Develop a authorization management system with responsibility for user management.
开发了负责用户管理和授权信息发送的授权管理系统。
What if there is a long time gap between the authorization and the capture?
如果在授权和捕获之间有一个长的时间间隙,那会怎么样呢?
To bring a hand gun into Hong Kong without proper authorization is a serious offense.
未经适当授权将手枪带入香港是严重罪行。
Note: Only one trusted context object can be associated with a primary authorization ID.
注意:只有一个可信上下文对象可以与主要授权ID关联。
It is also possible to have a certain level of authorization for users that have not been authenticated.
还有一种可能是用户虽然具有了某种程度的授权,却并未经过身份验证。
A typical access control and authorization scenario includes three main entities — a subject, a resource, and an action — and their attributes.
典型的访问控制和授权场景包括三个主要实体:主体、资源和动作以及它们的属性。
Static SQL can provide more consistent or even better performance and a better authorization model for DB2 applications.
静态SQL能够提供更加一致或者甚至更好的性能,以及更好的DB 2应用程序授权模型。
In a real-world scenario, most RPs would check a user's authorization before granting access.
在真实的场景中,大多数rp会在授予访问权之前检查用户的授权。
Users require root-level authorization and a working knowledge of AIX system administration.
用户需要具有根级别授权并且具有AIX系统管理的应用知识。
There is also a sample authorization job given.
这里也给出了一个示例授权任务。
CM USES privilege sets and ACLs to provide a stringent and granular authorization mechanism.
CM使用权限集合和ACL提供了一种严格的粒度级授权机制。
Consider a view that includes the name of every table on which a user's authorization id has been explicitly granted the SELECT privilege.
考虑一个包含每个表的名称的视图,并且用户的授权id被显式地授予了这些表上的SELECT权限。
Such a mapping between application and user ID is only possible if each user has a separate database authorization ID.
只有当每个用户都有一个单独的数据库授权ID时,才可能出现那样的应用程序与用户ID之间的映射。
Let's review the basics of authorization in a distributed environment and some PLAM architecture terminology.
现在让我们来复习一下关于分布式环境中授权的一些基础知识,以及PLAM架构的一些术语。
While this approach fixes the URL authorization and forms authentication anomalies, it introduces a new wrinkle: file authorization no longer works.
此方法解决了URL授权和窗体身份验证的一些问题,但同时也产生了新的问题:文件授权无法工作。
A request for authorization lands at the Policy Enforcement Point (PEP).
授权请求到达策略执行点(pep)。
I've documented a discrepancy in the JAAS authorization model and also described a practical workaround, offering a real-world implementation as its example.
我介绍了JAAS授权模型中的一个矛盾之处,并描述了一种解决它的实用方法,并提供了它的现实世界实现的一个例子。
You can't cash in a discretionary authorization.
不能自行授权委托现金。
You need to be authorized in the authorization table for a new authorization group.
您需要在新授权组的授权表中获得授权。
Requirements for a graphical display of authorization information
授权信息的图形显示的要求
Presume we are dealing with a credit evaluation and authorization system that serves.
假设我们正在处理一个信用评估和授权系统,它服务于。
A option: User authorization ID.
aoption:用户授权id。
A transaction authorization provider class has to implement the com.dwl.base.security.AuthorizationProvider interface.
事务授权provider类必须实现com . dwl . base . security . AuthorizationProvider接口。
For every transaction, you’ll likely pay a base authorization fee ($0.15-$0.30) plus an additional percentage.
对于每一笔交易,你要支付一个基准授权费(0.15—0.30美元)再加一个额外的百分比费用。
It defines a new authorization role called administrator.
它定义一个新的授权角色,名为administrator。
Kerberos also provides a system for authorization in the form of administering tokens or credentials.
Kerberos还以管理令牌或凭据的形式提供了一种授权系统。
Auth - a hash containing authorization parameters.
auth-包含授权参数的一个hash。
To use transaction authorization, you configure InfoSphere MDM Server to use a transaction authorization provider class.
为了使用事务授权,可以将InfoSphereMDMServer配置为使用一个事务授权provider类。
Remember that currently MDM Server provides a simple form of authorization using a single J2EE role called ServiceConsumer for all of its services.
记住,现在MDMServer使用一个J2EE角色ServiceConsumer 向它的所有服务提供简单的授权。
While not truly a type of authorization, a closely related problem is that of customizing a user interface to only show the specific functions that a specific user should be allowed to see.
虽然这不是真正的授权类型,但与此紧密相关的一个问题是对用户界面进行自定义,以使其仅显示允许特定用户看到的特定功能。
应用推荐