ObjectGrid自己并不提供任何现成的安全性实现,但提供了安全性插件,以便实现您所选择的安全性机制。
ObjectGrid does not provide any out-of-the-box security implementation of its own, but it does provide security plug-ins so you can implement the security mechanism of your choice.
通过适当的服务水平安全性设计和实现对服务进行标识和遵从性管理。
The services are managed for identity and compliance through proper service-level security design and implementation.
继续本系列中的下一篇文章,其中将继续探索仓库ETL过程的设计和实现、仓库性能、安全性等。
Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.
在所有这些场景中,借助在各个消息级别上、而不是在每个连接或每个队列上操作的产品组合中添加的工具,安全性更容易实现。
Security is easier to implement in all these scenarios with tools added to the mix that operate at the level of individual messages rather than per-connection or per-queue.
只需一个命令就能实现很高的安全性。
功能性需求是程序为实现安全性目标所执行的功能。
Functional requirements are functions that the program performs to implement the security objectives.
安全性组件包含各种安全性算法和机制的IBM实现。
The security components contain IBM implementations of various security algorithms and mechanisms.
定制的安全性插件的实现则有待您来决定。
The implementation of a customized security plug-in is left to your discretion.
错误的传输协议可能导致可伸缩性、实现难度、安全性和可靠性方面严重的问题。
The wrong transport can cause serious problems with scalability, implementation difficulty, security, and reliability.
就一般程序来说,安全性实现的细节并不重要。
As far as the average program is concerned, the details of the security implementation don't matter very much.
内部安全性指安全性考虑与SOA实现中的所有活动对应。
Security from within means that security considerations are coincidental to all the activities within an SOA implementation.
HLD必须清楚地从SOA实现的总体安全性的角度说明其设想。
The HLD must serve to communicate clearly what they have in mind in terms of providing overall security for the SOA implementation.
利用WebSphereDataPowerSOA设备为支持服务虚拟化和安全性的ESB网关实现奠定了基础。
Utilizing the WebSphere DataPower SOA appliance lays the foundation for the ESB Gateway implementation with its support for service virtualization and security.
例2:实现一个简单的组安全性插件。
可以使用HPITManagementPortfolio等工具统一各个层次的安全性以实现完全的可视性。
Tools like HP IT Management Portfolio can be used to unify the security layers for complete visibility.
演示如何实现简单安全性插件的示例?
Examples that demonstrate how to implement simple security plug-ins.
OpenSSH还提供了许多身份验证机制以实现额外的安全性。
OpenSSH also provides many authentication mechanisms for additional security.
安全性插件是按每个实例实现的,因此可以创建不同的实例,使用不同的安全性插件实现。
Security plug-ins are implemented per instance, therefore you can create different instances, and have different security plug-in implementations.
已经由云提供者实现的安全性是另一个可用服务,客户可配置该服务来满足其增强的安全策略。
Security already implemented by cloud providers is one more available service that customers can configure to satisfy the their enhanced security policies.
一个重要的不同之处就是安全性实现的完整性和正确性。
One important area of difference relates to the completeness and correctness of the security implementations.
这个主体是作为J2EE上下文来建立的,所以我们可以确保在服务实现中定义的安全性约束在分派组件之前得到满足。
The principal is established as the J2EE context so that we can ensure that the security constraints that are defined on the service implementation are met before dispatching the component.
使用GSS - API的主要优点是,通过使用这种通用API编写代码,您的实现可以与不同的安全性系统互操作。
The main advantage of using the GSS-API is that by writing to this generic API, your implementation can interoperate with various security systems.
由于复杂性是安全性的“敌人”,这种方法可以实现的安全性也是有限的。
Since complexity is the enemy of security, there is also a limit to how much security can be attained this way.
基于角色的安全性是组织命令、实现安全性最简单的方法。
Role-based security is the most straightforward way to organize commands for security purposes.
元数据模型还与事件检验和安全性的定义和实现紧密集成。
The metadata model is also tightly integrated with the definition and implementation of the event validation and security.
在继续阅读之前,请考虑更多的应用程序场景,除了实现URL安全性以外,这些场景还要求您对单独的类访问进行保护。
Before moving on, let's consider a couple more application scenarios that might require you to secure individual classes in addition to implementing URL security.
通过比较实现安全性的不同方式,从全新的视角描述您熟悉的平台的安全性。
Provide a fresh perspective on security on the platform you are familiar with, by comparing it to a different way of implementing security.
通过本文还可以了解安全性插件的一些限制,使用安全性插件时可能遇到的一些常见问题,从而有助于您在实现自己的安全性插件时调试问题。
You learned about restrictions on security plug-ins, and common errors encountered while working with them to help you debug problems when implementing security plug-ins on your own.
本系列的第2部分主要关注DB 2安全性插件,这是实现DB 2安全性的新方法。
Part 2 of this series focuses on DB2 security plug-ins, the new method that implements DB2 security.
本文的示例为您展示了如何实现安全性配置。
The example in this article has shown you how to implement the security configuration.
应用推荐