描述配置安全策略的任务。
通过配置安全策略来执行运行时完整性检查。
使管理员能够通过将权限集与代码组关联来配置安全策略。
Enables administrators to configure security policy by associating sets of permissions with groups of code (code groups).
每个安全策略级别均有自己的代码组的层次结构,该层次结构为建立和配置安全策略提供基础结构。
Each security policy level has its own hierarchy of code groups that provides infrastructure for establishing and configuring security policy.
尽管您能编写自己的JAX - RPC处理程序,应用程序服务器提供商也能够根据配置和安全策略决定是否允许一个新的处理程序存在。
Even though you can write your own JAX-RPC handlers, the application server vendor can decide, based on configuration and security policies, whether to allow a new handler or not.
另外,例如网络拓扑以及安全策略会进一步使得配置及开发gdd工具变得更复杂。
Additional factors like network topologies and security policies can further complicate the configuration and deployment of GDD tools.
例如,如果服务提供者的安全策略声明要求使用加密消息,则ESB可以自动配置一个encryption中介。
For example, if a service provider's security policy declaration requires encrypted messages, the ESB can configure an encryption mediation automatically.
在此配置中,已从Web服务引擎删除了was缺省安全策略。
In this configuration, WAS default security policy has been removed from the web services engine.
LotusDomino7提供了在指定时间段后强制更改互联网口令的功能,可以依靠安全策略配置,加强口令质量和长度。
Lotus Domino 7 lets you enforce Internet password changes after a specified length of time and enforces password quality and length, which you can configure by means of a security policy.
使用RationalApplication Developer导入示例EAR文件和配置Web服务安全策略,并为Web服务客户机绑定附件。
Using Rational Application Developer to import a sample EAR file and configure web services security policies and binding attachments for a web service client.
使用WebSphereApplicationServer控制台为示例服务配置Web服务安全策略。
Using the WebSphere Application Server console to configure the web service Security policies for a sample service.
已经由云提供者实现的安全性是另一个可用服务,客户可配置该服务来满足其增强的安全策略。
Security already implemented by cloud providers is one more available service that customers can configure to satisfy the their enhanced security policies.
安全配置向导允许你创建基于XML的安全策略。它们可以应用到你的服务器上。
The security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers.
数据库安全管理员通过创建安全策略来配置LBAC系统。
The database security administrator configures the LBAC system by creating security policies.
服务注册中心,如果安全策略或配置文件在注册中心中使用服务定义配置。
Service registry if security policies or profiles are held with a service definition in the registry.
认定安全策略、软件配置和恶意软件检测和防御控制的改变。
Identify changes to security policy, software configurations, and the addition of malware detection and prevention controls.
你需要配置本地安全策略设置,当你更改计算机系统时要求用户名和密码。
You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.
对于所有其他安全策略配置任务,请使用。
执行此操作的方法是:创建一个您希望该自定义权限拥有的配置的XML表示形式,并将该XML表示形式导入安全策略中。
You do this by creating an XML representation of the configuration you want the custom permission to have and importing the XML into your security policy.
描述如何修复因安全策略配置不正确而无法正常运行的程序集。
Describes how to fix assemblies that run incorrectly because of incorrect security policy configuration.
WEB服务器配置不当,系统本身安全策略设置存在缺陷,可导致门户网站被入侵的问题;
WEB server configuration is undeserved, strategy of systematic itself safety installs existence blemish, can bring about the problem;
配额在安全策略中基于证据进行配置,因此相同的代码在不同的证据下运行,则可能接收不同的配额。
Quota is configured in security policy on the basis of evidence, so the same code can receive a different quota if it is run with different evidence.
安全策略是公共语言运行时在确定要授予代码的权限时遵循的可配置的一组规则。
Security policy is the configurable set of rules that the common language runtime follows when determining the permissions to grant to code.
它包括一套样品安全策略配置文件,旨在满足共同的,一般用途的安全目标。
It includes a set of sample security policy configuration files designed to meet common, general-purpose security goals.
安全策略转换是实现策略自动配置的基本手段,安全策略冲突检测是实现策略正确配置的根本保证。
Security policy transformation is a basic means for automatic policy configuration. Security policy conflict detection is an essential guarantee for correct policy configuration.
高级安全策略又称为安全需求,低级策略配置是高级策略的实现,正确的低级策略配置必须能够满足安全需求。
We treat high-level policy as security requirement and low-level policy as the implementation of the high-level policy, a proper low-level policy configuration must meet the security requirement.
高级安全策略又称为安全需求,低级策略配置是高级策略的实现,正确的低级策略配置必须能够满足安全需求。
We treat high-level policy as security requirement and low-level policy as the implementation of the high-level policy, a proper low-level policy configuration must meet the security requirement.
应用推荐