LDAP transaction authorization provider.
LDAP事务授权provider。
Creating your own transaction authorization provider.
创建自己的事务授权provider。
Configuring the LDAP transaction authorization provider class.
配置LDAP事务授权provider类。
You can also create your own transaction authorization provider.
您可以创建自己的事务授权provider。
This setting specifies the transaction authorization provider class.
该设置指定事务授权provider类。
Generally, you may choose to use an LDAP transaction authorization provider for the following reasons.
通常,可以选择使用LDAP事务授权provider,因为。
A transaction authorization provider class has to implement the com.dwl.base.security.AuthorizationProvider interface.
事务授权provider类必须实现com . dwl . base . security . AuthorizationProvider接口。
To use transaction authorization, you configure InfoSphere MDM Server to use a transaction authorization provider class.
为了使用事务授权,可以将InfoSphereMDMServer配置为使用一个事务授权provider类。
InfoSphere MDM Server also provides an interface to give you the flexibility to implement your own transaction authorization provider.
InfoSphereMDMServer提供一个接口,使您可以灵活地实现自己的事务授权provider类。
This process is performed by the transaction Authorization Provider component and it determines if the end user is allowed to invoke the requested transaction.
这个过程是由事务授权Provider组件执行,它决定是否允许终端用户调用被请求事务。
Of course, you can implement your own LDAP transaction authorization provider class as long as your class implements the com.dwl.base.security.AuthorizationProvider interface.
当然,您也可以实现自己的LDAP事务授权provider类,只要这个类实现com . dwl . base . security . AuthorizationProvider接口就行了。
The user name and the group names are checked by the transaction authorization provider through the com.dwl.base.security.AuthorizationProvider interface to ensure transaction access is granted.
事务授权provider通过com . dwl . base . security . AuthorizationProvider接口检查用户名和组名,以确保对事务的访问经过授权。
To perform the authentication, mapping, and authorization, an external security provider is required.
为了执行验证、映射和授权,就需要使用外部安全提供者。
JACC provides the ability to delegate the permissions checking of security authorization to an external provider.
JACC提供了将安全授权的权限检查委托给外部提供程序的功能。
Using this plug-in provider, you can model your staff queries for any plug-in, and switch authorization during your tests on and off by simply changing the staff plug-in provider JNDI name for a task.
使用此插件提供程序,您可以针对任何插件建模您的人员查询,并且在打开和关闭测试期间,仅通过更改任务的人员插件提供程序JNDI名称就可切换授权。
Authorization is delegated to a trusted provider, like Twitter.
授权将委托给受信任的供应商,如Twitter。
If you are using WebSphere MQ as your messaging provider, you'll need to address queue authorization via other techniques.
如果使用WebSphereMQ作为消息传递提供者,则需要通过其他技术来提供队列授权。
The security token issued by the tenant's federation server will be used by the SaaS provider for authorization.
SaaS提供者将使用这个由承租者的联合服务器所颁发的安全令牌进行授权。
This provider class USES an LDAP server to manage transaction authorization.
这个provider类使用LDAP服务器来管理事务授权。
This sample provider class USES a simple directory structure to manage user, group, and transaction authorization.
本文的示例provider类使用一个简单的目录结构来管理用户、组和事务授权。
Therefore, in your provider class, you need to use these two arguments to determine whether authorization is allowed or not.
因此,在您的provider类中,需要使用这2 个参数来确定是否允许使用授权。
The provider class interfaces with the system of your choice for managing transaction authorization.
这个provider类与管理事务授权的系统进行交互。
The service provider confirms the authorization and sends an HTTP redirect response to the user's browser.
服务器供应商确定授权,然后发送一个HTTP重定向来响应用户浏览器。
Any JACC provider must satisfy the authorization requirements for all the applications in a cell.
任何JACC提供程序都必须满足计算单元内的所有应用程序的授权要求。
Finally, I can not help wondering why the service provider is able to collect our personal information without our authorization.
最后,我不禁要想为什么这些服务人员能够收集他人的个人信息,而没有通过本人的授权。
Finally, I can not help wondering why the service provider is able to collect our personal information without our authorization.
最后,我不禁要想为什么这些服务人员能够收集他人的个人信息,而没有通过本人的授权。
应用推荐