Click add to add a new security constraint.
单击add添加一个新的安全约束。
Listing 5. Security constraint inside web.xml.
清单5.web . xml中的安全性约束。
Add a security constraint for this Web application.
为这个Web应用程序添加一项安全约束。
Configuring a security constraint for the login page.
为登录页面配置安全约束。
Next, you need to define a second security constraint.
接下来,需要定义第二个安全约束。
Stanza 3: Defining a security constraint for a RESTful service
第三部分:为REST 式服务定义一个安全约束
You will need to define a security constraint for the Web application.
需要定义Web应用程序的安全约束。
Figure 4 shows the security constraint we defined for our form-login page
图4显示了在表单登录页面上定义的安全约束
Figure 5 shows the security constraint we defined for the SecureServlet Web resource.
图5显示了为SecureServletWeb资源定义的安全约束。
In Stanza 3, we define a security constraint for comment.groovy which is the RESTful resource handling our AJAX services.
在第三部分中,为comment . groovy定义一个安全约束,comment . groovy是一个处理AJAX请求的rest式资源。
It gives you the ability to protect a resource with a defined security constraint and then define the user roles that can access the protected resource.
它向您提供使用定义的安全约束保护资源的能力,然后定义可以访问受保护资源的用户角色。
Note: if you need to access resources that require authentication, you can specify a second servlet mapping that is associated with a security constraint.
注意:如果您想访问需要认证的资源,那么您可以指定第二个与安全性限制相关联的servlet映射。
Security constraints are consistent by modifying security constraint definition, and an effective classification assignment algorithm is given in this paper.
通过修改安全约束的定义,使得安全约束之间始终是协调的,并给出一种高效的密级分配算法;
The web.xml file for the servlet contains a <security-constraint> element that defines the security constraint, the HTTP methods that it applies to, and the roles that use the constraint.
servlet的web.xml文件包含一个 <security-constraint>元素,该元素定义安全性约束、它应用的HTTP方法以及使用该约束的角色。
The next 3 figures show how to add the security constraint (Figure 8), how to set the right URL and HTTP methods (Figure 9) and how to allow the role "DADXUser" for that constraint (Figure 10).
接下来的三个图展示如何添加安全性约束(图8),如何设置正确的URL和HTTP方法(图9)以及如何针对该约束允许“DADXUser”角色(图10)。
We use the security-constraint tag to configure security permissions for resource collections.
我们使用security - constraint标记配置资源集合的安全权限。
For example we can add the following snippet inside the security-constraint to enforce use of SSL when user is accessing managed resources.
例如,我们可以在security - constraint的内部加上如下代码片段,这样当用户访问受管资源时,将会被强制使用SSL。
This is achieved through the security-constraint element in the Web deployment descriptor.
这通过Web部署描述符中的security - constraint元素来实现。
For other web applications, use a security-constraint element in the deployment descriptor.
对于其他的Web应用程序,请在部署描述符里面使用security - constraint元素来规定应用程序的安全约束。
From the economic point of view, if the cost of default is zero, the constraint will be lost, inevitably leading to the loss of transaction security.
从经济学角度,如果当事人违约成本为零时违约行为将失去约束,必然导致交易安全的沦丧。
But Chinese security market is incomplete under short-sale constraint, which causes the ineffectiveness of risk share and the loss of social welfare.
然而,我国存在卖空限制的证券市场是不完全的,这导致了风险分担的无效以及社会福利的损失。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
Through division of constraint conditions of units into security operation zone and non-security operation zone, a new model for internal economic operation is proposed.
通过划分机组的约束限制条件为安全运行区和非安全运行区,提出了一种基于开关控制策略的厂内经济运行模型。
Through division of constraint conditions of units into security operation zone and non-security operation zone, a new model for internal economic operation is proposed.
通过划分机组的约束限制条件为安全运行区和非安全运行区,提出了一种基于开关控制策略的厂内经济运行模型。
应用推荐