Steps to implement Role based security
实现基于角色的安全性的步骤
A JAAS-based security implementation.
一个基于JAAS的安全实现。
IBM Cognos BI features for implementing Role based security.
用于实现基于角色的安全性的IBMCognosbi特性。
Setting up role-based security is easier than most people think.
设置基于角色的安全性比大部分人所想的更轻松。
You now know how to enforce both URL-based security and method-based security.
您现在掌握了如何加强基于URL的安全性和基于方法的安全性。
We could potentially use standard J2EE role-based security to manage printer access.
我们可以使用标准的J2EE基于角色的安全性来管理打印机访问。
The guide contains also the protocols to be used in a claims-based security architecture.
该指南还包括使用于基于声明的安全架构的协议。
At this point, it may be useful to ponder a bit on the concept of document-based security.
此时,稍许认真考虑一下基于文档的安全性概念可能很有用。
Note: You need gssapiDB2.h only if you are implementing the GSS-API-based security plug-in.
注意:只有在实现基于 GSS-API 的安全性插件时才需要gssapiDB2.h。
In conjunction with Role based Security, IBM Cognos bi also offers dynamic reporting capability.
结合基于角色的安全性,IBMCognosBI还提供动态报告功能。
Role-based security is the most straightforward way to organize commands for security purposes.
基于角色的安全性是组织命令、实现安全性最简单的方法。
This script creates user and group tables that you'll use to set up a database-based security realm.
这个脚本创建用户和组表,您将使用这些表设置基于数据库的安全域。
Part 1 explains how to use Acegi's built-in filters to implement a simple URL-based security system.
第1部分解释了如何使用Acegi的内置过滤器实现一个简单的基于URL的安全系统。
Let's now discuss some frequently confusing issues for those new to Kerberos-based security systems.
接下来我们讨论一些新接触的基于Kerberos的安全系统的经常混淆的问题。
Doing so gives your applications access to a strong and robust standards-based security infrastructure.
这样做可以让应用程序能够访问强大、健壮且基于标准的安全性基础设施。
To create dynamic reports that implement Role based security we use the following IBM Cognos BI functionality.
要创建实现基于角色的安全性的动态报告,可使用以下IBMCognosBI功能。
It provides user and role based security, which is one of the most important aspects of P2P for an organization.
它能够提供用户和基于角色的安全保证,而这对于企业级应用的P 2 P是最重要的一个方面。
However, when it is first installed, Rational Asset Manager USES file-based security for user authentication.
然而,当第一次安装时,RationalAssetManager使用基于文件的用户安全验证。
If all the validations are passed, a JAAS-based security context is created, including the identity of the user in a JAAS subject.
如果通过了所有的验证过程,那么将创建基于JAAS的安全上下文,包括JAAS主题中用户的标识。
The security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers.
安全配置向导允许你创建基于XML的安全策略。它们可以应用到你的服务器上。
The following subsections provide instructions for configuring file-based security on WebSphere Application Server Version 6.1.
以后小节提供了在WebSphereApplicationServer版本 6.1上配置基于文件安全的指导。
The sample application uses a database-based security realm, and you must install the realm before you install the Web application.
这个示例应用程序使用一个基于数据库的安全域,在安装Web 应用程序之前必须安装这个域。
Due to limited processing power and memory, however, a domain-based security manager is not yet available in the MIDP 1.0 specification.
但是,由于处理能力和内存有限,MIDP 1.0规范中还不可以使用基于域的安全性管理器。
Tivoli Access Manager for e-business is a mature product that provides robust, policy-based security to a corporate web environment.
TivoliAccessManagerfor e-business是一款成熟的产品,能够为企业web 环境提供强壮的、基于策略的安全性。
Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.
安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
In this series of articles, I introduced you to using Acegi security System to enforce both URL-based security and method-based security.
在这份共分三部分的系列文章中,我介绍了如何使用Acegi安全系统增强基于URL的安全性和基于方法的安全性。
Role based security is described as user-level security which focuses on the logical role of a user rather than the user's individual identity.
基于角色的安全性是一种用户级安全性,主要关注用户的逻辑角色而不是个人身份。
Role-based security is a great way to protect your organization's information assets, and it's probably easier to implement than you think.
基于角色的安全性是保护企业信息资产的一个不错的方法,而且它可能比您想象的更容易实现。
Part 1 of this series introduced Acegi and explained how to use its built-in security filters to implement a simple, URL-based security system.
系列文章的第1部分简单介绍了Acegi并解释如何使用其内置的安全过滤器实现一个简单的、基于url的安全系统。
Part 1 of this series introduced Acegi and explained how to use its built-in security filters to implement a simple, URL-based security system.
系列文章的第1部分简单介绍了Acegi并解释如何使用其内置的安全过滤器实现一个简单的、基于url的安全系统。
应用推荐