身份驗證數據 的英文怎麼說

中文拼音 [shēnbīnyànzhèngshǔ]
身份驗證數據 英文
authentication data
  • : Ⅰ名詞1 (身體) body 2 (生命) life 3 (自己; 本身) oneself; personally 4 (人的品格和修養) on...
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 身份 : 1. (人的社會、法律地位) status; capacity; identity 2. (受人尊敬的地位) dignity
  • 驗證 : test and verify; checking; proving; testing; confirmation; [數學] corroboration; inspection; veri...
  • 數據 : data; record; information
  1. It simply connects to the current sql server instance by using windows authentication, and then iterates through all the user databases and performs the identity checks on each table found in each database

    它只是使用windows與當前sql server實例連接,然後遍歷所有用戶庫並對每個庫中的每個表執行標識檢查。
  2. Active directory application mode adam is a new mode of the active directory directory service that is designed to meet the needs of line - of - business applications that require a dedicated lightweight directory access protocol ldap data store, e - commerce applications that require simple ldap authentication support, and enterprise environments that require an application directory that is separate from their network operating system infrastructure directory

    Active directory應用程序模式( adam )是active directory目錄服務的新模式,設計用於滿足以下應用程序或環境的需要:需要專用輕型目錄訪問協議( ldap )存儲的行業應用程序,需要簡單ldap支持的電子商務應用程序,以及需要獨立於網路操作系統( nos )結構目錄的應用程序目錄的企業環境。
  3. To use the same database and user information as the

    使用相同的庫和用戶信息,以便使用一個庫即可獲得和授權信息。
  4. Report models eliminate knowledge requirements for building query construction, data source connections and authentication, expressions, filters, and parameters

    用戶使用報表模型時,並不需要對生成查詢構造、源連接以及、表達式、篩選器和參等有很深的了解。
  5. Class using the specified directory identifier, network credentials, and authentication type

    構造函使用指定的目錄標識符、網路憑類型創建
  6. The authenticator, either the database owner or a certificate or asymmetric key used to sign the module, must be trusted in the target scope

    者(庫所有者或用於給模塊簽名的書或非對稱密鑰)必須在目標范圍內是可信的。
  7. Class will automatically invoke your custom provider to communicate with your authentication data source

    類將自動調用自定義提供程序來與您的身份驗證數據源進行通信。
  8. Sensitive information includes password and authentication data, or any data you do not want to expose to an unwanted source

    敏感信息包含密碼和身份驗證數據或不希望公開給不明來源的任何
  9. Specifying a secure server protects the report definition and authentication data from being intercepted while the report is published

    通過指定安全的服務器,可以在發布報表時保護報表定義和身份驗證數據,以防他人截獲。
  10. Flexible and secure authentication and authorization services provide protection for data while minimizing barriers to doing business over the internet

    靈活安全的授權和服務,為減少internet的上障礙,順利地進行商務活動提供了保護措施。
  11. Class is used to represent information about a user profile from the data store, including the last date and time when profile properties were retrieved or updated, the user name associated with the profile, and whether the profile is for an anonymous or authenticated user

    類用於表示關于來自存儲區的用戶配置文件的信息,包括檢索和更新配置文件屬性的最後日期和時間、與該配置文件關聯的用戶名,以及該配置文件是用於匿名用戶還是用於經過的用戶。
  12. This walkthrough uses integrated windows authentication to control access to the database

    本演練使用集成windows來控制庫訪問。
  13. On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature

    網路傳輸安全主要解決在網路環境下用戶之間加密傳輸以及實現字簽名三個方面問題:用戶了通信的源點和目的點的正確性;加密傳輸保在網路的中間節點不會泄露通信秘密;字簽名可以保發送信息的一方不能對自己發送過的信息進行否認。
  14. Database must trust the authenticator

    庫必須信任
  15. This system permits users taking use of the resource of the laboratory through the internet. first, users login on the net server, then they can select the relative experiments from the data base in the laboratory workstation which is interlinked with the net server, after this the workstation gives instructions to the controller of the experiment platform. the particular remote electromotor laboratory system have the same structure as up

    並在這種結構下設計了一套遠程電機實室系統,該系統可供用戶通過網際網路遠程登錄到網路服務器,經過和權限設定后與實室的工作站鏈接,並通過工作站的庫調出相關的,選取相應的試內容,此後工作站向實臺控制器發出控制指令進行相關的試
  16. In the function of the system realizes, the high - efficient quality and security that explain the remote data base access ( rda ) emphatically, and explain web safe practice of using procedure making and rda technology in detail. including, user authorize https, data base encrypt and batch treatment

    在系統的功能實現上,著重闡述遠程庫訪問的高效性和安全性,並詳細講解所採用的web應用程序開發的安全技術和遠程庫訪問技術,包括用戶( https ) 、庫加密及批處理等高效安全的網路開發技術。
  17. The data will not be buffered in memory and will not support any authentication requests or redirections by the web server

    ,則不會緩存在內存中,而且不支持web服務器發出的任何請求或重定向。
  18. Authenticated streams can provide authentication, data signing, and encryption services that can help maintain the integrity and confidentiality of data transmitted using the

    經過的流可以提供簽名和加密服務,這些服務有助於維護使用
  19. Packet packet - level com authentication

    包級的com
  20. For example, if the security settings in the iis metabase are set to allow site access only to authenticated users while security settings in the web. config file are set to allow anonymous access to the site, anonymous users would be denied access to the site

    例如,如果iis元庫中的安全設置配置為只允許已通過的用戶訪問站點,而web . config文件中的安全設置配置為允許匿名訪問該站點,則將拒絕匿名用戶訪問該站點。
分享友人