测试Web应用程序的安全配置。
用户的特定要求取决于DB2的安全配置。
The specific requirements of the users depend on the security configuration of DB2.
由应用程序使用的凭据库在应用程序的部署计划中的安全配置中指定。
You specify the credential store to be used by an application in the security configuration in the application's deployment plan.
因此,应用程序具有不同的用户群体和不同的安全配置,如图12所示。
As a result, applications have a distinct user population and distinct security configuration, shown in Figure 12.
清单12显示了用于本文使用的示例应用程序之一的安全配置。
Listing 12 shows the security configuration of one of the sample applications used in this article.
涉及网络的规划、服务器的安全配置、数据库的安装测试等。
It involves the planning of network, the safe disposition of server, the installation test of data bank, etc.
这些文件指定了RMI - IIOP与服务器的通信中要使用的安全配置。
These files specify security configuration to use in RMI-IIOP communication with the server.
这可能导致布置在网络中的系统需要的信任级别更低,或者会暴露本地的安全配置。
This may result in systems placed in network segments with lower than required trust levels or vulnerable local security configurations.
每个请求序列都使用不同的安全配置运行了多次,结果中仅记录各配置表现最好的数据。
Each request sequence was run multiple times in different security configurations with only the best time for each configuration kept in the results.
AIXPert提供单一的一致的安全配置,很容易跨多个系统复制安全配置。
AIXPert provides a single, consistent security configuration that is easy to replicate across multiple systems.
高配A8还还增加了全新的安全配置,装配了视觉盲点和车道偏离警报系统。
The upper-premium A8 also gets blind-spot detection and lane-departure warning systems.
在分析GSI原理的基础上,介绍了基于GSI的安全配置和编程的关键技术。
On the base of analyzing the theory of GSI, introduce the pivotal technology of deployment and programming of GSI-based system.
应用程序的Run-as 主体和缺省主体在应用程序的部署计划的安全配置中指定。
You specify the run-as and default subjects for the application in the security configuration in the application's deployment plan.
联系您的数据库管理员或参考db 2文档了解关于您的DB 2实例的安全配置的更多信息。
Contact your database administration or refer to the DB2 documentation for more information about the security configuration of your DB2 instance.
安全探测器,根据预先确定的配置来验证数据库acl,检查多台服务器中不一致的安全配置。
Security probes that verify a database ACL against a predetermined configuration and that check for inconsistencies in security configurations across multiple servers.
可以使用WebSphere应用服务器管理控制台中的安全配置向导完成安全配置和存储库配置。
You can use the security configuration wizard in the WebSphere Application Server administration console to complete the security configuration and repository configuration.
如果希望数据可由多个用户访问,并且要求数据库的安全配置验证每个对数据的检索,请不要使用缓存。
If you expect more than one user to access the data, and you want each retrieval to the data to be verified by the security configurations for the database, do not use caching.
将安全部署计划部署并链接到Geronimo,允许您的应用程序随后进行扩展并且使用其中的安全配置。
Deploying and connecting the security deployment plan to Geronimo allows your application to later extend and use the security configuration contained therein.
唯一的区别在于,在进行了标准的安全配置之后,您需要通过指定LTPA 令牌的使用来确保Web服务的安全。
The only difference is that, after you perform the standard security configuration, you need to secure the Web service by specifying the use of the LTPA token.
当使用WS-SecureConversation 时:两个单独的安全配置出现在服务策略中,一个用STS用于消息交换,另一个用于目标服务。
When you use WS-SecureConversation: two separate security configurations are present in the policy for the service, one for the message exchange with the STS and the other for the target service.
这款小应用程序阅览器提供可配置的安全保障。
简化的安全 配置。
出现故障的硬件需要修理或更换;软件需要应用补丁、更新和升级;必须根据需求和潜在的安全威胁提前配置系统。
Hardware failures demand repair or replacement; software requires patching, updates, and upgrades; and systems must be configured to keep ahead of demand and potential security threats.
所传输的是一个未经验证的凭证,根据EJB方法上配置的安全许可,这可能会导致授权失败。
What is transmitted is an unauthenticated credential, which, depending on the security permissions configured on the EJB methods, might cause authorization failures.
当使用SSL 时,可以应用“疑问 #1”中所提到的所有安全配置。
The security configurations mentioned in Myth #1 all apply when using SSL.
下图展示了以下安全配置的测试时间
The next figures show test times for the following security configurations
xml中保护应用程序的安全性配置。
Security configuration protecting the application in web.xml.
此外,对ServiceRegistry的安全访问需要配置SSL连接。
Moreover, secure access to the Service Registry requires configuration of an SSL connection.
在本测试中的所有安全配置中,Axis2始终是速度最慢的栈。
Axis2 is consistently the slowest of the stacks across all security configurations for this test case.
更安全的配置可以使用Apache的httpd处理请求并把它们交给Tomcat。
A more secure configuration would use the Apache HTTPD to process requests and hand them to Tomcat.
应用推荐