[jboss-cvs] JBossAS SVN: r91186 - projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN.

jboss-cvs-commits at lists.jboss.org jboss-cvs-commits at lists.jboss.org
Tue Jul 14 02:16:44 EDT 2009


Author: xhuang at jboss.com
Date: 2009-07-14 02:16:44 -0400 (Tue, 14 Jul 2009)
New Revision: 91186

Modified:
   projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN/J2EE_Security_On_JBOSS.po
Log:
update

Modified: projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN/J2EE_Security_On_JBOSS.po
===================================================================
--- projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN/J2EE_Security_On_JBOSS.po	2009-07-14 04:56:39 UTC (rev 91185)
+++ projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN/J2EE_Security_On_JBOSS.po	2009-07-14 06:16:44 UTC (rev 91186)
@@ -9,13 +9,13 @@
 "Project-Id-Version: J2EE_Security_On_JBOSS\n"
 "Report-Msgid-Bugs-To: http://bugs.kde.org\n"
 "POT-Creation-Date: 2009-01-20 02:37+0000\n"
-"PO-Revision-Date: 2009-06-22 10:24+1000\n"
-"Last-Translator: \n"
-"Language-Team: en_US <kde-i18n-doc at kde.org>\n"
+"PO-Revision-Date: 2009-07-14 15:54+1000\n"
+"Last-Translator: Xi HUANG <xhuang at redhat.com>\n"
+"Language-Team:  <en at li.org>\n"
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Generator: Lokalize 0.3\n"
+"X-Generator: KBabel 1.11.4\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 
 #. Tag: title
@@ -4499,13 +4499,13 @@
 msgid ""
 "This login module also supports unauthenticated identity and password "
 "stacking."
-msgstr ""
+msgstr "登录模块也支持未经验证的标识符和密码栈。"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1201
 #, no-c-format
 msgid "DatabaseServerLoginModule"
-msgstr ""
+msgstr "DatabaseServerLoginModule"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1202
@@ -4516,7 +4516,7 @@
 "login module if you have your username, password and role information "
 "relational database. The <literal>DatabaseServerLoginModule</literal> is "
 "based on two logical tables:"
-msgstr ""
+msgstr "<literal>DatabaseServerLoginModule</literal> 是一个基于 JDBC 的登录模块,它支持验证和角色的映射。如果你有一个存储用户名、密码和角色信息的关系型数据库,你可以使用这个登录模块。<literal>DatabaseServerLoginModule</literal> 基于两个逻辑表:"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:1205
@@ -4525,6 +4525,8 @@
 "Table Principals(PrincipalID text, Password text)\n"
 "Table Roles(PrincipalID text, Role text, RoleGroup text)"
 msgstr ""
+"Table Principals(PrincipalID text, Password text)\n"
+"Table Roles(PrincipalID text, Role text, RoleGroup text)"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1206
@@ -4553,6 +4555,11 @@
 "literal> in the <literal>CallerPrincipal</literal><literal>RoleGroup</"
 "literal> in the <literal>Roles</literal> table:"
 msgstr ""
+"<literal>Principals</literal> 表将用户的 <literal>PrincipalID</literal> 和有效密码相关联,而 <literal>Roles</literal> 则把用户的 <literal>PrincipalID</literal> 和其角色集相关联。用于用户权限的角色必须包含在带有 <literal>Roles</literal> 的 <literal>RoleGroup</literal> 字段值的记录里。这些表是逻辑上的,所以你可以指定登录模块使用的 SQL 查询。<literal>java.sql.ResultSet</literal> 具有和前面所述的 <literal>Principals</literal> 和 <literal>Roles</literal> 表相同的逻辑结构。为了阐明这种概念,我们设想有一个带有两个表 <literal>Principals</literal> 和 <literal>Roles</literal> 的数据库。下面的语句构建这些表,使 <literal>Principals</literal> 表包含带有 <literal>echoman</literal> <literal>Password</literal> 的 <literal>PrincipalID</literal><literal>java</"
+"literal>,<literal>Roles</literal> 表里的 <literal>Roles</literal><literal>RoleGroup</literal> 包含带有角色 <literal>Echo</literal> 的 <literal>PrincipalID</"
+"literal><literal>java</literal>,以及 <literal>Roles</literal> 表里的 <literal>CallerPrincipal</literal><literal>RoleGroup</"
+"literal> 包含带有角色 <literal>caller_java</literal> 的 <literal>PrincipalID</"
+"literal><literal>java</literal>:"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:1209
@@ -4563,19 +4570,22 @@
 "INSERT INTO Roles VALUES(&#39;java&#39;, &#39;caller_java&#39;, &#39;"
 "CallerPrincipal&#39;)"
 msgstr ""
+"INSERT INTO Principals VALUES(&#39;java&#39;, &#39;echoman&#39;)\n"
+"INSERT INTO Roles VALUES(&#39;java&#39;, &#39;Echo&#39;, &#39;Roles&#39;)\n"
+"INSERT INTO Roles VALUES(&#39;java&#39;, &#39;caller_java&#39;, &#39;"
+"CallerPrincipal&#39;)"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1215
-#, fuzzy, no-c-format
+#, no-c-format
 msgid ""
 "<emphasis role=\"bold\">dsJndiName</emphasis>: The JNDI name for the "
 "<literal>DataSource</literal> of the database containing the logical "
 "<literal>Principals</literal> and <literal>Roles</literal> tables. If not "
 "specified this defaults to <literal>java:/DefaultDS</literal>."
 msgstr ""
-"<emphasis role=\"bold\">className</emphasis>:这是 <literal>org.apache."
