• What if there is a long time gap between the authorization and the capture?

    如果授权捕获之间一个长的时间间隙什么呢?

    www.ibm.com

  • What do our efforts now have to do with the original authorization of the use of force?

    我们现在的一切当初授权使用武力初衷还有什么联系吗?

    article.yeeyan.org

  • You can define roles in this record as well provide authorization for your application.

    可以这个记录定义角色以及应用程序提供授权

    www.ibm.com

  • What is authorization?

    什么授权

    www.ibm.com

  • It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.

    所以,有这样可能性用户虽然通过身份验证可以登录一个系统但是经过授权不准任何事情

    www.ibm.com

  • I do not know yet what they will look like, but I do know that if we treat them as nothing more than extensions of the queue authorization model, the "best" practice will be wrong.

    知道它们是什么样子但是知道如果我们它们简单视为队列授权模型扩展则该最佳实践错误的。

    www.ibm.com

  • If you choose to deploy them, do so carefully and ensure that they have proper authorization on their operations.

    如果选择部署它们十分谨慎,以确保它们操作具有合适授权

    www.ibm.com

  • This can be a devil to debug because the authorization script may work one day and fail the next, and nothing in the script itself has changed.

    可能会影响调试工作因为授权脚本可能一天正常工作,而第二天失败,但脚本本身却没有发生任何变化

    www.ibm.com

  • Authentication and Authorization security.

    认证授权安全

    www.infoq.com

  • The solution should implement some type of authentication system to understand who is asking for a resource and an authorization system to decide whether the access should be granted.

    解决方案应该实现某种类型身份验证系统理解正在请求一个资源实现一个授权系统决定是否授予访问权

    www.ibm.com

  • In fact, I would go so far as to say that the authorization scheme is not complete until there is nothing that you can remove or simplify without breaking it.

    事实上写了这么多文字的目的就是希望大家能够认识授权模式永远都不是完善的,除非已经简化不能简化为止

    www.ibm.com

  • The best practices for authorization of topics have yet to emerge.

    用于主题授权最佳实践没有出现

    www.ibm.com

  • As you can see, this is not a very clean implementation of the authorization requirements.

    正如看到的,不是授权需求一个条理非常清楚实现

    www.ibm.com

  • Administrators can create, transfer, or delete work items of every authorization role to anybody.

    管理员可以任何人创建传输删除每个授权角色工作

    www.ibm.com

  • Security -- authorization of the request, encryption and decryption as required, validation, etc.

    安全性——请求授权加密解密需要时)、确认等等

    www.ibm.com

  • For example, if no authentication or authorization of service requests is required, the choice of technology can be very broad.

    例如如果服务请求需要提供身份验证授权,实现技术选择可以非常广泛

    www.ibm.com

  • So the question is: how does this impact J2EE application server security, and in particular, how does it affect authorization in this space?

    因此面临的问题如何影响J2EE应用服务器安全性特别是如何影响领域内授权

    www.ibm.com

  • This usually requires some form of authorization and authentication against a user registry.

    通常需要某种形式授权用户注册身份验证

    www.ibm.com

  • At a high level, we apply authentication and authorization rigorously.

    级别上我们严格应用身份验证授权

    www.ibm.com

  • Using this plug-in provider, you can model your staff queries for any plug-in, and switch authorization during your tests on and off by simply changing the staff plug-in provider JNDI name for a task.

    使用插件提供程序可以针对任何插件建模人员查询并且打开关闭测试期间通过更改任务人员插件提供程序JNDI名称就可切换授权

    www.ibm.com

  • Finally, consider the authorization and authentication example from above.

    最后考虑上面授权身份验证例子

    www.ibm.com

  • From a security perspective, attribute-level granularity of authorization privileges across all functions such as workflow, relationship and hierarchy management must be available for implementation.

    安全性角度来看必须所有功能比如工作流关系层次结构管理实现属性特权授权粒度

    www.ibm.com

  • The notion of authorization solves the problem, but introduces a few interesting scenarios, which I'll discuss below.

    认可概念解决了这个问题但也引入几个有趣方案在下面讨论

    www.ibm.com

  • You can also set authentication and authorization configuration for XML management.

    可以XML管理设置身份验证授权配置

    www.ibm.com

  • Upon completing the article (or tour) you should have a complete understanding of both the conceptual basis of each authorization framework and its underlying mechanisms.

    完成本文或者游览应当可以每一种授权框架基础概念它们底层机制全面了解

    www.ibm.com

  • The ability to produce -- and manipulate -- tables of this sort is a key capability for any authorization framework.

    能够生成此类对这些进行操作对于任何授权框架来说都是一项关键功能

    www.ibm.com

  • It is also possible to have a certain level of authorization for users that have not been authenticated.

    还有可能用户虽然具有某种程度授权,却并未经过身份验证

    www.ibm.com

  • If found, grant authorization, otherwise deny.

    如果发现授予授权否则拒绝

    www.ibm.com

  • In the next section, you will see how to set up authentication and authorization rules using LDAP.

    在下一部分中,了解到如何利用LDAP建立认证授权规则

    www.ibm.com

  • This typically means that the authorization rules have to be embedded into the data access logic of the application itself.

    通常意味着必须授权规则嵌入应用程序本身数据访问逻辑之中。

    www.ibm.com

词组短语

authentication and authorization 鉴别与授权;验证和授权

authorization letter 授权书;授权信

letter of authorization 授权证书;委任证书

written authorization 授权书;核准书

access authorization 存取授权;访问权限

authorization code [计]授权代码

  更多收起词组短语
$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定