The authentication scheme used by jaas is grounded in two very important entities : principals and subjects Jaas所使用的认证方案以两种非常重要的实体为基础: principal和subject 。
Alternatively , a host could set up role - based security principals to implement a custom authentication scheme 或者,宿主可以设置基于角色的安全主体,以实现自定义的身份验证方案。
He thought that this could be a problem in systems that use alternate authentication schemes such as nis or ldap 他认为在一些使用如nis或ldap等其他的身份验证机制的系统上,这种方式会有问题。
This allows you to set up users for administration through webmin that are not in the normal unix authentication scheme 这就使得您不通过常规的unix验证机制就可以通过webmin来设置进行管理的用户。
Internet information services provides several authentication schemes that can be employed when securing a web application Internet信息服务( iis )提供几个可在保护web应用程序时使用的身份验证方案。
Provides credentials for password - based authentication schemes such as basic , digest , ntlm , and kerberos authentication 为基于密码的身份验证方案(如基本、简要、 ntlm和kerberos身份验证)提供凭据。
Returns the proper set of credentials , as determined by the uri of the web resource and the requested authentication scheme 方法时, credentialcache返回一组适当的凭据,具体取决于web资源的uri和请求的验证方案。
Uses the uri of the request and the authentication scheme that the server supports to determine which credentials to send to the server Credentialcache使用该请求的uri和服务器支持的身份验证方案来确定哪些凭据将发送到服务器。
Servers use realms to partition protected resources ; each partition can have its own authentication scheme and or authorization database 服务器使用领域对受保护的资源进行分区;每个分区可以拥有其各自的身份验证方案和/或授权数据库。
Applications that use a variety of internet resources with different authentication schemes benefit from using the 对不同的验证方案使用各种internet资源的应用程序因使用credentialcache类而受益,因为此类存储所有的凭据并根据请求提供它们。