-"catalina.Host</literal> 接口实现的类的全名。它的缺省值是 <literal>org.apache."
-"catalina.core.StandardHost</literal>。"
+"<emphasis role=\"bold\">dsJndiName</emphasis>:包含逻辑 <literal>Principals</literal> 和 <literal>Roles</literal> 表的数据库的 "
+"<literal>DataSource</literal> 的 JNDI 名称。如果未指定,它缺省为 <literal>java:/DefaultDS</literal>。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1220
@@ -4586,6 +4596,8 @@
 "PrincipalID=?</literal>. If not specified this is the exact prepared "
 "statement that will be used."
 msgstr ""
+"<emphasis role=\"bold\">principalsQuery</emphasis>:等同于 <literal>select Password from Principals where "
+"PrincipalID=?</literal> 的预处理语句。如果未指定,这就是将被使用的预处理语句。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1225
@@ -4596,6 +4608,8 @@
 "</literal>. If not specified this is the exact prepared statement that will "
 "be used."
 msgstr ""
+"<emphasis role=\"bold\">rolesQuery</emphasis>:等同于 <literal>select Role, RoleGroup from Roles where PrincipalID=?"
+"</literal> 的预处理语句。如果未指定,它就是将使用的预处理语句。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1230
@@ -4605,7 +4619,7 @@
 "indicating if the password comparison should ignore case. This can be useful "
 "for hashed password encoding where the case of the hashed password is not "
 "significant."
-msgstr ""
+msgstr "<emphasis role=\"bold\">ignorePasswordCase</emphasis>:布尔值标记,指定密码比较是否应该忽略大小写。对于 hashed 密码编码而言,因为 hashed 密码并非临时的,这是很有用的。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1235
@@ -4614,7 +4628,7 @@
 "<emphasis role=\"bold\">principalClass</emphasis>: An option that specifies "
 "a <literal>Principal</literal> implementation class. This must support a "
 "constructor taking a string argument for the principal name."
-msgstr ""
+msgstr "<emphasis role=\"bold\">principalClass</emphasis>:指定 <literal>Principal</literal> 实现类的选项。这必须支持把字符串参数作为 principal 名称的构造器。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1240
@@ -4622,7 +4636,7 @@
 msgid ""
 "As an example <literal>DatabaseServerLoginModule</literal> configuration, "
 "consider a custom table schema like the following:"
-msgstr ""
+msgstr "作为一个 <literal>DatabaseServerLoginModule</literal> 配置示例,请参考类似下面的自定义表模式:"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:1243
@@ -4631,12 +4645,14 @@
 "CREATE TABLE Users(username VARCHAR(64) PRIMARY KEY, passwd VARCHAR(64))\n"
 "CREATE TABLE UserRoles(username VARCHAR(64), userRoles VARCHAR(32))"
 msgstr ""
+"CREATE TABLE Users(username VARCHAR(64) PRIMARY KEY, passwd VARCHAR(64))\n"
+"CREATE TABLE UserRoles(username VARCHAR(64), userRoles VARCHAR(32))"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1244
 #, no-c-format
 msgid "A corresponding <literal>login-config.xml</literal> entry would be:"
-msgstr ""
+msgstr "对应的 <literal>login-config.xml</literal> 条目将是:"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:1247
@@ -4686,13 +4702,13 @@
 msgid ""
 "This module supports password stacking, password hashing and unathenticated "
 "identity."
-msgstr ""
+msgstr "这个模块支持密码栈、密码 hashing 和未验证的标识符。"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1254
 #, no-c-format
 msgid "BaseCertLoginModule"
-msgstr ""
+msgstr "BaseCertLoginModule"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1255
@@ -4708,6 +4724,8 @@
 "<literal>DatabaseCertLoginModule</literal> extend the behavior to obtain the "
 "authorization roles from either a properties file or database."
 msgstr ""
+"这是一个基于 X509 证书验证用户的登录模块。典型的用法是 web 层的 <literal>CLIENT-CERT</literal> 验证。这个登录模块只执行验证。你需要把它和其他具有获取授权角色能力的登录模块结合一起来完整的定义对设置了安全性的 Web 或 EJB 组件进行的访问。这个登录模块的子类 <literal>CertRolesLoginModule</literal> 和 "
+"<literal>DatabaseCertLoginModule</literal> 继承了它的行为以从属性文件或数据库里获得授权角色。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1258
@@ -4720,6 +4738,9 @@
 "<literal>org.jboss.security.plugins.JaasSecurityDomain</literal> MBean as "
 "shown in this <literal>jboss-service.xml</literal> configuration fragment:"
 msgstr ""
+"<literal>BaseCertLoginModule</literal> 需要一个 <literal>KeyStore</"
+"literal> 来执行用户验证。这是通过 <literal>org."
+"jboss.security.SecurityDomain</literal> 实现来获得的。通常,<literal>SecurityDomain</literal> 实现是通过 <literal>org.jboss.security.plugins.JaasSecurityDomain</literal> MBean 来配置的,如下面的 <literal>jboss-service.xml</literal> 配置片段:"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:1261
@@ -9099,4 +9120,3 @@
 "interceptor that supports role based access checks."
 msgstr "<literal>jmx-invoker-adaptor-server.sar</literal> 是一个开放 JMX MBeanServer 接口的服务,它通过使用 RMI/JRMP 脱管调用者服务的 RMI 兼容接口来实现。设置这个服务的安全性的唯一办法是切换到 RMI/HTTP 协议并象前面所述地设置 <literal>http-invoker.sar</literal> 的安全性。这个服务将来会被部署为带有支持基于角色访问检查的安全拦截器的 XMBean。"
 
-




More information about the jboss-cvs-commits mailing list