[jboss-cvs] JBossAS SVN: r89587 - projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN.

jboss-cvs-commits at lists.jboss.org jboss-cvs-commits at lists.jboss.org
Mon Jun 1 02:59:49 EDT 2009


Author: xhuang at jboss.com
Date: 2009-06-01 02:59:49 -0400 (Mon, 01 Jun 2009)
New Revision: 89587

Modified:
   projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN/J2EE_Security_On_JBOSS.po
Log:
update

Modified: projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN/J2EE_Security_On_JBOSS.po
===================================================================
--- projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN/J2EE_Security_On_JBOSS.po	2009-06-01 06:59:01 UTC (rev 89586)
+++ projects/docs/enterprise/4.3.3/Server_Configuration_Guide/zh-CN/J2EE_Security_On_JBOSS.po	2009-06-01 06:59:49 UTC (rev 89587)
@@ -9,7 +9,7 @@
 "Project-Id-Version: J2EE_Security_On_JBOSS\n"
 "Report-Msgid-Bugs-To: http://bugs.kde.org\n"
 "POT-Creation-Date: 2009-01-20 02:37+0000\n"
-"PO-Revision-Date: 2009-05-29 16:15+1000\n"
+"PO-Revision-Date: 2009-06-01 16:57+1000\n"
 "Last-Translator: Xi HUANG\n"
 "Language-Team:  <en at li.org>\n"
 "MIME-Version: 1.0\n"
@@ -3448,7 +3448,7 @@
 #: J2EE_Security_On_JBOSS.xml:930
 #, no-c-format
 msgid "Using JBoss Login Modules"
-msgstr ""
+msgstr "使用 JBoss 登录模块"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:931
@@ -3461,13 +3461,13 @@
 "information for very customized needs in JBoss. Before we explore the "
 "individual login modules, let&#39;s take a look at a few login module "
 "configuration options that are common to multiple modules."
-msgstr ""
+msgstr "JBoss 带有几个满足大多数管理需要的登录模块。JBoss 可以从关系性数据库、LDAP 服务器或普通文件中阅读用户信息。除了这些核心的登录模块,JBoss 也提供几个其他的登录模块以满足自定义的需要。在我们探讨单独的登录模块之前,让我们看看登录模块所共有的一些配置选项。"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:935
 #, no-c-format
 msgid "Password Stacking"
-msgstr ""
+msgstr "密码栈"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:936
@@ -3482,7 +3482,7 @@
 "managed in a central LDAP server but application-specific roles are stored "
 "in the application&#39;s relational database. The password-stacking module "
 "option captures this relationship."
-msgstr ""
+msgstr "多个登录模块可以链接在一个栈里,每个模块都提供验证和授权组件。这可用于许多情况之下,但有时候验证和授权分布在多个用户管理库里。前面的例子展示了如何组合 LDAP 和关系型数据库,允许两者中的任意一个验证用户。然而,我们也必须考虑到中央 LDAP 服务器管理用户而应用程序专有的角色存储在关系性数据库里的情况。password-stacking 模块选项可以处理这种关系。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:941
@@ -3499,6 +3499,11 @@
 "login.name</literal> and <literal>javax.security.auth.login.password</"
 "literal> respectively."
 msgstr ""
+"<emphasis role=\"bold\">password-stacking</emphasis>:当 <literal>password-"
+"stacking</literal> 选项被设置为 <literal>useFirstPass</literal> 时,这个模块首先分别寻找登录模块共享状态表里的属性名 <literal>javax.security.auth.login.name</literal> 和 <literal>javax."
+"security.auth.login.password</literal> 下共享的用户名和密码。如果找到,它们就被用作 principal 名和密码。如果没有找到,principal 名和密码则通过这个登录模块进行设置并分别存储在属性名 <literal>javax.security.auth."
+"login.name</literal> 和 <literal>javax.security.auth.login.password</"
+"literal> 下。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:946
@@ -3510,12 +3515,14 @@
 "stacking modules will consider the user authenticated and only attempt to "
 "provide a set of roles for the authorization step."
 msgstr ""
+"要使用密码栈,每个登录模块都应该把 <literal>password-"
+"stacking</literal> 设置为 <literal>useFirstPass</literal>。如果前面已配置密码栈的模块已经验证了用户,所有其他的模块都将认为该用户是已验证的并只为授权步骤提供相应角色。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:949
 #, no-c-format
 msgid "The following listing shows how password stacking could be used:"
-msgstr ""
+msgstr "下面的列表显示了如何使用密码栈:"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:952
@@ -3566,13 +3573,13 @@
 "When using password stacking, it is usually appropriate to set all modules "
 "to be required to make sure that all modules are considered and have chance "
 "to contribute roles to the authorization process."
-msgstr ""
+msgstr "在使用密码栈时,我们通常需要把所有模块设置为必需的,这样可以确保所有模块都有机会为授权过程贡献相应的角色。"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:959
 #, no-c-format
 msgid "Password Hashing"
-msgstr ""
+msgstr "Password Hashing"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:960
@@ -3583,7 +3590,7 @@
 "with plain text passwords, but can also be configured to support hashed "
 "passwords to prevent plain text passwords from being stored on the server "
 "side."
-msgstr ""
+msgstr "大多数登录模块都需要将客户提供的密码和存储在用户管理系统里的密码进行比较。这些模块通常使用明文密码,但也可以支持 hashed 密码来防止在服务器端存储明文密码。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:965
@@ -3595,18 +3602,21 @@
 "hashing. Typical values are <literal>MD5</literal> and <literal>SHA</"
 "literal>."
 msgstr ""
+"<emphasis role=\"bold\">hashAlgorithm</emphasis>:设置 hash 密码的 <literal>java.security.MessageDigest</literal> 算法的名称。这个选项没有缺省值,要启用 hashing 就必须设置它。典型的值有 <literal>MD5</literal> 和 <literal>SHA</"
+"literal>。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:970
-#, fuzzy, no-c-format
+#, no-c-format
 msgid ""
