kdc
美
英 
- 網絡密鑰分發中心(Key Distribution Center);密鑰分配中心;密鑰發行中心
例句
The KDC supplies the ME with single-sign-on credentials in the form of a Key Encryption Key (KEK).
所述KDC向所述ME提供密鑰加密密鑰(KEK)形式的單點登錄證書。
The following steps are required on both the KDC machines to set up an inter-realm between the two realms that have been configured so far.
下面的步驟是在兩個領域(到目前為止已經配置的領域)之間設置跨領域配置時,在兩個KDC計算機中所需采取的步驟。
KDC is responsible for key distribution and all the authentication processes which may take place in the network.
KDC負責密鑰分發和可能在網絡上發生的所有身份驗證過程。
Since the slave KDC is meant for backing up the master KDC in an emergency, the slave KDC might need to use the read-write copy.
因為從KDC用于在緊急情況下替代主KDC,所以從KDC可能需要使用可讀寫拷貝。
You've got the valid credentials from KDC for principal name sandeep, so let's try to log in as principal root, as shown in Listing 3.
您已經從KDC獲得了主體名sandeep的有效憑據,所以讓我們來嘗試以主體root用戶進行登錄,如清單3所示。
For a KDC in one realm to authenticate Kerberos users in a different realm, it must share a key with the KDC in the other realm.
如果一個領域中的KDC要對另一個領域中的Kerberos用戶進行身份驗證,它就必須與另一個領域中的KDC共享密鑰。
The figure below provides an overview of the communication between the client, application server and the KDC during authentication.
下面是一個概覽圖,展示了客戶機、應用服務器和KDC在身份驗證期間的通信。
Please note KDC is configured to support encryption types which are a variant of des-cbc-crc, as it works well with OpenAFS.
請注意,KDC被配置為支持des-cbc-crc變體的這些加密類型,因為des-cbc-crc非常適用于OpenAFS。
Administrators with a hybrid environment can benefit from a single IBM NAS KDC on AIX for authentication across different platforms.
在混合環境中,可以使用單個AIXIBMNASKDC進行不同平臺的身份驗證,管理員將可以從中受益。
In this type of scenario, users authenticate once to the KDC, and then their authentications are valid for a predetermined time period.
在這種情況下,用戶只需一次性通過KDC身份驗證,然后其身份驗證信息就會在預定義的時間段內有效。
As I am not interested in using any of the KDC options, I don't need to do any logical processing to author the kdc-options field.
因為我不想使用任何KDC選項,所以我不需要對生成kdc-options字段進行任何邏輯處理。
This message is directed to the KDC component known as Authentication Server (AS).
這個消息指向稱為身份驗證服務器(AuthenticationServer,AS)的KDC組件。
In this article, you have examined all the necessary steps required to set up the IBM NAS KDC and administration discovery using TDS.
在本文中,您研究了使用TDS進行IBMNASKDC和管理服務器發現所需的所有配置步驟。
The KDC was unable to generate a referral for the service requested.
KDC無法為要求的服務生成參照。
This makes it very important that the KDC database is not compromised because otherwise it becomes a single point of failure.
因此KDC數據庫絕對不能泄漏,否則它就會成為一個單點故障,這一點非常重要。
Fix: Verify whether the server service principal name and client principal name are in the KDC database.
解決方案:檢查服務器服務主體名和客戶機主體名是否存儲在KDC數據庫中。
The KDC failed to update the trusted domain list. The error is in the data.
KDC無法更新受新任域列表。錯誤在數據中。
A simple Kerberos configuration is a realm definition, which includes KDC server, kadmind server (optional) and clients.
一種簡單的Kerberos配置是一個域定義,其中包含KDC服務器、kadmind服務器(可選)和客戶端。
To configure the NAS KDC server to use the legacy database, use the following command, as shown in Listing 3 .
要將NASKDC服務器配置為使用遺留數據庫,可以使用下面的命令,如清單3中所示。
Edit the kdc. conf file to reflect the encryption types required by all the clients and relevant principals.
編輯kdc.conf文件,反映所有客戶端和相關主體所需的加密類型。
kinit: This utility obtains the name and port of the KDC from the LDAP server.
kinit:這個實用工具可以從LDAP服務器中獲得KDC的名稱和端口號。
On a non-KDC-enabled system (not a domain controller), the KDC service startup type is disabled.
在不支持KDC的系統(非域控制器)上,KDC服務啟動類型被禁用。
Note: There is no "kdc" or "admin_server" entry for this type of configuration under the [realm] stanza, unlike in the default case.
注意:與缺省情況不同的是,對于這種配置類型,在[realm]節之下沒有相應的“kdc”或者“admin_server”條目。
The client principal name and client host principal name should be in the KDC database.
客戶機主體名和客戶機主機主體名必須在KDC數據庫中。
The example KDC setup below shows the steps needed to set up an MIT Kerberos authentication system.
下面的示例KDC設置展示了設置MITKerberos身份驗證系統所需的步驟。
Receiving the reply from KDC, client then decrypts the message using its own secret key.
客戶端接收KDC的回復,然后使用自己的秘密密鑰解密消息。
After changing the kdc. conf file, the Kerberos server must be restarted.
在修改kdc.conf文件之后,必須重新啟動Kerberos服務器。
Only one conifig. krb5 command on the slave KDC, and that is all.
只需要在從KDC上運行一個conifig.krb5命令,僅此而已。
Therefore, securing the KDC is of paramount importance.
因此,保證KDC的安全至關重要。
Use this utility to setup a realm entry for a Kerberos V5 realm by defining a list of KDC servers and "kpasswd" server for the realm.
使用此工具,通過為領域定義KDC服務器列表和“kpasswd”服務器,可為KerberosV5領域設置領域條目。
This article covered the details on how to set up the IBM NAS master KDC on AIX to use the LDAP directory.
本文詳細討論了如何在AIX上通過設置IBMNAS主KDC來使用LDAP目錄。
Now the master KDC is up and running, but only this master KDC to one LDAP master server.
現在,主KDC已經開始運行了,但是這個主KDC只連接一個LDAP主服務器。
KDC also has a database of secret keys; each entity (user, host, or an application server) shares a secret key with the KDC.
KDC還擁有一個密匙數據庫;每個實體(用戶、主機或應用服務器)與KDC共享一個密匙。
It must be run locally on the KDC as root and modifies the KDC databases directly.
它必須以根用戶的身份在本地運行KDC,它可以直接更改KDC數據庫。
The KDC administrator must add a server principal to the KDC database for each SSO-enabled IDS database server.
對于每個啟用SSO的IDS數據庫服務器,KDC管理員必須將一個服務器主體添加到KDC數據庫。
The admin principals are KDC service principals that handle the administrative tasks.
管理員主體是處理管理任務的KDC服務主體。
The KDC is trusted by all clients and servers in the network and is used to verify user identities.
網絡中所有客戶機和服務器都信任KDC,并且使用KDC驗證用戶身份。
Also, you need to configure clients in such a way that all slave KDCs and the master KDC are optimally exploited.
同樣,需要對客戶機進行配置,使所有從KDC和主KDC都能得到充分利用。
Now configure the slave KDC with the two LDAP master servers and three LDAP replica servers.
現在,用兩個LDAP主服務器和三個LDAP副本服務器配置從KDC。
After Active Directory is installed, ensure that the Kerberos KDC is running.
安裝好活動目錄后,確保KerberosKDC正在運行。