You have a proxy server that performs important authorization to limit who can access what applications at a coarse grained level.
有一个代理服务器,它执行重要的授权,以很粗的粒度限制谁可以访问什么应用程序。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
The game server can check authorization and control access to the media.
游戏服务器可以检查授权并控制对媒体的访问。
It allows a network access server (NAS) to perform authentication, authorization, and accounting for users.
它允许网络访问服务器(NAS)执行对用户的验证、授权和记帐。
If only the identity of the middle tier service is propagated to the downstream service, the downstream service does not have proper control over audit and authorization of access to the service.
如果只有中间层服务的标识传播到下游服务,则下游服务不能对服务访问审核和授权进行正确的控制。
This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.
它们有很多相同的概念,要处理的问题域也在很大程度上重叠:验证、授权和访问控制。
The security token (LTPA) created during the login is passed with data requests to back-end systems to enable them to perform authorization in providing controlled access to the data.
登录期间创建的安全标志(LTPA)随数据请求传递到后端系统,使后端系统可以执行授权,从而提供对数据的有控制的访问。
Log in to enter credentials for authentication and account access authorization.
登录以输入认证和帐户访问授权的凭证。
It provides the consistent authentication and authorization services necessary for universal access.
它为通用访问提供了所需的一致的身份验证和授权服务。
The access decision manager is responsible for making authorization decisions.
这个访问决策管理器负责制定授权决策。
A typical access control and authorization scenario includes three main entities — a subject, a resource, and an action — and their attributes.
典型的访问控制和授权场景包括三个主要实体:主体、资源和动作以及它们的属性。
Most of the current systems implement access control and authorization in a proprietary manner.
目前多数系统都以专有的方式实现访问控制和授权。
If you have Authorization, then the person requesting access needs to be authorized to access the system.
如果您具有授权,则需要对请求访问的人进行授权以访问系统。
XACML is an initiative to develop a standard for access control and authorization systems.
XACML的初衷是开发一项访问控制和授权系统的标准。
Data access services: These services are responsible for authorization, restrictions and logging access to data.
数据访问服务:这些服务负责数据访问授权、限制和日志记录。
Make sure that you have server administrator authorization before you access the administration services.
在访问管理服务之前,确保您得到服务器管理员的授权。
Interceptors use your application's access control policy to make authorization decisions.
拦截器使用应用程序的访问控制策略来做出授权决定。
Role-based authorization provides access to resources based on the fact that the user is a member of some class of users.
基于角色的授权基于用户是某类用户的成员这一事实提供对资源的访问。
In a real-world scenario, most RPs would check a user's authorization before granting access.
在真实的场景中,大多数rp会在授予访问权之前检查用户的授权。
Service usage is cumbersome due to multiple Authentication and Authorization systems needed to give partners access.
由于合作伙伴需要访问多个身份验证和授权系统,因此服务的使用变得非常的繁琐。
Once the authentication process successfully establishes identity, authorization takes over to restrict or grant access.
一旦身份验证过程成功地建立起身份,授权就会接管以便进行访问的限制或允许。
Subject containing CORBA credential is used by the authorization service to further restrict access to JNDI resources.
授权服务使用包含CORBA凭证的对象进一步限制对JNDI资源的访问。
Authorization and access control can vary from coarse - to fine-grained.
授权和访问控制的粒度粗细不等。
The purpose of authorization is to control access to resources on a per-ID, per-role, or per-profile basis.
授权的目的是对每个ID、每个角色、或者每个概要进行访问控制。
Now, let's go back and take a look at how we would solve our printer authorization problem using Tivoli Access Manager.
现在让我们回头看看如何使用TivoliAccessManager解决我们的打印机授权问题。
RUNSTATS authorization and user access.
包含授权和用户访问的runstats。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
Application resources like EJB methods and Web pages can be declared to require authorization for access by means of security constraints in deployment descriptors.
通过部署描述符中的安全约束,可以将应用程序资源(如ejb方法和web页)声明为需要授权才能进行访问。
Acegi again executes its authorization process to access the beans.
Acegi再次执行对访问bean的授权过程。
应用推荐