单击add添加一个新的安全性约束。
输入您希望添加安全性约束的war文件的位置。
Enter the location of the war file that you want to add security constraints to.
我们为完整的 DADX组创建一个安全性约束。
安全性约束类似于数据库中的“GRANT”语句。
Security constraints are similar to "GRANT" statements in the database.
清单5.web . xml中的安全性约束。
安全性约束在该方法中的条件来计算脱线和上线过载限制检查。
In this method conditions for security constraints are calculated off-line and overload limits are checked on-line.
一些安全性约束不会将自己显示为SecurityException。
Some security restrictions do not show themselves as a SecurityException.
这个主体是作为J2EE上下文来建立的,所以我们可以确保在服务实现中定义的安全性约束在分派组件之前得到满足。
The principal is established as the J2EE context so that we can ensure that the security constraints that are defined on the service implementation are met before dispatching the component.
根据web. xml文件中指定的安全性约束,通常会定义一个或多个角色,这些角色的用户将拥有访问这些脚本的适当权限。
You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.
SOP是一种安全性约束,它实际上禁止从某个源(即URL的协议/主机/端口三元组)装载的页面访问来自不同源的数据。
The SOP is a security restriction that basically forbids a page loaded from a certain origin (meaning the protocol/host/port trio of the URL) to access data from a different origin.
我们将使用应用服务器工具集(Application Server Toolkit,ASTK)来修改示例war文件,以增加安全性约束。
We are going to use the Application Server Toolkit (ASTK) to modify the sample war file to add security constraints.
方法权限将安全性角色映射到特定的EJB方法而安全性约束则将安全性角色映射到Web资源集合中,这些Web资源集合是HTTp方法和URL模式的一个组合。
Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.
接下来的三个图展示如何添加安全性约束(图8),如何设置正确的URL和HTTP方法(图9)以及如何针对该约束允许“DADXUser”角色(图10)。
The next 3 figures show how to add the security constraint (Figure 8), how to set the right URL and HTTP methods (Figure 9) and how to allow the role "DADXUser" for that constraint (Figure 10).
servlet的web.xml文件包含一个 <security-constraint>元素,该元素定义安全性约束、它应用的 HTTP方法以及使用该约束的角色。
The web.xml file for the servlet contains a <security-constraint> element that defines the security constraint, the HTTP methods that it applies to, and the roles that use the constraint.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。请指定要传输的对象。
Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes. Specify the object (s) to transfer.
银行软预算约束的存在使银行业风险监管的有效性受到了很大的影响,仅通过最低资本规定无法有效实现金融体系的安全性和稳定性目标。
Soft budget constraint greatly reduced the effect of banking risk supervision, so it's not easy to realize the safety and stability of financial system only with minimum capital requirement.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
应用推荐