This article teaches you how the Technology Explorer can control user and group authentication to db2 through the use of a security plug-in called db2auth (see Resources for more about db2auth).
本文将向您介绍如何在TechnologyExplorer中使用db2auth安全插件来控制db2的用户和组身份验证(参见参考资料了解db2auth的详细信息)。
In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
应用推荐