 "<emphasis role=\"bold\">hashEncoding</emphasis>: The string format for the "
 "hashed pass and must be either <literal>base64</literal>, <literal>hex</"
 "literal> or <literal>rfc2617</literal>. The default is <literal>base64</"
 "literal>."
 msgstr ""
-"<emphasis role=\"bold\">scheme</emphasis>:它设置 <literal>ServletRequest."
-"getScheme</literal>  方法访问的协议名。它的缺省值是 <literal>http</literal>。"
+"<emphasis role=\"bold\">hashEncoding</emphasis>:hashed 密码的字符串格式,它必须是 <literal>base64</literal>, <literal>hex</"
+"literal> 或 <literal>rfc2617</literal>。它的缺省值是 <literal>base64</"
+"literal>。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:975
@@ -3615,7 +3625,7 @@
 "<emphasis role=\"bold\">hashCharset</emphasis>: The encoding used to convert "
 "the clear text password to a byte array. The platform default encoding is "
 "the default."
-msgstr ""
+msgstr "<emphasis role=\"bold\">hashCharset</emphasis>:把明文么转换为字节队列时所用的编码。其缺省值是平台的缺省编码。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:980
@@ -3625,7 +3635,7 @@
 "hashing algorithm should be applied to the password the user submits. The "
 "hashed user password will be compared against the value in the login module, "
 "which is expected to be a hash of the password. The default is true."
-msgstr ""
+msgstr "<emphasis role=\"bold\">hashUserPassword</emphasis>:指定是否应该将 hashing 算法应用于用户提交的密码。hashed 密码将和登录模块里的值(密码的 hash 值)进行比较。缺省为 true。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:985
@@ -3638,7 +3648,7 @@
 "be comare. JBoss uses the hash algorithm (for digest, this would be "
 "<literal>rfc2617</literal>) to compute a server-side hash that should match "
 "the hashed value sent from the client."
-msgstr ""
+msgstr "<emphasis role=\"bold\">hashStorePassword</emphasis>:指定是否应该将 hashing 算法应用于服务器端存储的密码。这用于用户提交 hash 密码以及请求专有的令牌时使用的 DIGEST 验证。JBoss 使用 hash 算法(对于 DIGEST 而言,这是<literal>rfc2617</literal>)来计算服务器端的 hash,它应该和客户端发出的 hashed 值相匹配。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:990
@@ -3649,6 +3659,8 @@
 "encoded, MD5 hashes of the passwords in a <literal>usersb64.properties</"
 "literal> file."
 msgstr ""
+"下面是一个登录模块的配置,它给未验证的用户分配 principal 名 <literal>nobody</literal> 且在 <literal>usersb64.properties</"
+"literal> 文件里包含使用 based64 编码的密码的 MD5 hash 值。"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:993
@@ -3692,6 +3704,8 @@
 "Util</literal> class provides a static helper method that will hash a "
 "password using a given encoding."
 msgstr ""
+"如果你需要在代码里生成密码,<literal>the org.jboss.security."
+"Util</literal> 类提供了一个静态的 helper 方法,它可以用指定的编码生成密码的 hash 值。"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:997
@@ -3703,12 +3717,17 @@
 "                                                null,\n"
 "                                                \"password\");"
 msgstr ""
+"String hashedPassword = Util.createPasswordHash(\"MD5\",\n"
+"                                                Util.BASE64_ENCODING,\n"
+"                                                null,\n"
+"                                                null,\n"
+"                                                \"password\");"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:998
 #, no-c-format
 msgid "OpenSSL provides an alternative way to quickly generate hashed passwords."
-msgstr ""
+msgstr "OpenSSL 为快速生成 hash 密码提供了另外一个途径。"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:1001
@@ -3723,12 +3742,14 @@
 "In both cases, the text password should hash to \"X03MO1qnZdYdgyfeuILPmQ=="
 "\". This is the value that would need to be stored in the user store."
 msgstr ""
+"在这两种情况下,文本密码都应该生成 hash 值为 \"X03MO1qnZdYdgyfeuILPmQ=="
+"\"。这是应该存储在用户库里的值。"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1008
 #, no-c-format
 msgid "Unauthenticated Identity"
-msgstr ""
+msgstr "Unauthenticated Identity"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1009
@@ -3741,7 +3762,7 @@
 "methods on EJBs that do not require a specific role. Such a principal has no "
 "associated roles and so can only access either unsecured EJBs or EJB methods "
 "that are associated with the unchecked permission constraint."
-msgstr ""
+msgstr "不是所有请求都能通过验证。unauthenticated identity 是一个登录模块选项,它分配专门的标识符(如 guest)给不带有关联的验证信息的请求。这可以用于允许未受保护的 servlet 来调用不要求专门角色权限的 EJB 方法。这样的 Principal 没有相关联的角色且只能访问未设置安全性的 EJB 或和带有无需检查权限约束的 EJB 方法。"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1014
@@ -3750,13 +3771,13 @@
 "<emphasis role=\"bold\">unauthenticatedIdentity</emphasis>: This defines the "
 "principal name that should be assigned to requests that contain no "
 "authentication information."
-msgstr ""
+msgstr "<emphasis role=\"bold\">unauthenticatedIdentity</emphasis>:定义应该分配给不包含验证信息的请求的 Principal。"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1022
 #, no-c-format
 msgid "UsersRolesLoginModule"
-msgstr ""
+msgstr "UsersRolesLoginModule"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1023




More information about the jboss-cvs-commits mailing list