登录以输入认证和帐户访问授权的凭证。
Log in to enter credentials for authentication and account access authorization.
连接到端口的设备没有得到网络访问授权。
The device attached to the Port is not authorized for access to the network.
不要将其用作一种不安全的访问授权形式。
It should not be used as an insecure form of access authorization.
数据访问服务:这些服务负责数据访问授权、限制和日志记录。
Data access services: These services are responsible for authorization, restrictions and logging access to data.
终端用户只能访问授权给他们的数据集市,而非所有的数据仓库数据。
End users can only access the data mart granted to them, not all data warehouse data.
即,消息传递引擎将根据我们前面讨论的连接标识对此队列进行访问授权。
That is, the messaging engine authorizes access to the queue based on the connection identity as we discussed earlier.
该系统实现了远程访问用户的安全认证、访问授权和记费管理。
The system achieves identity authentication, access authorization, and accounting management to the remote access users.
这两种技术在单点访问系统中实现身份认证和访问授权控制功能。
The PKI and PMI can provide functions of authentication and authority in the SAS.
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
在做校准时,技术人员需要登入系统中,他们只能访问授权使用的那些规程。
To perform a calibration, a technician logs into the system. Technicians have access only to those procedures that they are authorized to perform.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
因为我们现在只使用自签名证书,所有这些根证书代表对我们的队列管理器的不恰当的访问授权。
Since we are using only self-signed certificates, all of these root certificates represent inappropriate access grants to our queue managers.
访问授权在各客户中被指派。无论在哪工作,都必须在客户中为每一个用户建立用户主记录。
Access authorization is assigned per client. You must create a user master record for each user in the client where he or she wishes to work.
拥有正确访问授权的涉众可能要求该服务在99%的时间内可用,并且每个文档页的下载时间不超过四秒。
The stakeholders who have the proper access authorizations can require that the service be available 99% of the time and that the download time per page of the document be no more than four seconds.
当被选中时,角色自动拥有对实体中所有组织的访问授权。这亦会在组织数量较多时提高系统性能。
When selected, the role has access to all organizations of the client automatically. This also increases performance where you have many organizations.
Linux的文件所有权和访问授权是与用户id 和组密切相关的,所以我们要复习一下基本的用户和组信息。
Ownership of files in Linux and access authority are closely related to user ids and groups, so let's review some basic user and group information.
在与客户的访问令牌访问权限有关联范围,它定义了访问授权的客户拥有资源所有者的程度(用户的)资源。
The access permissions associated with the client's access token have a scope, which defines the degree of access authorization the client has for the resource owner's (the end user's) resources.
更安全:可进行网络对象识别,身份认证和访问授权,具有数据加密和完整性,能够实现一个可信任的网络。
Safer: can undertake network object identifies, identity attestation and visit accredit, have number to be mixed closely according to adding integrality, can realize a dependable network.
认为数字图书馆有必要通过用户认证和访问授权的机制对虚拟用户进行管理,并研究他们访问和利用数字资源的规律。
It is indispensable for the digital library to manage the virtual patrons with authentication and authorization and to probe the laws of their access to and use of digital resources.
通过对用户证书中的属性取值进行评估,把符合条件的用户分配给特定角色,从而达到了根据用户的特征及资历实施访问授权的目的。
By evaluating the value of user attributes in the user credential, a qualified user is assigned to a specific role. This allows access authorization based on user characteristics and qualifications.
因此,您能够将有效的门户会话和对安全资源的访问授权给WebSphereApplicationServer无法使用其缺省的身份验证机制进行身份验证的请求。
Hence, you have the ability to grant valid portal sessions and access to secured resources to requests that WebSphere Application Server can't authenticate with its default authentication mechanism.
这就是所谓的“大交易”,即机构订阅者通过网站授权协议为访问一系列在线期刊而付费。
There is the so-called big deal, where institutional subscribers pay for access to a collection of online journal titles through site-licensing agreements.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
目前多数系统都以专有的方式实现访问控制和授权。
Most of the current systems implement access control and authorization in a proprietary manner.
XACML的初衷是开发一项访问控制和授权系统的标准。
XACML is an initiative to develop a standard for access control and authorization systems.
当用户每天都试着访问仅授权给管理员的控制权时,会发生什么?
What happens when the everyday user tries to access a control that is authorized only for administrators?
防止对数据进行未授权的访问和更改。
Data must be protected from unauthorized access and modification.
如果您具有授权,则需要对请求访问的人进行授权以访问系统。
If you have Authorization, then the person requesting access needs to be authorized to access the system.
检查替代标识或原始标识是否已被授权访问消息流。
Check that the alternate identity, or the original identity, is authorized to access the message flow.
让SAML处理匿名或访客访问是可能的,但是这要求参与的企业就其自己的匿名访问或访客授权访问的约定达成一致。
It is possible to get SAML to handle anonymous or guest access, but this requires that the participating enterprises agree to their own convention for anonymous or guest authorized access.
应用推荐