Kerberos
美
英 
例句
This section covers the necessary steps that an administrator needs to carry out to set up the above Kerberos configuration.
本節討論設置以上Kerberos配置所需的步驟。
An authentication error will occur if the user trying to connect is not same as the user whose credential is in the Kerberos cache.
如果試圖連接的用戶與其憑證保存在Kerberos緩存中的用戶不一致,將發生身份驗證錯誤。
If SSO is not working for you at this point please continue and verify all Kerberos Prerequisites mentioned in the next section.
如果此時SSO還不能正常工作,請繼續驗證下一節提到的所有Kerberos先決條件。
Kerberos, which provides a secure means of authentication for network users, is one of the most popular authentication mechanisms.
Kerberos為網絡用戶提供了一種安全的身份驗證手段,是最流行的身份驗證機制之一。
It's the only one that supports Kerberos authentication and supports LDAP with an Active Directory server -- that type of thing.
它是唯一一個支持Kerberos認證和帶有活動目錄服務器的LDAP(此類東西)的后端。
NTLM authentication is required in networks where the server receives requests from clients that do not support Kerberos authentication.
在服務器接收客戶端的請求而客戶端不支持Kerberos身份驗證的網絡中,必須使用NTLM身份驗證。
Kerberos is an authentication protocol that uses 'tickets' to verify the identity of a user in an unprotected network.
Kerberos是一種身份驗證協議,它使用‘票據’驗證未受保護的網絡中的用戶的身份。
In a Kerberos installation, each entity (individual users, computers, and services running on servers) has a principal associated with it.
在Kerberos安裝中,每個實體(在服務器上運行的單個用戶、計算機和服務)都擁有一個與之相關聯的主體。
But authentication service in Kerberos is just a component of key-distribution service.
但身份驗證服務在Kerberos中只是密鑰分發服務的一個組成部分。
Fix: The Kerberos authentication protocol requires that the clock skew between a server and a client is no greater than 5 minutes.
解決方案:Kerberos身份驗證協議要求服務器和客戶機之間的時鐘差不大于5分鐘。
This will drop the existing sessions, and force a new session to be established and a Kerberos ticket received.
這將刪除現有會話,然后強制建立新會話并接收Kerberos票證。
On the next page, name the realm as kerberos-realm and select realm type as Other and click Next as shown in Figure 10.
在下一個頁面中,將域名設置為kerberos-realm,選擇Other作為域類型,然后單擊Next,如圖10所示。
It helps administrators restrict the Kerberos ticket lifetime issued to any user from that particular client AIX machine.
它有助于管理員限制向這臺AIX客戶機機器的用戶頒發的Kerberos票據的生命期。
Except for clients C and E, every other client is able to communicate and work with the Kerberos server without any further changes.
除了客戶端C和E之外,其他所有客戶端都可以與Kerberos服務器通信,不需要任何修改。
Windows SharePoint Services will disable Kerberos authentication in Internet Information Services on your server during installation.
安裝期間,WindowsSharePointServices將在您的服務器上禁用Internet信息服務中的Kerberos身份驗證。
The Kerberos authentication protocol is a security protocol that verifies data to help ensure that both user and network services are safe.
Kerberos身份驗證協議是一種安全協議,用于驗證數據以幫助確保用戶和網絡服務均是安全的。
The Kerberos user information is stored in a database (usually a flat file on local filesystem in case of legacy configuration).
Kerberos用戶信息存儲在一個數據庫中(在遺留的配置中常常是文件系統中的文件)。
It then covered the general techniques being used in field of distributed security followed by details on Kerberos.
然后詳細介紹了分布式安全領域所使用的一般技術,以及Kerberos。
As a part of Kerberos interoperability, most of the Kerberos implementation supports a theory called inter-realm configuration.
作為Kerberos互操作性的一部分,大多數Kerberos實現都支持一種稱為跨領域配置的思想。
Moreover, AIX supports the storage of common user information, along with its relative Kerberos and LDAP attributes in the LDAP directory.
另外,AIX支持在LDAP目錄中存儲常用的用戶信息以及相關的Kerberos和LDAP屬性。
Kerberos essentially consists of a complex process called Kerberos authentication protocol (KAP).
Kerberos在本質上包含一個稱為Kerberos身份驗證協議(KAP)的復雜過程。
Kerberos V5 and NTLM are used for server authentication, which verifies a Message Queuing server to a client.
KerberosV5和NTLM用于服務器身份驗證,也就是向客戶端驗證“消息隊列”服務器。
For a KDC in one realm to authenticate Kerberos users in a different realm, it must share a key with the KDC in the other realm.
如果一個領域中的KDC要對另一個領域中的Kerberos用戶進行身份驗證,它就必須與另一個領域中的KDC共享密鑰。
Thus, provisions for granular control and enhanced manageability of Kerberos credentials over AIX is another reason for riding up the grade.
因此,提供細粒度控制可以增強Kerberos憑證的可管理性,這是另一個升級理由。
Ideally, the client machine is configured so that the login process acquires Kerberos credentials for the user as he or she logs in.
理想的情況下,配置客戶機機器,這樣登錄過程要求用戶在登錄時提供Kerberos憑證。
Once identity is verified, kerberos provides the two computer with encryption keys for a secure communication session.
一旦身份得到驗證,KERBEROS協議給這兩臺計算機提供密匙,以進行安全通訊對話。
Kerberos assumes that the clocks of all the machines in the realm are closely synchronized within the limit of the allowed time skew.
Kerberos假設域中所有機器的鎖在允許的時間相位限制內是緊密同步的。
However, this indicates that there may be a configuration issue preventing the use of Kerberos authentication.
但是,這預示著存在配置問題,并將禁止使用Kerberos身份驗證。
Principals and policies are the main administrative entities in a Kerberos setup.
主體(Principals)和策略(policies)是Kerberos設置中的主要管理實體。
This developerWorks article is a very basic primer of Kerberos and a good place to start.
這篇developerWorks文章提供非常基礎的Kerberos知識,這是一個很好的出發點。
Kerberos authentication is an Internet standard authentication mechanism.
Kerberos身份驗證是一種標準的Internet身份驗證機制。
is the Kerberos realm and must be shown in all uppercase letters.
是Kerberos領域,必須全部以大寫字母顯示。
Finally, we discuss the common problems that readers may encounter when setting up the Kerberos environment.
最后,我們討論在設置Kerberos環境時可能遇到的一些常見問題。
Kerberos also provides a system for authorization in the form of administering tokens or credentials.
Kerberos還以管理令牌或憑據的形式提供了一種授權系統。
The login module can be interactive and prompt for a principal's Kerberos name or password.
登錄模塊可以是交互式的并可以提示主體的Kerberos用戶名和密碼。
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三節中,我將展示如何生成一個用于在Kerveros通信中進行加密和解密的密鑰。
They also do not support the GSS-API plug-in authentication method, except Kerberos.
除了Kerberos之外,它們也不支持GSS-API插件身份驗證方法。
In practical situations, the NFS domains may be configured with different Kerberos realms (administrative domains).
在實際環境中,可能用不同的Kerberos領域(管理域)配置NFS域。
IP gateways do not support either NTLM or Kerberos authentication.
IP網關不支持NTLM或Kerberos身份驗證。
The result of Step 11 is a secret key that the Kerberos client can use to communicate with the Kerberos server.
第11步的結果是一個Kerveros客戶機可以用來與Kerberos服務器進行通信的密鑰。