To learn more, see: Database identity propagation in WebSphere Application Server.
要了解更多信息,请参见:Database identitypropagation inWebSphereApplication Server。
However, as with database identity projection, if you are willing to write some custom code, you can make this work.
不过,和处理数据库标识保护一样,如果您愿意编写一些自定义代码,就可以实现此功能。
A better approach is needed for ensuring that each user's database identity and database privileges are used for any database requests performed by a middle tier on behalf of that user.
为了确保对于中间层代表每个用户执行的任何数据库请求,都使用那个用户特定的数据库身份和数据库权限,需要一种更好的方法。
Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.
用户身份的丢失:有些企业想知道访问数据库的所有用户的身份,以便进行访问控制。
Loss of end-user identity: Enterprises need to know the identity of the actual user accessing the database for access control purposes.
最终用户身份丢失:为了进行访问控制,企业需要了解实际访问数据库的用户的身份。
When organizational changes are made or new personnel join or retire this identity database can be centrally managed and any organizational change can automatically trigger an event.
当发生组织修改或新人员加入或有人离开时,这个身份数据库能够集中管理,而且任何组织结构上的修改都能够自动地触发一个事件。
Using trusted contexts provides greater control while using restricted, sensitive privileges, and allows middle-tier servers or applications to assert the identity of the user to the database server.
通过使用可信上下文,可以在使用受限制的、敏感的特权时提供更强的控制,并且使中间层服务器或应用程序可以向数据库服务器确定用户的身份。
It also has an extensive database of DNA, the most specific marker of personal identity.
它还有大量的DNA数据库-个人身份最特殊的标记。
This is probably the trickiest part of working with an OODBMS because an object database USES a different notion of identity from a relational database.
这可能是使用OODBMS最棘手的部分,因为对象数据库使用与关系数据库不同的一致性概念。
Clearly, there is a need for a mechanism whereby the actual user's identity and database privileges are used for database requests performed by the middle tier on behalf of that user.
显然,需要用一种机制来确保对于中间层代表用户执行的数据库请求,仅使用实际的用户身份和数据库权限。
First, define a JAAS identity capable of logging into your database.
首先,定义一个JAAS标识用于登录到您的数据库。
There are several ways to map the identity, such as looking it up from a database, using an algorithm, and so on; these techniques are beyond the scope of this document.
可以通过几种方法来对标识进行映射,如在数据库中进行查找、使用一种算法、等等;这些技术超出了本文的讨论范围。
Once you have moved the data, you might need to update your database to start the numbering of your automatically generated identity columns higher than all the existing values in the migrated data.
一旦您迁移了数据,您可能需要更新您的数据库,使之在您自动生成的标识字段中从高于迁移数据所有值的数字开始计数。
With typical J2EE applications, a single connection pool identity is used for all database access.
对于典型的J2EE应用程序,会对所有数据库访问使用单个连接池标识。
This will lead to the creation of the largest, most complex identity database in the world.
这将生成世界上最大最复杂的身份数据库。
The application USES entities with table identity or database sequence key generation.
应用程序使用带有表标识或数据库序列密钥生成器的实体。
For example, a contact record may contain a last modified date and the identity of the modifying user (auditing information), and a unique identifier (database or persistence information).
比如,一个联系人记录可能包含一个“最近修改时间”和一个“修改用户的标识”,和一个“唯一标识”(数据库或持久化信息)。
There are standard data models for user identity formats and layering an organizational database on a structured identity repository like LDAP, can help organizations streamline their provisioning.
用户身份格式有一些标准的模型,它们按层次存在于一个有组织的数据库中,这个数据库位于结构化身份知识库中,如LDAP,它可以帮助组织合理化用户提取。
Prior to DB2 UDB V8.2, a Unicode database could only be defined with the collating sequence IDENTITY, which means that the characters are compared by their byte encoding.
在DB 2UDBV8.2之前,Unicode数据库只能定义为排序次序identity,这意味着按照字节编码对字符进行比较。
The passport check at immigration is the equivalent of the login (handing over the passport) and authentication (checking the identity in a database at the location).
移民局对护照的检查就等价于登录(递交护照)和身份验证(在某处、在数据库中检查标识)。
When connected to an L-1 SIRIS matching engine, PIER devices can confirm an individual's identity against a database of 1 billion records in less than one second.
当与L - 1 SIRIS匹配引擎联接使用的时候,PIER设备可以根据拥有10亿条数据的数据库,在不到一秒的时间内对个体进行识别。
The value of this identity can be specified by the application or generated by a database sequence.
这个id的值可以由应用程序指定或由数据库序列生成。
You will adjust your JPA entities to have the ID attributes specified as ones that will have unique values generated for them by your database, using the Identity Generation scheme.
您要调整您的JPA实体,使用IdentityGeneration方案以将ID属性指定为数据库所生成的独特值。
The thesis introduce the base of network database security, which includes modern cryptology and database security, and introduce principle of fingerprint characteristic in identity identification.
本文首先介绍网络数据库安全的基础:即现代密码学和数据库安全,接着介绍了指纹特征在身份认证中的原理。
If a child who is registered on the database goes missing and is found, an iris scan will be able to quickly determine his or her identity, much faster than DNA identification.
在数据库中有记录的孩子走失被找回后,扫描虹膜便可迅速确定其身份,比DNA身份核验更加快捷。
The most closely related sequence in the database was Lycoris mild mottle virus with 72.8% nucleotide identity in their coat proteins.
数据库中与其最相似的部分序列为石蒜轻斑驳病毒,外壳蛋白基因核苷酸序列同一性为72.8%。
The most closely related sequence in the database was Lycoris mild mottle virus with 72.8% nucleotide identity in their coat proteins.
数据库中与其最相似的部分序列为石蒜轻斑驳病毒,外壳蛋白基因核苷酸序列同一性为72.8%。
应用推荐