• JACC provides the ability to delegate the permissions checking of security authorization to an external provider.

    JACC提供安全授权权限检查委托给外部提供程序功能。

    youdao

  • Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.

    安全性更改另一个主要方面,它体现在WebSphere安全性授权模型基于角色安全性的转变中。

    youdao

  • Note that the JEE security model supports declarative security authorization as well as programmatic security for both Web containers and EJB containers.

    注意JEE安全模型web容器ejb容器支持声明式安全授权以及编程安全性

    youdao

  • You may not enter the security area without authorization.

    未经批准不得进入警戒地区

    《牛津词典》

  • Authentication and Authorization security.

    认证授权安全

    youdao

  • Security configuration: Create and manage users and groups, manage authorization groups.

    安全配置创建管理用户,管理授权组。

    youdao

  • Authorization defined by the enterprise security model.

    企业安全模型定义授权

    youdao

  • We will discuss the details of J2EE security later in the Authorization technologies section.

    我们稍后将授权技术部分中详细讨论J2EE安全性

    youdao

  • This setting determines whether security is enabled for transaction authorization.

    设置决定是否事务授权启用安全性

    youdao

  • From a security perspective, attribute-level granularity of authorization privileges across all functions such as workflow, relationship and hierarchy management must be available for implementation.

    安全性角度来看必须所有功能(比如工作流关系层次结构管理)实现属性级特权授权粒度

    youdao

  • We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.

    我们为认证授权通过加密保护数据这些方面的安全问题提供解决方案

    youdao

  • To perform the authentication, mapping, and authorization, an external security provider is required.

    为了执行验证映射授权需要使用外部安全提供者

    youdao

  • For Authentication and Authorization checks a security token needs to be supplied.

    对于身份验证授权检查需要提供安全令牌

    youdao

  • Security is a broad topic that includes authentication, authorization, and information transmission.

    安全一个涉及面很广的话题,如认证授权信息传输等

    youdao

  • The application authorization ID therefore becomes a security bottleneck; if it is ever compromised, then all enterprise resources will be exposed.

    因此应用程序授权ID成为安全瓶颈泄漏造成所有企业资源的曝光。

    youdao

  • You configure EJB authentication and authorization by defining security roles in the deployment descriptor under which each method executes.

    EJB身份验证授权配置方法部署描述中定义安全角色每个方法将依据部署描述符执行

    youdao

  • Both the DB2 and IDS security model consist of two main components: authentication and authorization.

    DB2IDS安全模型两个主要组件组成身份验证授权

    youdao

  • It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.

    文中介绍DB 2UDB安全模型包括用户身份验证、用户授权以及超级用户。

    youdao

  • Component developers can use either programmatic or declarative security to define authorization policies.

    组件开发者可以使用程序声明安全定义授权策略

    youdao

  • Third, the Security Council should improve the authorization of planning, planning and management of peace keeping operations.

    第三安理会提高授权部署规划管理维和行动水平。

    youdao

  • As a consequence, architects often intend to also leverage existing security mechanisms such as authentication and authorization of the source systems.

    因此架构师经常希望利用现有安全机制系统的身份验证授权

    youdao

  • Database-level security measures including authentication and authorization might also be used to enhance application security.

    数据库级安全措施包括身份验证授权可以用于加强应用程序安全性

    youdao

  • Security and authorization to the data sets must be considered here as well.

    必须考虑数据安全性授权

    youdao

  • IBM DB2 CM provides various levels of security through authentication and authorization.

    IBMDB 2CM通过身份验证授权提供了各种级别安全性

    youdao

  • Authorization and security identity for implementation.spring components is handled by the SCA container.

    spring组件授权安全身份sca容器处理

    youdao

  • Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.

    扩充Equinox安全模型认证授权增强分布式系统安全性

    youdao

  • SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.

    xml文件定义SCA策略可以附加这个实现实施授权安全身份策略

    youdao

  • For example, security (include both authentication and authorization), offline capability, and deployment.

    例如安全(包括身份验证授权)、脱机功能部署

    youdao

  • As I previously mentioned, Acegi USES security filters to provide authentication and authorization services to enterprise applications.

    正如前面提到的一样,Acegi使用安全过滤器企业应用程序提供身份验证授权服务

    youdao

  • Individualized security management to ensure that no single authorization id is a security bottleneck that can compromise the enterprise resources.

    个人化安全管理确保没有任何授权ID会成为企业资源泄漏安全瓶颈

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定