如何使用授权策略保护DB 2资源?
授权策略数据库包含域内所有资源的表示。
The authorization policy database contains a representation of all resources in the domain.
获取一个表示授权策略颁发者的声明集。
Gets a claim set that represents the issuer of the authorization policy.
了解和维护授权策略更加困难,即使代码没有任何缺陷。
Understanding and maintaining the authorization policy will be an order of magnitude more difficult, even if the code is free from defects.
组件开发者可以使用程序的或声明的安全来定义授权策略。
Component developers can use either programmatic or declarative security to define authorization policies.
这种方法的问题在于,它迫使我们将授权策略嵌入物理网络。
The problem with this is that it forces us to embed the authorization policy into the physical network.
声明式授权完全依赖于授权策略的部署描述符约束。
Declarative authorization relies entirely on the deployment descriptor constraints for authorization policies.
JAAS授权策略在纯文本文件中配置,这就使其管理起来有些麻烦。
JAAS authorization policies are configured in a plain text file, which makes them a little cumbersome to manage.
当在派生类中重写时,表示已经过评估的授权策略的结果。
The result of evaluating all authorization policies available from the tokens in the sent message and by calling theGetAuthorizationPolicies method.
请考虑图1所示的account类的授权策略这样一个示例。
Consider the example of an authentication policy for the Account class shown in Figure 1.
通过这种方法,单个静态类可以声明EAz应用程序的完整扩展授权策略。
In this way, a single static class declares the entire extended authorization policy of an EAz application.
您将收到一个失败响应,如 清单7 所示,这意味着授权策略已经成功实施
You will get a failure response, as shown in Listing 7, which means the authorization policy was successfully enforced
WS - Authorization:描述如何管理授权数据和授权策略。
WS-Authorization: Describes how to manage authorization data and authorization policies.
请注意,打包为WAR (WebArchives)文件的组合中不支持SCA授权策略。
Be aware that SCA authorization policy is not supported in composites packaged as war (Web Archives) files.
如果permissions类包含了应用程序的授权策略,则acl类实现了授权处理。
If the Permissions class embodies the authorization policy of an application, the ACL class implements the process of authorization.
开发人员可以根据需要授权或拒绝任意功能,但是应用程序授权策略现在部分或全部嵌入在其代码中。
A developer can authorize or deny arbitrary functionality as needed, but the application's authorization policy is now partially or completely embedded in its code.
可以看到,Grails中可以应用多种身份验证和授权策略,因为应用程序之间的需求是不一样的。
As you can see, multiple authentication and authorization strategies are available in Grails, because requirements vary widely among applications.
还授权订阅者在基于TivoliAccessManager的授权策略决策点调用已订阅的服务。
The Subscriber is also authorized to invoke the subscribed service in the Tivoli Access Manager-based authorization policy decision point.
RFIDIC的公开控制方法为实现这个建议提供了特殊的授权策略规则,这些规则将执行某些类型的查询的权力授予某些用户组。
The disclosure control method of RFIDIC realizes this suggestion by providing special authorization policy rules that assign the right to execute certain types of queries to certain user groups.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
对于此示例,请使用AccessManager访问控制列表(Access Control List,ACL)来管理ObjectGrid授权策略。
For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
这个域由两个安全结构主导:用户注册表(比如LDAP、LotusDomino或MicrosoftActiveDirectory)和一个授权策略数据库。
The domain is governed by two security structures: The user registry, such as LDAP, Lotus Domino, or Microsoft Active Directory, and a master authorization policy database.
我们需要向这个文件添加一个东西为类实例级授权扩展策略定义:一个与许可权语句相关的可选关系参数。
We need to add one thing to this file to extend the policy definition for class instance-level authorization: an optional relationship parameter associated with a permission statement.
对于上面列出的每种策略,保证该用户包含在授权的用户和组列表中。
For each of the policies listed above, ensure that the user is included in the list of authorized users and groups.
为了实现基于XACML的授权,您必须先编写一个策略。
To implement an XACML-based authorization, you first need to write a policy.
拦截器使用应用程序的访问控制策略来做出授权决定。
Interceptors use your application's access control policy to make authorization decisions.
定义用户的注册与授权、隐私及其他内容等方面的策略。
Defines policies on registration and authorization of users, privacy, and more.
数据访问服务基于授权和限制(策略和访问规则)来提供或阻止数据访问。
Data access services provide or prevent access to data based on authorizations and restrictions (policies and rules for access).
定义并加强项目策略,例如,谁被授权对工件进行更改。
Defines and enforces project policies, i.e., who is authorized to make changes to artifacts.
定义并加强项目策略,例如,谁被授权对工件进行更改。
Defines and enforces project policies, i.e., who is authorized to make changes to artifacts.
应用推荐