AAA information file can be used not only for identity mapping but also for authentication and authorization.
AAA信息文件不仅可用于身份映射,还可以用于身份验证和授权。
AAA info file can be used not only for identity mapping, but also for authentication and authorization.
AAA信息文件不仅可用于身份映射,还可以用于身份验证和授权。
Thus, establishing robust identity management processes to achieve authentication and authorization is one of the key aspects to successfully compile a secure software solution.
因此,必须建立健壮的身份管理过程来实现身份验证和授权,这是成功实现安全的软件解决方案的关键因素之一。
If only the identity of the middle tier service is propagated to the downstream service, the downstream service does not have proper control over audit and authorization of access to the service.
如果只有中间层服务的标识传播到下游服务,则下游服务不能对服务访问审核和授权进行正确的控制。
Once the authentication process successfully establishes identity, authorization takes over to restrict or grant access.
一旦身份验证过程成功地建立起身份,授权就会接管以便进行访问的限制或允许。
Normally, when requests go to URIs without any authorization constraint, no identity is set up.
通常,在没有任何授权约束的情况下将请求加入URI时,不会设置任何标识。
This links authorization data to an identity.
这可在授权数据和实体之间建立联系。
"N" is the number of all possible different authorization levels, each one associated with a locally valid service identity.
“n”是所有可能的不同授权级别的数量,每一个都关联一个本地有效服务身份。
Authorization and security identity for implementation.spring components is handled by the SCA container.
spring组件的授权和安全身份由sca容器处理。
The queue manager checks the userid in the identity context for authorization when a command is put to the SYSTEM.COMMAND.INPUT.
当一个命令被放置到SYSTEM.COMMAND . INPUT中时,队列管理器检查身份上下文中的userid以便授权。
SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.
xml文件中定义的SCA策略集可以被附加到这个实现以实施授权和安全身份策略。
All cloud services (and each cloud service's management interface) require mechanisms for identity management, authentication, authorization, and auditing (IAAA).
所有的云服务(以及每个云服务的管理界面)都需要身份管理、认证、授权和审计(IAAA)的机制。
The authors start by providing a thorough introduction to the WS-Security standards and discuss important topics such as auditing, authorization and user identity propagation.
作者从详细介绍WS - Security标准入手,讨论了审计、授权和用户身份传播等重要话题。
Although the MDM Server entrusts end user authentication to the system user, it is necessary for it to know the identity of the end user in order to provision transactional and data authorization.
虽然MDMServer将终端用户认证委托给系统用户,但是它必须知道终端用户的身份,以提供事务性授权和数据授权。
As Step 5d in Figure 3 illustrates, BOB's identity is now asserted all the way to the DB2 data source, and his identity is used for accurate authorization, auditing, and so on.
从图3中的步骤5d可以看到,BOB的身份现在一直断言到db 2数据源,他的身份将用于准确地授权、审计等。
Once the user's identity is obtained, the DB2 group membership lookup plug-in (also known as the group plug-in) is used to generate a list of group authorization IDs for the user.
一旦获取用户的身份,将使用DB 2组成员查找插件(即groupplug - in)为用户生成组授权ID列表。
The application invokes the ACL's permit method to determine authorization, passing in identity information in the form of a group or a user identifier.
应用程序调用ACL的permit方法确定授权,并以组或用户标识符的形式传入标识信息。
Securing applications with identity, authentication, authorization.
使用标识、身份验证和授权保护应用程序。
Exposing the service securely (encryption, identity management, authorization, and so on).
安全地公开服务(加密、身份管理、身份验证等)。
The basic WSTK identity service is used for authorization (if a user exists and the password matches they are authorized to use the system).
基本的WSTK标识服务用来进行授权(如果用户存在且与密码匹配,他们将被授权使用系统)。
Ideally, what should happen next is that another component will look at the identity in the certificate and then use that identity to make an authorization decision.
接下来理想的情况应该是另一个组件查看证书中的身份,然后使用该身份做出授权决策。
What ideally should happen next is that another component will look at the identity in the certificate, and then use that identity to make an authorization decision.
接下来理想的情况应该是另一个组件查看证书中的身份,然后使用该身份做出授权决策。
The Subject thus returned reveals the identity of the authenticated user that can be used for logging and/or data-level authorization purposes, etc.
这样返回的Subject 表明了认证用户的身份,可以用于登录和/或数据级的授权等。
Party a shall inform Party B in written form of the identity, rights or authorization limit of his project manager (if any).
甲方应书面通知乙方有关项目经理的身份、权力或授权的限制(如有)。
Identity, Authentication, Authorization, and Auditing mechanisms.
标识、身份验证、授权和审计机制。
The service is integrated with Sun's secure single sign-on identity system backed by a worldwide employee LDAP directory for authentication and authorization.
这一博客系统和Sun的安全单点登录认证系统集成在一起,供全球员工使用。
SPKI is a sort of distributed authorization mechanism, which combines authorization certificate and name certificate to realize identity validation and authorization management.
SPKI是一种分布式的授权机制,采用授权证书和名字证书结合的方式来实现身份认证和权限控制。
The Identity Model is a claims-based authorization system.
标识模型是一个基于声明的授权系统。
The identity and access service module achieves all kinds of operations of the database and provides local and remote interfaces for the modules of identity and access management and authorization.
身份与权限服务模块,实现对身份与权限数据库的各种操作,并向身份与权限管理模块和授权决策模块提供本地和远程接口。
The system consists of the identity and access database, the identity and access service module, the identity and access management module, the authorization module and the implementation module.
该系统由身份与权限数据库、身份与权限服务模块、身份与权限管理模块、授权决策模块和授权实施模块组成。
应用推荐