它通常对系统调用和通过文件系统指定的资源的操作请求执行授权检查。
It typically performs authorization checks on system calls and operation requests on resources named by a file system.
这是在其中对任何特定请求执行所有身份验证和授权步骤的操作。
This is the action where all the authentication and authorization steps for any particular request are performed.
它允许网络访问服务器(NAS)执行对用户的验证、授权和记帐。
It allows a network access server (NAS) to perform authentication, authorization, and accounting for users.
为了执行验证、映射和授权,就需要使用外部安全提供者。
To perform the authentication, mapping, and authorization, an external security provider is required.
CM使用权限、权限组、权限集合和ACL对用户进行授权,从而对特定项目执行特定操作。
CM USES privileges, privilege groups, privilege sets, and ACLs to authorize the users to perform specific operations on specific items.
EJB 的身份验证和授权配置方法为:在部署描述符中定义安全角色,每个方法将依据部署描述符执行。
You configure EJB authentication and authorization by defining security roles in the deployment descriptor under which each method executes.
代理身份验证和授权:中间层服务器执行身份验证。
Proxy authentication and authorization: the middle-tier server performs authentication.
然后,经过身份验证和授权的用户可以访问一个受保护资源,无需重复执行登录过程。
Authenticated and authorized users can then access a protected resource without performing the login procedure repeatedly.
在将消息转发给接收方之前,Facade在其上执行解密、授权和身份验证。
Before the message is forwarded to the receiver, Facade performs decryption, authorization and authentication on it.
与用户授权不同,后者是通过Domino服务器和Domino数据库执行的。
This is different from user authorization, which is performed by the Domino server and the Domino database.
所有受保护页面都是使用JSF组件开发的,而Acegi提供登录页面并执行身份验证和授权。
All protected pages are developed using JSF components, whereas Acegi serves the login page and performs authentication and authorization.
执行提交和更新的授权用户应该在他们进行提交和更新时了解这些政策。
The authorized users who perform the submissions and updates should understand these policies as they conduct the submissions and updates.
其中描述了授权角色及其继承规则和缺省值,如何定义授权规则以及如何解析授权规则以执行基于实例的授权。
It described the authorization roles with their inheritance rules and defaults, how you can define authorization rules, and how they are resolved in order to perform instance-based authorization.
通过授权执行不同类型的测试,可获得更大范围的覆盖和信任。此外,通过持续运行这些测试,几乎能在问题产生就发现它们。
By authoring different types of tests, you can achieve a wider range of coverage and confidence; moreover, by running these tests continually, you can spot issues almost as fast as they are created.
治理涉及到建立相关职责和授权负责方,而管理则涉及到确保治理策略实际执行。
Governance involves establishing responsibilities and empowering responsible parties, whereas management involves making sure the governance policies actually occur.
授权管理是评估人员谓词(授权规则)和基于这些人员谓词执行授权的中心实例。
Authorization management is the central instance that evaluates staff verbs (authorization rules) and performs authorization based on them.
顾名思义,PEP是安全体系结构中基于PD p中定义的策略执行身份验证和授权规则的位置。
As the name implies, a PEP is a point in the security architecture where authentication and authorization rules are enforced, based upon the policy defined in the PDP.
授权:访问系统不同功能的变化,并执行不同的任务,以及相关用户群体和交易行为。
Entitlements: Variations in access to different parts of a system and perform varying tasks. Related to user population and transaction behavior as well.
Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
snrdba组中的所有用户都将拥有和SYSADM授权级别关联的全部特权,从而能够执行授权级别所需要的全部管理任务。
All users in the snrdba group would then have all the privileges associated with the SYSADM authority level and thus be able to perform all administrative tasks requiring that authority level.
单击Next,屏幕显示对应的SQL和CDR命令,用于对被授权执行网格操作的用户定义和启用网格。
After you click Next, the screen displays the corresponding SQL and CDR commands to define and enable grid for users authorized to perform grid operations.
您将学习如何在Linux系统上建立和配置一个RemoteAuthenticationDial - inUserService服务器(RADIUS),以执行对用户的验证、授权和记帐(AAA)。
You'll learn how to set up and configure a Remote authentication Dial-In user Service server (RADIUS) on a Linux system to perform authentication, authorization, and accounting (AAA) for users.
将Siebel存储过程和用户定义函数的执行权限授权给PUBLIC。
Grant execute privilege on Siebel stored procedures and user-defined functions to PUBLIC.
而在最后一层则可执行那些用来防止未经授权的访问点以及其它无线设备配置的MAC地址过滤和基站发现策略。
MAC address filtering and base station discovery policies that prevent the deployment of unauthorized access points and other wireless devices can be enforced at the final layer.
作为所协议事项的证据,与约双方已使英文和一式二份的本合约从上面首次写明的日子起由其正式授权的高级职员或代表执行。
INWITNESS WHEREOF, the parties hereto have caused this Agreement in English and in duplicate to be executed by their duly authorized officers representatives as of the day first above written.
严格执行授权和止损制度。
Strictly implementing the authorization and the stop-loss systems.
严格执行授权和止损制度。
Strictly implementing the authorization and the stop-loss systems.
应用推荐