ibm.com
10.
IBM DB2 CM provides various levels of security through authentication and authorization.
IBMDB2CM通过身份验证和授权提供了各种级别的安全性。
www.ibm.com
1.
This is the action where all the authentication and authorization steps for any particular request are performed.
这是在其中对任何特定请求执行所有身份验证和授权步骤的操作。
www.ibm.com
2.
You can also set authentication and authorization configuration for XML management.
您还可以为XML管理设置身份验证和授权配置。
www.ibm.com
3.
As a result, authentication and authorization is required for the Web project.
作为结果,Web工程就需要身份验证及授权。
www-128.ibm.com
4.
We see a lot of user authentication and authorization strategy.
我们看到过很多鉴别和授权用户的战略。
www.brar.cn
5.
Demonstrates how to implement custom authentication and authorization by using classes that derive from.
派生的类来实现自定义身份验证和授权。
msdn2.microsoft.com
6.
Do the services support both authentication and authorization?
服务同时支持身份验证和授权码?
www.ibm.com
7.
Describes how to use the. NET Framework for user authentication and authorization.
描述如何将.NETFramework用于用户身份验证和授权。
msdn2.microsoft.com
8.
You should implement such authentication and authorization of valid clients in WSManager layer.
您应该在WSManager层中执行有效客户的身份验证和授权使用。
www.ibm.com
9.
SQL Server Authentication and authorization can be configured to control access to SQL Server and SQL Server publications.
可以配置SQLServer身份验证和授权来控制对SQLServer和SQLServer发布的访问。
msdn2.microsoft.com
10.
Authentication and authorization establish who your users are and what resources they can access.
身份验证和授权确定您的用户是谁以及他们可以访问哪些资源。
msdn2.microsoft.com
1.
It does the job of authentication and authorization.
它可以完成认证和授权的工作。
www-128.ibm.com
2.
Configuring IIS authentication and authorization specifies the clients that can invoke the SQL Server Compact Edition Server Agent.
配置IIS身份验证和授权将指定可以调用SQLServerCompactEdition服务器代理的客户端。
technet.microsoft.com
3.
AAA info file can be used not only for identity mapping, but also for authentication and authorization.
AAA信息文件不仅可用于身份映射,还可以用于身份验证和授权。
www.ibm.com
4.
Now that authentication and authorization has been covered, the message integrity part is easy.
了解了身份验证和授权之后,消息完整性部分就容易理解了。
www.ibm.com
5.
Identification, authentication, and authorization
标识、身份验证和授权
www.ibm.com
6.
Integrated security features including authentication and authorization support integrated with existing enterprise security infrastractures
集成的安全特性包括对认证和授权的支持并与现有的企业安全基础设施相集成。
www.infoq.com
7.
Consumers, Carrier Networks and Wireless Devices Protected Through Next Generation Authentication and Authorization
用户、运营商网络和无线设备的安全性将受到下一代认证与授权技术的保护
brew.qualcomm.com
8.
How the Message Transport Authentication and Authorization Process Works
邮件传输身份验证和授权过程如何工作
technet.microsoft.com
9.
An Authentication and Authorization Scheme for Distributed System and Its Application
一种分布式系统的用户认证授权机制及其应用
www.ilib.com.cn
10.
Implementing Custom Authentication and Authorization
实现自定义身份验证和授权
www.ichacha.net
1.
A remote attacker who previously owned authentication and authorization rights over Bluetooth can perform three risky actions on the device
远程攻击者事先介由蓝牙系统拥有了授权和验证权限后,便能在此设备上进行三种危险的行为
www.bing.com
2.
Using Geneva Framework for Handling Authentication and Authorization in a WCF Service
使用Geneva框架在WCF服务中处理授权与认证
www.infoq.com
3.
flexible , secure authentication and authorization
灵活、安全的授权和身份验证
www.ichacha.net
4.
Authentication and authorization of the application
应用程序的验证和授权
www.ibm.com
5.
Implementation of JAAS-based security authentication and authorization plan
基于JAAS的安全认证授权方案的实现
www.ilib.cn
6.
Security, authentication, and authorization in a grid
网格中的安全、身份验证和授权
www-128.ibm.com
7.
A Protocol of Bidirectional Authentication and Authorization for IP Multicast
一种面向组播的双向身份鉴别与授权协议
www.ilib.cn
8.
Standard Guide for User Authentication and Authorization
用户鉴定和授权标准指南
www.mapeng.net
9.
Guide for User Authentication and Authorization
用户鉴定和授权指南
www.isres.com
10.
Integration authentication and authorization center based on active directory
基于活动目录的集成验证授权中心
www.ilib.cn
1.
Authentication and Authorization in Grid
网格中的认证授权技术
www.ilib.cn
2.
Centralized authentication and authorization based on Kerberos
基于Kerberos的统一认证授权研究
wenku.baidu.com
3.
Authentication and Authorization in Fast Hand-off in WLAN
WLAN快速切换过程中的认证及授权
ilib.cn
4.
Design and implementation of authentication and authorization system based on AOP
基于面向方面的认证授权系统的设计与实现
www.ilib.cn
5.
Promote interoperability in the exchange of authentication and authorization information
促进验证和授权信息交换的互操作性。
www.ibm.com
6.
The Development of Cross Domain Authentication and Authorization
多认证域认证与授权技术的发展
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/12/25 2:22:31