Apache Kyuubi 1.7.0-rc1 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 206 页 | 3.78 MB | 1 年前3
 Apache Kyuubi 1.7.3 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 211 页 | 3.79 MB | 1 年前3
 Apache Kyuubi 1.6.1 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 199 页 | 3.89 MB | 1 年前3
 Apache Kyuubi 1.7.1-rc0 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 208 页 | 3.78 MB | 1 年前3
 Apache Kyuubi 1.7.3-rc0 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 211 页 | 3.79 MB | 1 年前3
 Apache Kyuubi 1.7.0-rc0 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 210 页 | 3.79 MB | 1 年前3
 Apache Kyuubi 1.6.0 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 195 页 | 3.88 MB | 1 年前3
 Apache Kyuubi 1.7.0 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 206 页 | 3.78 MB | 1 年前3
 Apache Kyuubi 1.7.2 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 211 页 | 3.79 MB | 1 年前3
 Apache Kyuubi 1.7.2-rc0 Documentationnecessarily mean this is true. The authentication process of kyuubi is used to verify the user identity that a client used to talk to the kyuubi server. Once done, a trusted connection will be set up only authenticate whether a user or client can connect with Kyuubi server or not using the provided identity. For other secured services that this user wants to interact with, he/she also needs to pass the client or a server can prove its identity to its server or client across an insecure network connection. After a client and server have used Kerberos to prove their identity, they can also encrypt all of0 码力 | 211 页 | 3.79 MB | 1 年前3
共 44 条
- 1
 - 2
 - 3
 - 4
 - 5
 













