security token 中文意思是什麼

security token 解釋
安全性令牌
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • token : n 象徵,記號,標記;表示物,證物;紀念品;代幣,代價券;【語言學】語言符號;【英史】私鑄貨幣;【...
  1. Three common methods being adopted by banks in hong kong are digital certificate, security token - based one - time password and sms - based one - time password

    現時本港銀行最常用的方法有三種:電子證書由保安顯示器發出只用一次的密碼,以及通過手機簡訊發出只用一次的密碼。
  2. The three common types of two - factor authentication being adopted by banks in hong kong are digital certificate, sms - based one - time password and security token - based one - time password

    本港銀行最常採用的雙重認證方法有三種:電子證書通過手機簡訊發出只用一次的密碼,以及由保安顯示器發出只用一次的密碼。
  3. If the web site is configured to support only anonymous access in iis, then the security token passed from iis will be that of the windows user account for anonymous access as configured in iis

    如果網站配置為僅支持iis中的匿名訪問,則從iis傳遞的安全標記將是iis中配置的匿名訪問的windows用戶帳戶的安全標記。
  4. The first factor is " something you know " such as user id and password. the other factor is " something you have " such as e - cert or security token that can be physically held by a user. the second factor is not transmitted over the internet and thus safe from internet fraudsters attack

    首個認證元素是你知道的資料,如用戶名稱及密碼,而另外一個元素則是你擁有的東西,如電子證書或保安儀器( securitytoken )這些你擁有的實物。
  5. This can lead to some security issues should the token generation mechanism or header generation mechanism become easily counterfeited

    這可能會產生一些安全問題,偽造標記或header的產生機制會變得很容易。
  6. Gets the security identifier for the token owner

    獲取標記所有者的安全標識符( sid ) 。
  7. On the other hand, the ltpa token, which is created when websphere application server security is used by the application, is designed to provide a stronger authentication token

    另一方面, ltpa令牌(它是在應用程序使用websphere application server安全性時創建的)被設計為提供更強的身份驗證令牌。
  8. An otp generated by a security device token

    由保安顯示器發出只用一次的密碼。
  9. Property to display the security identifier for the token owner

    屬性來顯示標記所有者的安全標識符。此代碼示例摘自一個為
  10. Adding an assembly to the skip verification list creates a security vulnerability. a malicious assembly could use the fully specified assembly name assembly name, version, culture, and public key token of the assembly added to the skip verification list to fake its identity

    如果將某程序集添加到跳過驗證列表中,則惡意的程序集可以通過使用該程序集的完全限定程序集名稱來隱藏身份,完全限定程序集名稱由程序集名稱、版本、區域性和公鑰標記組成。
  11. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準令牌交換協議相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
  12. The use of integrated security to access external data sources poses a special concern for report users who may not know that their security token is being passed to an external data source users are not warned in advance of running a report that the report is configured to use integrated security

    對于那些可能不知道其安全令牌將傳遞到外部數據源的用戶,使用集成安全性訪問外部數據源會為其帶來一個特殊問題(在運行報表之前不會事先通知用戶報表配置為使用集成安全性) 。
  13. Object, the identity is assumed to represent a windows nt security token

    對象,則假定標識表示windows nt安全標記。
  14. Asp. net takes the security token created by iis and makes it available as a

    Asp . net採用iis創建的安全性標記,並使其可以作為
  15. Often, the type of security token used for authentication isn t even the same

    通常,用來進行身份驗證的安全性類型未必是相同的。
  16. Safeguard your device for two - factor authentication e. g. smart card, security token or mobile phone

    好好保管你的雙重認證工具例如智能卡保安顯示器或手提電話。
  17. Safeguard your device for two - factor authentication ( e. g. smart card, security token or mobile phone )

    好好保管你的雙重認證工具(例如智能卡、保安顯示器或手提電話) 。
  18. Str to identify the security token that the rm destination should use to authenticate messages received for the created sequence

    ( str )來作為安全令牌, rm目的地端應該利用它來為創建的序列認證接收到的消息。
  19. In iis, only basic authentication logs users on with a security token that flows across the network to a remote sql server

    在iis中,只有基本身份驗證使用通過網路傳遞給遠程sql server的安全標記來使用戶登錄。
  20. Option, the report server passes the security token of the user accessing the report to the server hosting the external data source

    選項時,報表服務器會將訪問報表的用戶的安全令牌傳遞給外部數據源所在的服務器。
分享友人