实现访问控制策略通常包含两个步骤。
Implementing an access control policy usually consists of two steps.
配置简单的访问控制策略可分为两个步骤。
You can divide configuring a simple access control policy into two steps.
编写访问控制策略。
本节将向您展示如何配置IF来实现访问控制策略。
This section shows you how to configure IF to implement an access control policy.
拦截器使用应用程序的访问控制策略来做出授权决定。
Interceptors use your application's access control policy to make authorization decisions.
本发明公开了一种访问控制策略生成方法及装置。
The invention discloses method and device for generating an access controlling policy.
如果需要更改Wiki的访问控制策略,您只需更改某个规则。
Should the access control policy for the Wiki need to be changed, you only need to change a rule.
访问控制策略即保证数据库的访问者其身份的合法性。
Access control security strategy is to preserve the legality of the database users.
提出利用权能对资源访问控制策略进行描述,动态维护。
This paper describes the policy of resource access control with capability, so the policy has dynamic maintenance characteristic.
这包括诸如加载和删除分类系统以及设置访问控制策略等功能。
This includes functions such as loading and removing classification systems, and setting up access control policies.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
You can design access control policies to grant authority to a user based on their role in a particular organization.
它还包含针对所有Cognos对象的安全名称空间信息以及访问控制策略。
It also contains security namespace information and access control policies on all the Cognos objects.
在本文后面的部分,您将看到使用简单的访问控制策略构建一个样例应用程序。
Later in the article, you'll see the simple access control policy used in building a sample application.
XACML是一个灵活的标准,并且允许策略创建者构建复杂的访问控制策略。
XACML is a flexible standard and allows policy authors to build complex access control policies.
但是,目前我将继续向您展示如何使用Acegi配置一个简单的访问控制策略。
For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.
数据库系统的安全性主要包括两个方面:访问控制策略和传输通道安全。
There are two aspects included in database system security, which is access control security strategy and communication channel security.
您还将了解到如何配置Acegi,使它与目录服务交互,从而实现您的访问控制策略。
You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.
文章将着重讨论保护网络中数据的两种策略:访问控制策略和信息加密策略。
The article emphasizes on discussing the two measures to protect the datum in the network: accessing control measure and information encryption measure.
我还将展示配置acegi的方法,使它能够与目录服务器交互并实现您的访问控制策略。
I also show you how to configure Acegi to interact with the directory server to implement your access control policy.
这种方法以服务域作为访问控制策略的组织单元,简化访问控制的管理和使用。
This method employs service domain as a unit in which the access control policy is organized.
最后,证明了该细粒度协作访问控制策略关于协作系统的状态转换是保持安全的。
Lastly, the preserving security property of the fine-grained access control policy with respect to state transition is proven.
现在,只需了解拦截器可以拦截用户并在用户访问bean之前实现访问控制策略。
For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.
RBAC模型具有灵活性、方便性和安全性的特点,因此成为访问控制策略的首选。
RBAC model is the most popular access control strategy because of its flexibleness, convenience and security.
您还详细了解了配置Acegi 的方法,从而与LDAP目录交互实现访问控制策略。
You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
访问控制拦截器能够保证调用请求在对目标对象调用操作之前进行拦截并执行访问控制策略。
The interceptor can ensure that access control will occur before any request gets to the server operation.
自动信任协商(atn)是指通过暴露信任凭证与访问控制策略进行匹配以达到建立信任关系的目的。
Automated trust Negotiation (ATN) provides a means to establish the trust membership by disclosing and matching credentials and access control policies.
步骤3:DataPower设备通过计算用XACML编写的访问控制策略,检查是否允许用户调用所请求的服务。
Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.
步骤3:DataPower设备通过计算用XACML编写的访问控制策略,检查是否允许用户调用所请求的服务。
Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.
应用推荐