• Writing the access control policy.

    编写访问控制策略

    youdao

  • Implementing an access control policy usually consists of two steps.

    实现访问控制策略通常包含两个步骤

    youdao

  • You can divide configuring a simple access control policy into two steps.

    配置简单访问控制策略分为两个步骤

    youdao

  • This section shows you how to configure IF to implement an access control policy.

    节将展示如何配置IF实现访问控制策略

    youdao

  • Interceptors use your application's access control policy to make authorization decisions.

    拦截器使用应用程序访问控制策略做出授权决定。

    youdao

  • Should the access control policy for the Wiki need to be changed, you only need to change a rule.

    如果需要更改Wiki访问控制策略只需更改某个规则。

    youdao

  • This method employs service domain as a unit in which the access control policy is organized.

    这种方法服务作为访问控制策略的组织单元,简化访问控制管理和使用。

    youdao

  • Later in the article, you'll see the simple access control policy used in building a sample application.

    本文后面的部分,看到使用简单访问控制策略构建一个样应用程序

    youdao

  • For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.

    但是目前继续展示如何使用Acegi配置一个简单访问控制策略

    youdao

  • I also show you how to configure Acegi to interact with the directory server to implement your access control policy.

    展示配置acegi的方法,使它能够目录服务器交互并实现访问控制策略。

    youdao

  • You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.

    了解到如何配置Acegi,使它目录服务交互,从而实现访问控制策略。

    youdao

  • Lastly, the preserving security property of the fine-grained access control policy with respect to state transition is proven.

    最后,证明细粒度协作访问控制策略关于协作系统状态转换保持安全的。

    youdao

  • You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.

    详细了解配置Acegi 的方法,从而LDAP目录交互实现访问控制策略

    youdao

  • Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.

    主流访问控制技术是从系统整体考虑,提供实施访问控制策略技术平台

    youdao

  • XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.

    XACML构建SAML之上,提供用于定义访问控制授权请求响应消息实际语义

    youdao

  • Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.

    步骤3DataPower设备通过计算用XACML编写访问控制策略检查是否允许用户调用请求的服务

    youdao

  • For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.

    现在只需了解拦截可以拦截用户在用户访问bean之前实现访问控制策略

    youdao

  • On the other hand, time is a critical factor in the access control policy of some enterprise. User's authorization is restricted at predefined time periods.

    一方面,某些企业访问控制策略中,时间一个关键性因素用户授权限制预先定义的时间范围内。

    youdao

  • For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.

    例如存在这样一个访问控制策略其允许担当客户服务代表角色所有用户执行客户管理操作

    youdao

  • These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    youdao

  • When the policy changes, the subsystems change its own access control policy by Administrative Commands, then make the RBAC Administration in Distributed systems consistent.

    策略发生改变后,模型各子系统根据管理指令进行自身的策略改变使整个分布式系统中的RBAC访问控制策略达到一致。

    youdao

  • The next article in this series will get you started with some more advanced uses of Acegi, beginning with writing an access control policy and storing it in a directory service.

    系列下一文章开始介绍 Acegi一些较为高级应用首先编写访问控制协议将其存储目录服务中。

    youdao

  • The results showed the model with single-log-in could access to resources in PULL mode, protect the private privacy and the access control policy and could be implemented easily.

    分析表明,模型具有单点登录、PULL模式访问资源用户隐私保护、访问控制策略保护、易于实现的特点。

    youdao

  • The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.

    系列下一文章将展示如何设计访问控制策略,如何将它们托管目录服务中,以及如何配置Acegi读取的访问控制策略。

    youdao

  • Before 1970, in order to protect the information security in computer systems, mandatory and discretionary access control policy had been widely applied in secure computer systems.

    上世纪七十年代以前保证计算机系统中的信息安全性自主存取控制强制存取控制策略在计算机多安全级系统中得到了广泛的应用。

    youdao

  • In this second article, I begin to discuss the more advanced USES of Acegi, starting with writing an access control policy and storing it in ApacheDS, an open source LDAP directory server.

    第二篇文章中,讨论Acegi更加高级应用首先我将编写访问控制策略将其存储ApacheDS中,ApacheDS是一个开源LDAP目录服务器。

    youdao

  • Acegi relieves you from writing code, so in this article, I show you how to first store user and role information in ApacheDS and then implement an access control policy for that information.

    Acegi将减轻代码编写的工作,因此篇文章展示如何用户用户角色信息存储到ApacheDS中,然后实现这些信息的访问控制策略

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.

    其他中介模式提供了安全和管理策略定义直接间接访问以便中介能够执行适当控制

    youdao

  • Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.

    其他中介模式提供了安全和管理策略定义直接间接访问以便中介能够执行适当控制

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定