See emitting declarative security attributes.
请参见发出声明性安全属性。
LpSemaphoreAttributes is a pointer to the security attributes.
lpSemaphoreAttributes是一个指向安全性属性的指针。
Security attributes are used only for declarative security.
安全特性仅用于声明性安全。
Commands to change the security attributes of ClipBook pages.
更改剪贴簿页面安全属性的命令。
DCE security service use PACs that describe a client's security attributes.
DCE安全服务使用pac来描述客户端的安全属性。
You can simply use put/get methods to have access to the security attributes.
您可以使用put/get方法来访问这些安全属性。
These security attributes are the principal identity and the group information.
这些安全属性包括主体身份和组信息。
Principal UUID: the UUID of the principal whose security attributes are described in PAC.
主体UUID:一个主体的UUID,PAC中描述了该主体的安全属性。
The token contains the user's security attributes, including customization attributes and groups.
该令牌包含用户的安全属性,其中包括自定义属性和组。
When String type key-value pairs are simply not sufficient to propagate the necessary security attributes.
当String类型的键-值对不足以传播所需的安全属性时。
The security attributes of trusted context can be tuned to ensure air-tight access to the database servers.
可以通过调优受信任上下文的安全属性,确保对数据库服务器的无懈可击的访问。
These tokens typically contain the user's name and some security attributes, such as their group memberships.
这些令牌通常包含用户名和一些安全性属性,比如它们的组成员关系。
The default propagation token that is used for propagating the security attributes is attached to the running thread.
将用于传播安全属性的缺省传播令牌附加于运行的线程。
You need to add a few lines of code to the sender and the target application to place and receive security attributes.
您需要为发送和目标应用程序添加几行代码,以放入和接收安全属性。
When the EchoService issues a response, it is sent to the DataPower Web Service Proxy to add the specified security attributes.
当EchoService 发出响应时,会将其发送到DataPowerWeb服务代理添加指定的安全属性。
Explains how to apply declarative security attributes to types and members in dynamic assemblies, and to dynamic assemblies themselves.
解释如何将宣告式安全性属性套用到动态组件中的型别和成员,以及套用到动态组件本身。
When additional security related information should be present, attached to the actual user identity (subject), then security attributes can hold this information.
当需要提供安全相关的附加信息并将其附加到实际用户标识(主题)时,可以使用这些安全属性来保存该信息。
Producing reports on security attributes of users is one method of determining and identifying if there are any inconsistencies in your password or security policy.
生成用户安全属性报告有助于判断和识别密码或安全策略中是否有不一致的地方。
Security controls for most resources are applied based on group membership and user attributes.
对于大多数资源,安全性是根据组成员身份和用户属性应用的。
Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.
典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
The security intermediation between principals can be further deconstructed into enforcement points, decision points, contracts, and attributes.
主体之间的安全中间层可以进一步分解为执行点、决策点、契约和属性。
Looking at the users overrides of system defaults, one can then determine if the attributes for the users set are valid according to the implemented security policy.
通过查看用户账户覆盖系统默认设置的情况,就可以判断用户的属性集对于实现的安全策略是否合法有效。
Attributes like threading, instancing, auditing, security and hosting are important regardless of the protocol.
类似线程、实例化、审计、安全与托管等重要特性都不需要考虑协议。
It lists the standard SCA policy elements and attributes for three domains: security, transaction and reliable messaging.
它列出了三个域的标准sca策略元素和属性:安全、事务和可靠消息传递。
All content must be tagged with content attributes and metadata, including those for security policies, by content administrators and portal administrators.
内容和门户管理员必须使用内容属性和元数据(包括用于安全策略的内容属性和元数据)标识所有内容。
Security attribute propagation is a service provided by the application server to propagate various attributes, tokens, or objects related to the security context.
安全属性传播是应用服务器所提供的一种服务,用以传播各种属性、令牌、或与安全上下文相关的对象。
This article is not a guide on AIX hardening or how to implement a security policy, but rather attributes relating to password policies that should be considered.
本文并不讨论如何保护 AIX或如何实现安全策略,而是讨论与密码策略相关的应该注意的属性。
It turns out that the protocol is the easy part; it's the other attributes (threading, security, etc.) where WCF will save you time.
显然,简单的原因一部分是因为协议,而WCF提供的其他特性(线程、安全等)又为我们节省了时间。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
应用推荐