This links authorization data to an identity.
这可在授权数据和实体之间建立联系。
WS-Authorization: Describes how to manage authorization data and authorization policies.
WS - Authorization:描述如何管理授权数据和授权策略。
OAuth operates much like a credit card does, but with authorization data as the currency.
OAuth运作起来如同一张信用卡,只是将授权数据作为货币。
As mentioned earlier, no single system catalog view contains all the available authorization data.
如前所述,没有哪个单独的系统编目视图可以包含所有可用的授权数据。
There are many other queries that you can construct to retrieve authorization data. Here are two more examples.
可以构造很多其他的查询来检索授权数据。
Based on the business needs above, you can set up your LDAP server to manage the following transaction authorization data.
根据上述业务需要,可以设置LDAP服务器,使之管理以下业务授权数据。
The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.
这个模型将篡改授权数据的风险降至了最低,因此服务器不用花费大量的时间来验证数据了。
The authorization data you have just submitted is invalid, the account does not exist or it is currently inaccessible. Please try again.
授权你刚才提交的数据是无效的,该帐户不存在或者目前无法访问。请再试一次。
Step 4: Specify the registration authorization data required for XKMS key registrations. There are two ways to provide the authorization information.
步骤4:指定XKMS密钥注册所需的注册授权数据。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
Also in this model, authorization data has been separated from the authentication information so authorization data should not be embedded in authentication tickets.
而且,在这个模型中,授权数据已经与认证数据分隔开了,这样,授权数据就应该不用嵌入认证令牌中了。
The first part is to build up the RBAC authorization data, and the second part is to use the authorization data to perform access check in places where it is needed.
第一部分是建立一个RBAC授权数据,第二部分是在需要的地方使用这个授权数据来执行访问检查。
SAML shows software developers how to represent users, identifies what data needs to be transferred, and defines the process for sending and receiving authorization data.
SAML 向软件开发人员展示了如何表示用户、标识所需传送的数据,并且定义了发送和接收权限数据的过程。
Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
When a user authenticates across a trust for which selective authentication is enabled, an Other Organization security ID (SID) is added to the user's authorization data.
当用户通过已启用选择性身份验证的信任进行身份验证时,将向该用户的身份验证数据中添加其他组织安全ID (SID)。
Who gave the authorization to release the data?
谁授权发表这些资料的?
This typically means that the authorization rules have to be embedded into the data access logic of the application itself.
这通常意味着必须将授权规则嵌入到应用程序本身的数据访问逻辑之中。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
SAML defines a standard format to deliver authentication, authorization, and attribute data in a distributed environment.
SAML定义了一种在分布式环境中传递验证、授权和属性数据标准格式。
Supports object, data, and authorization migration in support of database migration scenarios.
通过支持对象、数据和授权迁移来支持数据库迁移场景。
Data access services: These services are responsible for authorization, restrictions and logging access to data.
数据访问服务:这些服务负责数据访问授权、限制和日志记录。
Consider the need for authentication, authorization, data privacy, and data integrity requirements.
考虑身份验证、授权、数据保密和数据集成的需求。
The security token (LTPA) created during the login is passed with data requests to back-end systems to enable them to perform authorization in providing controlled access to the data.
登录期间创建的安全标志(LTPA)随数据请求传递到后端系统,使后端系统可以执行授权,从而提供对数据的有控制的访问。
Encryption is not directly related to authentication and authorization but is an important aspect of protecting data, during transit or at rest, from unauthorized users.
加密与认证和授权没有直接的关系,但是,在保护传输中的或静止的数据不受未经授权用户访问的时候,它也是一个重要的方面。
Many databases have strong auditing and authorization built in to protect corporate data.
很多数据库都有强大的内置审核和授权机制,以保护公司数据。
As in our earlier discussion of custom role-based authorization, there may be situations where the view of data is contextual such that it cannot be simply adjusted based on static roles.
正如前面讨论自定义基于角色的授权时所提到的,可能会存在数据视图与上下文相关的情况,并不能仅简单地基于静态角色对其进行调整。
Security and authorization to the data sets must be considered here as well.
还必须考虑数据集的安全性和授权。
Multi-tenant permission data model design and authorization process.
多租户权限数据模型设计和授权过程。
Use policies to define authorization for queries and disclosure of data.
使用策略为数据的查询和公开定义授权。
应用推荐