要理解这个安全模型,您应该熟悉所谓的通用安全服务应用程序编程接口(GenericSecurity Services application programming interface, GSS - API)版本2的更新1。
To understand the security model, you should familiarize yourself with something called the Generic security Services application programming interface (GSS-API) version 2, update 1.
该框架是在DB2UDBV8.2 中引入的,也支持基于通用安全服务应用程序编程接口(Generic Security Service Application Programming Interface,GSS-API)的插件身份验证。
This framework, introduced with DB2 UDB V8.2, also supports plug-in authentication based on Generic Security Service Application Programming Interface (GSS-API).
此场景对于理解安全处理所使用的完全配置的Web服务客户机应用程序非常有帮助。
This scenario may be helpful in understanding the facets of a fully configured web service client application to be used for security processing.
现在,应用程序可以将安全消息发送到后端服务。
The application is now ready to send secure messages to the back-end service. As shown in Figure 13.
对于两个服务应用程序的安全考虑。
可以开发Web服务安全策略应用程序来让系统管理员为具有不同角色和职责的用户自定义设置。
You can develop a Web services security policies application to allow the system administrators custom the settings for users with different roles and responsibilities.
J2EE平台管理基础结构并支持Web服务,以开发安全、健壮且可互操作的业务应用程序。
The J2EE platform manages the infrastructure and supports the Web services to enable development of secure, robust and interoperable business applications.
要对您的应用程序进行测试,首先在服务器上部署安全计划,然后部署您的应用程序。
Test your application by first deploying the security plan onto the server and then by deploying your application.
图8显示了使用业务流程和策略管理组件为企业的业务应用程序提供业务安全服务的业务应用程序服务。
Figure 8 shows the business application services that use the business process and policy management component to provide business security services to the business applications of the enterprise.
本文将着重介绍容器内应用程序的设计,此类应用程序依赖ejb容器提供企业服务,如事务处理和安全性。
This article focuses on the design of in-container applications relying on an EJB container for enterprise services, such as transactions and security.
尽管您能编写自己的JAX - RPC处理程序,应用程序服务器提供商也能够根据配置和安全策略决定是否允许一个新的处理程序存在。
Even though you can write your own JAX-RPC handlers, the application server vendor can decide, based on configuration and security policies, whether to allow a new handler or not.
需根据需要将这些策略的职责分配到应用程序、soa安全性服务和SOA组件,从而利用相应的机制来应用这些安全策略并加以执行。
You use mechanisms to apply these security policies and enforce them by assigning responsibility for those policies to applications, SOA security services, and SOA components as needed.
准备要部署在生产环境中的应用程序通常意味着管理员需要采取措施确保应用程序服务器是安全的。
Preparing an application for deployment in a production environment usually means that the administrator needs to take measures to ensure that the application servers have been secured.
当配置为高级安全模式时,安全代理服务器将根据静态路由信息路由应用程序请求。
When configured in high security mode, the secure proxy server will route application requests based on static route data.
您还应该了解一些事情,然后才可以把文档和应用程序的安全性托付给XKMS服务。
You should be aware of few things before you entrust the security of your documents and applications to the XKMS service.
诸如安全性和索引等其他服务必须在应用程序级别提供。
Other services, like security and indexing, must be provided at the application level.
这个错误通常由基本连接失败引起,例如试图对安全应用程序服务器进行不安全的连接。
This error is usually caused by a basic connection failure, such as attempting to make a non-secured connection with a secure application server.
除了在管理方面利用应用服务器的安全性之外,强烈建议在应用程序安全性方面利用它。
In addition to leveraging the application server's security for administration, it is strongly recommend that you leverage it for application security.
安全代理服务器将使用这个静态路由信息来确定应用程序请求。
The secure proxy server will then use this static routing information to target application requests.
注意我们强烈推荐应用程序利用 J2EE安全并且不要禁用服务器级别的安全。
Note that we strongly recommend that the application leverages J2EE security and to not disable security on the server level.
业务应用程序服务合并了一些业务安全特性,以确保业务事务执行期间的安全。
Business application services incorporate some of the business security features to ensure security during business transactions.
关闭不需要的服务将带来更安全的环境,其中可供潜在入侵者刺探的应用程序和服务更少。
Shutting off unneeded services creates a more secure environment with fewer applications and services for potential intruders to poke at.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
在不利用应用服务器安全性的应用程序中,常常会发现很严重的安全性漏洞。
Applications that did not leverage application server security were typically found to have serious security holes.
与应用程序服务器安全性同样重要的一个主题区提出了一些同样值得关注的问题。
A subject area as critical as application server security prompts a noteworthy volume of equally critical questions.
这类应用程序通常要求类似于安全性和事务支持的服务。
Such applications often require services such as security and transaction support.
它们都可以在基于客户端-服务器的应用程序中提供强大的安全身份验证功能。
They both offer a strong security authentication in client-server-based applications.
本文描述了如何使用Geronimo应用服务器提供的安全设施来构建安全的应用程序。
This article has described how to use security facilities provided by the Geronimo application server to build secure applications.
为了满足这个需求,设置Web服务安全性(WS-Security)来提供消费应用程序(Consuming Application)的 X.509证书作为 Web 服务请求中的二进制安全性令牌。
To address this need, WS-Security was set up to provide the Consuming Application's X.509 certificate as a binary security token within web services requests.
为了满足这个需求,设置Web服务安全性(WS-Security)来提供消费应用程序(Consuming Application)的 X.509证书作为 Web 服务请求中的二进制安全性令牌。
To address this need, WS-Security was set up to provide the Consuming Application's X.509 certificate as a binary security token within web services requests.
应用推荐