所以,有这样的可能性:用户虽然通过了身份验证可以登录到一个系统,但是未经过授权,不准做任何事情。
It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
系统应该提供相应的机制,以便使用自行管理环境中的用户数据对用户进行身份验证,并使用按需环境中的访问控制数据进行授权。
The system should provide mechanisms to authenticate users with user data residing in the on-premise environment, and authorize with access control data residing in an on-demand environment.
它可以对一些数据库事件,例如授权检查、数据库对象维护、安全性维护、系统管理和用户验证等做日志记录。
It is capable of logging database events such as authorization checking, database object maintenance, security maintenance, system administration, and user validation.
用户需要具有根级别授权并且具有AIX系统管理的应用知识。
Users require root-level authorization and a working knowledge of AIX system administration.
这些攻击型的客户甚至可能是经过授权可以使用您的系统的用户,但却试图以一种不适当的方式来利用这种授权。
It is possible that the offending client could even be authorized to use your system, but is trying to exploit that authorization in some inappropriate way.
业务用户被授权,允许对业务规则进行快速定期更改,以便更快地测试这些规则并将它们推向客户系统。
Business users are empowered to make rapid cycle changes to business rules, which can then be tested and rolled out to customer systems more quickly.
任何安装了IBMSupportAssistant代理的系统都可以运行授权工作台用户指定的收集脚本。
Any system with an IBM Support Assistant agent installed can run the collection scripts specified by an authorized workbench user.
您将学习如何在Linux系统上建立和配置一个RemoteAuthenticationDial - inUserService服务器(RADIUS),以执行对用户的验证、授权和记帐(AAA)。
You'll learn how to set up and configure a Remote authentication Dial-In user Service server (RADIUS) on a Linux system to perform authentication, authorization, and accounting (AAA) for users.
授权:访问系统不同功能的变化,并执行不同的任务,以及相关用户群体和交易行为。
Entitlements: Variations in access to different parts of a system and perform varying tasks. Related to user population and transaction behavior as well.
这将允许系统中所有授权的用户都可以访问Employees文件夹中的页面。
This will allow the pages in the Employees folder to be accessible to any authenticated user on the system.
虽然MDMServer将终端用户认证委托给系统用户,但是它必须知道终端用户的身份,以提供事务性授权和数据授权。
Although the MDM Server entrusts end user authentication to the system user, it is necessary for it to know the identity of the end user in order to provision transactional and data authorization.
基本的WSTK标识服务用来进行授权(如果用户存在且与密码匹配,他们将被授权使用系统)。
The basic WSTK identity service is used for authorization (if a user exists and the password matches they are authorized to use the system).
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
不仅您和访问该服务的注册用户需要知道它,而且还要确保只有授权的系统或用户可以访问它。
Not only do you need to know and register who is accessing the service, but you also want to make sure that only authorized systems or users can access it.
如何知道系统用户就是他们所声称的,并只让他们访问经过授权的功能?
How do I know that the user of the system is who they say they are and only give them access to authorized functions?
图8所示的流程图总结了当用户试图在CM系统中创建项目时,授权机制如何发挥作用。
The flowchart in Figure 8 summarizes how the hierarchy of authorization takes place while a user tries to create an item in the CM system.
系统授权id:这是表示建立数据库连接的用户的授权id。
System authorization ID: This is the authorization ID representing the user who establishes a database connection.
可以增加对应用系统、时间、IP地址、用户名等多种因子的身份认证和授权管理。
Can increase the application system, time, IP address, user name and other factors of authentication and authorization management.
数据库的可用性是指不应拒绝授权用户对数据库的正常操作,同时保证系统的运行效率。
Availability of the database refers to the database should not refuse to authorize the user 's normal operation, while ensuring efficiency of the system.
安全:确保组件或系统保证用户信息机密性、数据完整性、授权的允许性。
Security: Ensure that the component or system maintains user confidentiality, data integrity, and authorized permissions.
要启动这项服务,谷歌需要用户拥有一个语音识别系统,于是它从业界领先的Nuance公司获得了经授权的软件。
To launch the service Google needed an existing voice-recognition system, so it licensed software from Nuance, a leader in the field.
例如,监视未授权的账号切换,或者更改尚未通过事件票据(incidentticket)或系统更改请求进行授权的用户账户属性。
For instance, monitoring unauthorised account switches or changing user account attributes that have not been authorised via an incident ticket or change request on the system.
我们没有通过w3授权系统提供完整的集成,所以用户注册表返回的信息量是有限的。
We were not providing full integration with the w3 entitlement system, so the amount of information that the custom registry was returning was limited.
安全管理保护网络用户资源与设备以及网络管理系统本身不被未经授权的用户访问。
Security management protects network user resources and devices and the network management system itself is not accessed by unauthorized users.
本文的研究重点是建立一个统一身份认证系统,实现对用户的统一管理、统一认证和统一授权。
The main research in this paper is to set up the unified authentication system which can complete unified authentication and authority and administer.
该系统实现了远程访问用户的安全认证、访问授权和记费管理。
The system achieves identity authentication, access authorization, and accounting management to the remote access users.
RBAC解决了具有大量用户、数据客体和各种访问权限的系统中的授权管理问题。
The RBAC solves the authorized management problems of the systems, which have massive users, data objects and all kinds of access jurisdictions.
透过任何途径,未经授权使用或企图未经授权使用本网站﹑用户帐户﹑连接本网站的电脑系统或网络。
Gain or make or attempt to gain or make unauthorized access to or unauthorized use of the Site, user accounts, computer systems or networks connected to the Site through any means.
透过任何途径,未经授权使用或企图未经授权使用本网站﹑用户帐户﹑连接本网站的电脑系统或网络。
Gain or make or attempt to gain or make unauthorized access to or unauthorized use of the Site, user accounts, computer systems or networks connected to the Site through any means.
应用推荐