This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
See the Resources section to learn more about code source access control and authentication in JAAS.
请参阅参考资料部分以了解更多关于JAAS中代码源访问控制和认证的信息。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
The interceptor transfers control to your application (for example, the JSP page requested by the client in case of successful authentication and authorization).
拦截器将控制权传输给应用程序(比如,成功进行了身份验证和授权的客户机请求的jsp页面)。
They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.
它们有很多相同的概念,要处理的问题域也在很大程度上重叠:验证、授权和访问控制。
The full capabilities of authentication and access control are beyond the scope of this article.
身份验证和访问控制的完整功能超出了本文的范围。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
With the appropriate persuasion, increasing the security of your authentication schemes can be as easy as applying these control algorithms to your current password entry code.
通过适当的说服工作,增加身份验证方案的安全性可以像对当前密码输入代码应用控制算法一样简单。
The declarative method offers ease of use, while the programmatic method provides finer levels of security control with respect to resource authentication and authorization.
声明方法提供易用性,编程方法为资源的身份验证和授权提供更好的安全控制级别。
This approach obviously offers more precise control than the simple password-based authentication shown earlier, and is recommended for applications that require multiple levels of access control.
这种方法显然比前面显示的基于密码的方法提供更加精确的访问,并且推荐需要多级访问控制的应用程序使用该方法。
For external applications that work with DB2, including te, this plug-in provides the means to directly control user and group authentication.
对于使用DB2的外部应用程序(包括TE),此插件允许直接控制用户和组身份验证。
With version 3, considered the current version since 2004, the standard was improved with explicit authentication and access control systems.
对于版本3(自从2004年以来的最新版本),该标准已通过显式身份验证和访问控制系统进行了改进。
PAM offers database and system developers a great deal of flexibility and control over authentication policies.
PAM 为数据库和系统开发人员提供了很大的灵活性以及对身份验证策略的控制能力。
But the more interesting thing is the programmatic security enhancements including the login and logout methods which give the developer more control over the authentication and authorization process.
但编程方式的安全增强则更有意思一些,login、logout这些方法能让开发人员更好地控制认证和授权过程。
The framework also exposes a powerful user authentication and access control subsystem that you can customize it to meet the requirements of almost any Web application.
该框架还公开一个强大的用户身份验证和访问控制系统,通过定制它几乎可以满足任意web应用程序的需求。
However, you can control the server's behavior by editing the authentication file pg_hba.conf.
然而,通过编辑身份验证文件pg_hba . conf,您可以控制服务器的行为。
In general, servlet filters are used to control the flow of the application based on user type (or authentication and authorization) or page functionality.
通常,基于用户类型(或身份验证和授权)或页面功能将servlet过滤器用于控制应用程序流。
Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
Other options allow you to control precisely the request to send, the proxy Settings, user authentication, and cookies.
其他选项使您可以准确地控制要发送的请求、代理设置、用户身份验证和cookie。
Identity authentication and access control are the major security mechanisms to defend active attack.
身份认证与访问控制是信息系统防御主动攻击的主要安全机制。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
This article teaches you how the Technology Explorer can control user and group authentication to db2 through the use of a security plug-in called db2auth (see Resources for more about db2auth).
本文将向您介绍如何在TechnologyExplorer中使用db2auth安全插件来控制db2的用户和组身份验证(参见参考资料了解db2auth的详细信息)。
Spring Security is a powerful and highly customizable authentication and access-control framework.
SpringSecurity是功能强大的并高度可定制的认证和访问控制框架。
One of the major features of NFS Version 4 is its support for enhanced security schemes, which allow stronger authentication, fine-grained access control, and encrypted data traffic.
NFSVersion4的主要特性之一就是它对增强型安全方案的支持,该方案允许更强的身份验证、细粒度的访问控制以及加密的数据通信。
SAML authentication and identity attribute statements are allowed to be passed into the MDM Server using the control object.
可以使用控制对象把SAML身份验证和身份属性语句传递给MDMServer。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
应用推荐