gss

  • n.地层成因层序
  • 网络安全服务;Ghost Security Suite

gssgss

gss

安全服务

安全服务 (GSS)—定义了初始组和处理模版的许可。报表—定义了由处理过程所提供的报告的标准。

Ghost Security Suite

再下来就是GSS(Ghost Security Suite) ,其实用的时间并不是很长,可能没有多大发言权,不过我个人不是很喜欢这款,因为 …

1
The GSS-API is fully described in RFC 2743, which, unfortunately, is among the most difficult RFCs to understand. GSS-API在RFC2743中进行了完整的描述,不幸的是,它是最难理解的RFC之一。
2
The figure shows three DB2 clients using different GSS-API plug-ins, and a DB2 server with a list of the GSS-API plug-ins it supports. 该图展示了三个使用不同GSS-API插件的DB2客户机,以及一个带有支持的GSS-API插件列表的DB2服务器。
3
GSS-API is a standard that addresses the issue of the existence of similar but incompatible security services in use today. GSS-API是解决目前存在相似但不兼容的安全性服务的问题的标准。
4
They also do not support the GSS-API plug-in authentication method, except Kerberos. 除了Kerberos之外,它们也不支持GSS-API插件身份验证方法。
5
GSS_SERVER_ENCRYPT - This specifies that the server accepts GSS API-based plug-in authentication or encrypted server authentication schemes. GSS_SERVER_ENCRYPT——这指定服务器接受基于GSSAPI的插件身份验证或加密的服务器身份验证模式。
6
You can set NFS up to negotiate for security flavors if RPCSEC_GSS is not required. 如果不要求RPCSEC_GSS,可以设置NFS来对安全性问题进行协商。
7
Thus, a secure application developed using GSS-API can work over different security mechanisms without changes to the application. 因此,用GSS-API开发的安全应用程序可以在不同的安全机制上运行,不用改变应用程序。
8
Unwraps a message sealed by the gss_wrap subroutine and verifies the embedded signature. 对用gss_wrap子例程加密的消息进行解密并检查嵌入的签名。
9
Table 7 provides a simplified illustration of the basic client-server flows involved in the GSS-API authentication process. 表7简单地解释了在GSS-API身份验证过程中客户机-服务器之间的基本流程。
10
Update the database manager configuration parameter srvcon_gssplugin_list with the ordered list of the supported GSS-API plug-in name. 用受支持的GSS-API插件名称的有序列表更新数据库管理器配置参数srvcon_gssplugin_list。
11
To configure the client, simply copy the GSS-API plug-in into the client plug-in directory. 为了配置客户机,只需将GSS-API插件复制到客户机插件目录。
12
Kerberos is the most popular underlying security mechanism available with GSS-API. Kerberos是通过GSS-API使用的最流行的底层安全机制。
13
Almost all UNIX operating systems, including AIX, support and provide GSS-API. 大多数UNIX操作系统(包括AIX)都支持和提供GSS-API。
14
The GSS-API default behavior will be to initiate the context for Kerberos security mechanism. GSS-API的默认行为是为Kerberos安全机制启动上下文。
15
Working closely with GSS in systems implementation . 在系统实施中能紧密配合GSS团队。
16
This article takes you further with information about the new GSS-API security mechanisms. 本文将进一步介绍有关新的GSS-API安全机制的信息。
17
In addition to generating maps , a GSS can give us street addresses, information about plants and animals in an area and more . 除生成地图外,GSS还可为我们提供街道地址和某一区域内动植物的相关信息以及更多其它信息。
18
At the server, an ordered list of GSS-API plug-ins is specified in the SRVCON_GSSPLUGIN_LIST database manager configuration parameter. 在服务器上,在SRVCON_GSSPLUGIN_LIST数据库管理器配置参数中指定一个有序的GSS-API插件列表。
19
This typically will be documented in detail by the GSS-API offering that supports LIPKEY mechanism. 通常,这将由支持LIPKEY机制的GSS-API产品进行详细记载。
20
Using these GSS-API interfaces, you can implement secure Keberized applications and systems. 通过使用这些GSS-API接口,可以实现使用Kerberos机制的安全应用程序和系统。
21
On the DB2 UDB server: an X. 509 certificate, a PKI environment, and a LIPKEY-enabled server-side GSS-API security plug-in. 在DB2UDB服务器中:一张X.509证书,一个PKI环境,以及一个支持LIPKEY的服务器端GSS-API安全插件。
22
On the DB2 UDB client: an X. 509 certificate, a PKI environment, and a SPKM-enabled client-side GSS-API security plug-in. 在DB2UDB客户机中:一张X.509证书,一个PKI环境,以及一个支持SPKM的客户端GSS-API安全插件。
23
GSS-API is a generic API to perform client-server authentication. GSS-API是用于执行客户机-服务器身份验证的通用API。
24
Table 8 shows the steps involved in a client-server flow when DB2 is involved in the GSS-API authentication process. 表8展示了在GSS-API身份验证过程中涉及DB2时客户机-服务器之间流程中的步骤。
25
GSS (Global Spares Supply) is based on long-term partnerships with our customers, both internal and external. (全球备件供应)是我们内部和外部客户的长期合作者。
26
There are other forms of credentials, depending on the specific GSS-API implementation. 还有其他形式的凭证,这取决于特定的GSS-API实现。
27
The server ID and password are sent in a GSS token, and are produced and consumed using the JGSS API. 服务器ID和密码在GSS令牌中发送,并使用JGSSAPI产生和使用。
28
A programmer using GSS-API can write an application that is ignorant of the details of protecting network data. 使用GSS-API的程序员编写的应用程序可以不知道关于保护网络数据的细节。
29
Table 5 shows the steps you would take to enable GSS-API authentication plug-ins using the above listed configuration parameters. 表5展示了使用前面列出的配置参数启用GSS-API身份验证插件的步骤。
30
Kerberos and PKI already support GSS-API, and in fact, Kerberos authentication in DB2 is implemented using the GSS-API model. Kerberos和PKI已经支持GSS-API,实际上,DB2中的DB2Kerberos身份验证是使用GSS-API模型实现的。