如果试着从您没有追随的受保护用户获得信息,请求就会失败。
If you're trying to retrieve information from a protected user who you're not following, your request will fail.
从如图11所示的Setuserinformationforthefenced user界面中,输入有关受保护用户的信息,并单击Next。
From the Set user information for the fenced user screen, as shown in Figure 11, enter the information about the fenced user and click Next.
安全标签是应用到行和列上以保护数据的数据库对象,将安全标签授给用户时他们才可以访问受保护的数据。
Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.
它向您提供使用定义的安全约束保护资源的能力,然后定义可以访问受保护资源的用户角色。
It gives you the ability to protect a resource with a defined security constraint and then define the user roles that can access the protected resource.
用户试图访问受保护的资源。
现在,如果用户访问受保护的URI,然后再访问不受保护的 URI,其标识将为可用状态。
Now, if a user accesses a protected URI and then an unprotected URI, their identity will be available.
当一个未经验证的用户试图访问受保护的资源时,提供一个登录页面。
Present a login page whenever an unauthenticated user tries to access a protected resource.
当还没有经过身份验证(或者身份验证会话已经过期)的用户请求受保护的资源时,最初的请求不会到达后端服务器。
When a user requests a protected resource but has not yet authenticated (or their authentication session has expired), the initial request does not reach the back-end servers.
这此起了广泛的争议,大量的用户可随意使用受版权保护的资料。
Huge debate has been sparked over concerns of the amount of users accessing copyrighted material unwittingly.
RP判断登录的用户是否有权访问受保护的资源。
The RP determines whether the logged-in user has authorization to access the protected resource.
用户请求受webseal保护的资源,这个资源充当代理并拦截所有的请求。
A user requests a resource protected by WebSEAL, which serves as the proxy and intercepts all requests.
用户请求受webseal保护的资源。
有了 OAuth,一个资源所有者可以授权第三方应用程序访问受保护的资源,而不损害用户证书。
With OAuth, a resource owner can authorize third party application access to the protected resource without compromising user credentials.
OAuth握手完成之后,访问令牌颁发,客户可以使用这个访问令牌代表用户访问受保护的数据。
After the OAuth handshake completes, the access token is issued and the consumer can use the access token to access the protected resources on behalf of the user.
如果用户拥有安全策略使用的每个规则的豁免权,那么该用户将拥有受那个安全策略保护的所有数据的完全访问权。
If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.
如果一个用户试图访问一个受保护的列,而他们的LBAC凭证又不允许他们访问该列,那么这样的访问将失败,用户收到一条错误消息。
If a user tries to access a protected column that their LBAC credentials do not allow them to access, then the access will fail and they will get an error message.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
使用受保护高级高速缓存类型,这样属于同一组的用户就能够访问相同的缓存条目。
Use the Secured advanced cache type so users that belong to the same groups will access the same cached items.
如果用户试图访问任何受保护的页面,样例应用程序将显示登录页面。
If the user attempts to access any of the protected resources, the sample application presents the login page.
直接所有权是用户和某些受保护数据间的一种十分常见的基于实例的关系。
Direct ownership is a very common form of instance-based relationship between a user and some protected data.
当一个用户试图访问受保护的数据时,必须将他的安全标签与保护数据的安全标签进行比较。
When a user tries to access protected data, his security label is compared to the security label that is protecting the data.
此方法定义受保护系统的各个组件,并将这些组件映射到能够对其进行访问的用户组。
This methodology defines various components of the protected system and maps those components to the groups of users who can access them.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
The database security administrator allows users access to protected data by granting them security labels.
对于受保护的资源,用户只能在认证之后,确定了用户的一些细节信息(比如其角色、所属的组织或团队),才能访问这样的资源。
Protected resources are only accessible by a user after the user is authenticated and the details about the user such as their roles, what organizations or teams they belong to are established.
RP授予访问权:授予用户对受保护资源的访问权。
RP grants access: The user is granted access to the protected resource.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
对该区域受保护资源的访问基于RACF用户个人文件及其群组成员关系。
Access to protected resources on this region is based on the RACF user profile and its group membership.
为了实现这种整合,一个站点需要访问另一个站点的用户资源,而这些资源经常是受保护的(家庭照片、工作文档、银行记录)。
In order to enable this kind of integration, sites need to access the user resources from other sites, and these are often protected (private family photos, work documents, bank records).
将授权用户直接重定向到所需的受保护资源。
Redirect an authorized user directly to the required protected resource.
安全管理员通过为用户授予安全标签来允许用户访问受保护的数据。
The security administrator allows users access to protected data by granting them security labels.
应用推荐