JACC provides the ability to delegate the permissions checking of security authorization to an external provider.
JACC提供了将安全授权的权限检查委托给外部提供程序的功能。
Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.
安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
Note that the JEE security model supports declarative security authorization as well as programmatic security for both Web containers and EJB containers.
注意,JEE安全模型对web容器和ejb容器支持声明式安全授权以及编程安全性。
You may not enter the security area without authorization.
未经批准不得进入警戒地区。
Authentication and Authorization security.
认证和授权安全。
Security configuration: Create and manage users and groups, manage authorization groups.
安全配置:创建和管理用户和组,管理授权组。
Authorization defined by the enterprise security model.
由企业安全模型定义的授权。
We will discuss the details of J2EE security later in the Authorization technologies section.
我们稍后将在授权技术部分中详细讨论J2EE安全性。
This setting determines whether security is enabled for transaction authorization.
该设置决定是否为事务授权启用安全性。
From a security perspective, attribute-level granularity of authorization privileges across all functions such as workflow, relationship and hierarchy management must be available for implementation.
从安全性的角度来看,必须跨所有功能(比如工作流、关系和层次结构管理)实现属性级的特权授权粒度。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
To perform the authentication, mapping, and authorization, an external security provider is required.
为了执行验证、映射和授权,就需要使用外部安全提供者。
For Authentication and Authorization checks a security token needs to be supplied.
对于身份验证和授权检查,需要提供安全令牌。
Security is a broad topic that includes authentication, authorization, and information transmission.
安全是一个涉及面很广的话题,如认证、授权及信息传输等。
The application authorization ID therefore becomes a security bottleneck; if it is ever compromised, then all enterprise resources will be exposed.
因此应用程序授权ID成为了安全瓶颈,它的泄漏将造成所有企业资源的曝光。
You configure EJB authentication and authorization by defining security roles in the deployment descriptor under which each method executes.
EJB 的身份验证和授权配置方法为:在部署描述符中定义安全角色,每个方法将依据部署描述符执行。
Both the DB2 and IDS security model consist of two main components: authentication and authorization.
DB2和IDS安全模型都由两个主要组件组成:身份验证和授权。
It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.
文中还介绍了DB 2UDB安全模型,包括用户身份验证、用户和组授权以及超级用户。
Component developers can use either programmatic or declarative security to define authorization policies.
组件开发者可以使用程序的或声明的安全来定义授权策略。
Third, the Security Council should improve the authorization of planning, planning and management of peace keeping operations.
第三,安理会应提高授权部署、规划和管理维和行动的水平。
As a consequence, architects often intend to also leverage existing security mechanisms such as authentication and authorization of the source systems.
因此,架构师经常还希望利用现有的安全机制,如源系统的身份验证和授权。
Database-level security measures including authentication and authorization might also be used to enhance application security.
数据库级的安全措施,包括身份验证和授权,也可以用于加强应用程序的安全性。
Security and authorization to the data sets must be considered here as well.
还必须考虑数据集的安全性和授权。
IBM DB2 CM provides various levels of security through authentication and authorization.
IBMDB 2CM通过身份验证和授权提供了各种级别的安全性。
Authorization and security identity for implementation.spring components is handled by the SCA container.
spring组件的授权和安全身份由sca容器处理。
Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.
扩充了Equinox安全模型的认证和授权将增强分布式系统的安全性。
SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.
xml文件中定义的SCA策略集可以被附加到这个实现以实施授权和安全身份策略。
For example, security (include both authentication and authorization), offline capability, and deployment.
例如,安全(包括身份验证和授权)、脱机功能和部署。
As I previously mentioned, Acegi USES security filters to provide authentication and authorization services to enterprise applications.
正如我前面提到的一样,Acegi使用安全过滤器为企业应用程序提供身份验证和授权服务。
Individualized security management to ensure that no single authorization id is a security bottleneck that can compromise the enterprise resources.
个人化安全管理,确保没有任何一个授权ID会成为企业资源泄漏的安全瓶颈。
应用推荐