• So, if you rely on Windows authentication and file authorization, you will want to use the HTTP module approach for URL rewriting.

    因此如果依赖Windows身份验证文件授权,您可能希望url重写使用HTTP模块方法

    youdao

  • Therefore, the file authorization check will pass, allowing this user to view the content of the rewritten URL, /info/employee.aspx?empID=1001.

    因此文件授权检查通过允许用户查看重写后URL /info/employee.aspx?empID=1001内容

    youdao

  • While this approach fixes the URL authorization and forms authentication anomalies, it introduces a new wrinkle: file authorization no longer works.

    方法解决URL授权窗体身份验证的一些问题,同时也产生了新的问题文件授权无法工作

    youdao

  • Access control granularity specifies the authorization level which administrative domain provides service for users, such as directory authorization level, file authorization level etc.

    访问控制粒度指明系统用户授权层次目录授权与文件级授权

    youdao

  • AAA information file can be used not only for identity mapping but also for authentication and authorization.

    AAA信息文件不仅用于身份映射可以用于身份验证授权

    youdao

  • It typically performs authorization checks on system calls and operation requests on resources named by a file system.

    通常系统调用通过文件系统指定资源操作请求执行授权检查

    youdao

  • We need to add one thing to this file to extend the policy definition for class instance-level authorization: an optional relationship parameter associated with a permission statement.

    我们需要这个文件添加东西实例级授权扩展策略定义许可权语句相关可选关系参数

    youdao

  • AAA info file can be used not only for identity mapping, but also for authentication and authorization.

    AAA信息文件不仅用于身份映射可以用于身份验证授权

    youdao

  • Create an authorization file containing the public keys, as shown below.

    创建一个包含公钥授权文件如下所示。

    youdao

  • Listing 4 shows the results of an authorization request using the JAAS policy file shown in Listing 3.

    清单4显示一个授权请求结果请求使用清单3中显示JAAS策略文件

    youdao

  • JAAS authorization policies are configured in a plain text file, which makes them a little cumbersome to manage.

    JAAS授权策略文本文件配置就使管理起来有些麻烦。

    youdao

  • If you are using your own distribution server, add a section for authorization in your.pypirc file for this new location, and refer to it by name when uploading.

    如果使用自己发布服务器,而且. pypirc文件中的授权部分也包含了这个位置,只要上传时引用名称即可。

    youdao

  • Since the .k5login file overrides the default authorization rule, root also needs to place its own principal in there, or it will not be able to log in using the principal.

    因为.k5login文件覆盖缺省授权规则,所以root 用户需要其中放置自己主体否则无法使用主体进行登录

    youdao

  • That means that if you use elements in your Web.config file to specify authorization for specific URLs, you will have to refer to the rewritten URL.

    就是说如果Web . config文件使用元素特定的URL指定授权必须引用重写后的URL。

    youdao

  • SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.

    xml文件定义SCA策略可以附加这个实现实施授权安全身份策略

    youdao

  • This command USES the values found in the database manager configuration file and the authorization system catalog view (SYSCAT.DBAUTH). Listing 5 shows the results of issuing the command.

    这个命令使用数据库管理器配置文件授权系统编目视图(SYSCAT.DBAUTH)中找到

    youdao

  • For each participating server, add the DSAPI filter library name of the installed Authorization Extension (for example, libipwext.so) to the DSAPI filter file names field (see figure 8).

    对于每个参与服务器,将安装AuthorizationExtensionDSAPI过滤器库名(例如libipwext . so)添加DSAPI过滤器文件名字段中(参见8)。

    youdao

  • The ACL file stores the various principals and their level of authorization for the operations on the Kerberos database.

    ACL文件存储操作Kerberos数据库所用各个主体及其授权级别

    youdao

  • URL authorization is specified through the and elements in the Web.config file. .

    通过 Web.config文件中的元素指定URL授权

    youdao

  • At this point, you have created a properties file realm, configured a Web application to authenticate against this security realm, and verified the authorization for resources in the application.

    此时已经创建了一个属性文件,并将Web应用程序配置根据这个安全领域进行身份验证验证了该应用程序中资源的授权

    youdao

  • The parameterized staff verbs representing your authorization rules are stored as part of the human task model and will be deployed together with your human task or business process model EAR file.

    表示的组织规则参数化人员谓词作为人工任务模型一部分存储的,人工任务业务流程模型EAR文件一起部署

    youdao

  • For example, IIS attempts to authenticate the user making the request and determine if the authenticated user has authorization to access the requested file.

    例如IIS尝试发出请求用户进行身份验证确定通过身份验证的用户是否权限访问请求的文件。

    youdao

  • Print control: control the outgoing file is to allow the cooperation of the manufacturers to print the document, without authorization, the client can not print the file operation.

    打印可控控制外发文件是否允许协作厂商文件进行打印,未经授权客户无法对该文件进行打印操作

    youdao

  • Some security threats exist in file services of data center, such as access without authorization.

    数据中心内文件服务存在授权访问安全威胁

    youdao

  • Where an applicant entrusts an agent to file the application for administrative license, it shall submit an authorization.

    申请人依法委托代理人提出行政许可申请的,应当提交授权委托书。

    youdao

  • Any further access authorization is performed by NTFS file access permission's URL authorization.

    任何进一步存取授权NTFS档案存取使用权限URL授权来执行。

    youdao

  • GDM could not write to your authorization file.

    GDM无法写入认证文件

    youdao

  • GDM could not write to your authorization file.

    GDM无法写入认证文件

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定