在部署计划中配置安全凭据,以构成Run - as角色安全性的主体。
You configure the security credentials that constitute the subject for run-as role security in the deployment plan.
安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.
每个数据源必须有确定的管理人(业务角色)负责数据的精确性、完整性和安全性。
Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.
现在您拥有了一个安全性角色,您需要给其分配一些资源。
Now that you have a security role, you need to assign it to some resources.
在方案集成过程中,您需要一直记住的一个安全性规则就是,不同的用户角色拥有其相应的特权设置。
During the solution integration, one security rule you need keep in mind is to be certain that different user roles have their corresponding privilege sets.
第二个问题是数据安全性,没有任何角色或用户访问检查来确保适当的数据访问。
The second issue is data security because there is no check of roles or users to ensure proper access to the data.
此外,如果需要的话,您还可以指定访问角色,为BE4 WS设定某一安全性级别。
Furthermore, you can assign access roles and set a certain security level for BE4WS if required.
在典型的IT组织中还包括多个其他角色,包括基础设施支持、数据库支持、安全性等等。
There are several more roles in a typical it organization, including infrastructure support, database support, security, and so on.
管理和应用程序安全性需要启用,以实施安全角色。
Administrative and application security needs to be enabled in order for security roles to be enforced.
软件如何配置和实现,像其他步骤那样扮演者关键的安全性角色。
How software is configured and implemented can play just as pivotal a security role as any other steps that lead to that point.
虽然这两个术语代表的是不同的含义,但出于它们在应用程序安全性方面各自的角色考虑,它们有时会被交换使用。
Though the two terms mean different things, they are sometimes used interchangeably because of their respective roles in application security.
V 4符合J2EE 1.2基于安全性角色而不是方法组的授权模型。
V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.
提示:要获取更精确的安全控制,可以通过使用下面的COM +角色和用户进一步缩小安全性。
TIP: For more precise security controls, you can narrow the security further by using the following COM + role and user instead.
如果这是您第一次打开此编辑器,那么您将看到一个问题,“您想要创建一个安全性角色吗?”
If this is the first time you've opened this editor, you will be presented with a question, "Would you like to create a security role?"
选择适当的安全性角色,如图23 所示,然后选择Next。
Select the appropriate security roles, as shown in Figure 23, then Next.
在SecurityRoles字段中,单击add添加一个新的安全性角色。
In the security Roles field, click add to add a new security role.
我们需要对web .xml做的最后一个更新针对的是安全性角色。
The last update we need to make to web.xml is for security roles.
bean提供者负责声明所有在企业bean代码中所用到的安全性角色的名称。
The bean Provider is responsible for declaring all the security role names used in the enterprise bean code.
结合基于角色的安全性,IBMCognosBI还提供动态报告功能。
In conjunction with Role based Security, IBM Cognos bi also offers dynamic reporting capability.
下面,我们将使用我们的一个样例包“Great Out doorsWarehouse”展示如何根据基于角色的安全性创建动态报告(见图2)。
Now we will explain the method of how to create dynamic reporting based on Role based security by using one of our sample packages, "Great Outdoors Warehouse". (Figure 2).
要创建实现基于角色的安全性的动态报告,可使用以下IBMCognosBI功能。
To create dynamic reports that implement Role based security we use the following IBM Cognos BI functionality.
要在EAR部署描述符中创建安全性角色,使用RoleMapping按钮。
To create the security roles in the EAR deployment descriptor, use the role Mapping button.
从Home和Component接口中选择方法,每个所选的安全性角色均可调用这些方法(图24),然后选择Finish。
Select methods from the Home and Component interfaces that each selected security role is allowed to invoke (Figure 24), then Finish.
实现基于角色的安全性的步骤
当启用安全性时,将根据“人工任务”设置从StaffPlugin (4)分配适当的角色。
When the security is enabled, the proper role will be assigned from the Staff Plugin (4) depending on the Human Task settings.
通过在Rolename框中输入名称admin来创建名为admin的安全性角色。
Create a security role named Admin by typing in the name Admin into the role name field.
首先确定您的网站上需要访问WebSphereMQ的命令,然后实现基于角色的安全性,从而对命令进行分组。
Determining the roles at your site that require access to WebSphere MQ commands, and then implementing role-based security can provide a way to group the commands.
用于实现基于角色的安全性的IBMCognosbi特性。
IBM Cognos BI features for implementing Role based security.
在部署计划中,安全性配置为ejb3user角色指定了Run - as主体dwuser1 -subject。
In the deployment plan, the security configuration specifies a run-as-subject dwuser1-subject for the ejb3user role. Listing 16 shows the OrderRecvMDB bean class.
图22显示了正在链接到适当安全角色的安全性角色引用。
Figure 22 shows the security role Reference being linked to the appropriate security role.
应用推荐