Identity extraction can be configured on a message flow by selecting identity token type.
选择身份标识类型即可配置消息流上的身份提取。
Client identity token and other related information will be encapsulated in the client request message.
客户身份令牌和其他相关信息将被封装到客户请求消息中。
This thread inherits the identity token from the IIS thread that originally picked the incoming request up.
这个线程从最先处理该请求的IIS线程上继承了身份令牌。
If X.509 Certificate is selected, the SSL is required and the user name is retrieved from the defined identity token location.
如果选择了X . 509Certificate,则需要SSL,用户名将从所定义的身份标识位置处检索。
Keep the default value Transport default for Identity token type, as shown in Figure 7 below, so that the user name and password are extracted from the HTTP header.
保留默认值TransportDefault身份标识类型,如图7所示,从HTTP报头中提取用户名和口令。
The identity token type will be changed to Username + password with the specified identity token location and identity password locations later during testing, as shown in Figure 16 below.
身份标识类型将更改为username +Password,并在稍后的测试中指定身份标识位置和身份口令位置,如下文中的图16所示。
Authentication providers may allow reading user identity information from an environment variable or some binary token.
身份验证提供者可能允许从环境变量或某个二进制令牌读取用户身份信息。
Identity assertion may be as simple as a username token but may involve the acquisition of tokens by the requesting application on behalf of a user and subsequent validation of such tokens by the ESB.
标识断言可能简单地采用用户名令牌,也可能涉及到请求应用程序代表用户获取令牌,并在后续操作中由esb对此类令牌进行验证。
We're going to propagate the identity provided in the inbound LTPA token to the provider gateway in a new SAML token.
我们将入站ltpa令牌中提供的标识传播到新的saml令牌中的提供者网关。
An instance of Identity Manager can be installed on the client side to provide token creation and mapping and outbound dentity mapping, too.
IdentityManager的实例可以安装在客户端,以提供令牌创建、映射和出站标识映射等功能。
Securing the communication with the Tivoli Federated Identity Manager security token service is recommended to protect the integrity and confidentiality of the message.
建议保护与TivoliFederatedIdentityManager安全令牌服务之间的通信,以保护消息的完整性和私密性。
The article presents the policy sets and bindings required for the client and provider, as well as the Tivoli Federated Identity Manager trust service chain configuration needed to issue a SAML token.
本文展示了客户端和提供者所需的策略集和绑定,以及发放SAML令牌所需的TivoliFederatedIdentityManager信任服务链配置。
Generate an LTPA token at the transport level for enabling identity propagation.
在传输级别上生成ltpa令牌以便启用身份传播。
A familiar example of a signed security token is an X.509 certificate; it asserts a binding between one's identity and a public key.
证书就是一个熟悉的已签名安全令牌例子;它断言某人的身份和公钥之间的绑定关系。
The last step implements the message transformation, here we remove the WS-Security header and generate an LTPA token (at the transport level) built on the mapped identity (the role "Guest").
最后一步实现了消息转换,在这里,我们删除了WS - Security头并生成一个建立在映射身份(角色“Guest”)上的ltpa令牌(在传输级别)。
WebSphere Application Server V5 provides support for username token, X509, identity assertion, signatures and encryption as "technical previews", meaning that they are not supported.
WebSphereApplicationServerV5提供了对用户名令牌、X509、身份断言、签名和加密的支持作为“技术预览”,这表示它们还没有得到正式支持。
Note that only the user identity from the LTPA token is passed in the SAML token.
注意,只有ltpa令牌的用户标识被传入saml令牌。
Notice that as a mapping target, we use the identity used by the IBM WebSphere Application Server, and it will be encrypted into the LTPA token.
注意,我们使用IBMWebSphereApplicationServer使用的身份作为映射目标,它将被加密到ltpa令牌中。
By encrypting the information, it ensures the confidentiality of that information, for both the identity and the validity of the token.
通过对信息进行加密,它可以确保该信息的机密性,包括标识和令牌的有效性。
The target server receives the request, retrieves the GSS token, extracts the server identity and compares it to the list of trusted server identities.
目标服务器接收请求,检索gss令牌,提取服务器标识,并与受信任的服务器标识列表进行比较。
The asserted identity is not transmitted as a token; it is plain text without encryption.
断言的标识并不作为令牌传输,它采用纯文本格式,而没有经过加密。
The target server receives the request, retrieves the GSS token, extracts the server identity, authenticates it, and compares it to the list of trusted servers' identities.
目标服务器接收请求,检索gss令牌,提取服务器标识,对其进行身份验证,并与受信任的服务器标识列表进行比较。
The identity of the user in the token includes both the user id and the domain of the user (the LDAP server the user was authenticated against).
令牌中用户的标识包括用户ID和用户的域(对该用户进行身份验证的LDAP服务器)。
However, there's an important aspect to consider regarding repository and identity management, which LTPA token is not intended to address.
然而,对于存储库和标识管理,务必考虑的一个非常重要的方面是,哪一个LTPA令牌不需要加以处理。
The token carries the requestor's identity; the provider manages the subscription level.
令牌符号携带请求者的身份验证,提供者管理订阅级别。
Standardizing user identity formats within the enterprise with the token transformation service.
使用令牌转换服务标准化企业中的用户标识格式。
The asserted identity is transmitted inside a custom token object, which is then picked up on the target server and used in an inbound identity mapping module.
在自定义的令牌对象中传输断言的标识,然后在目标服务器中获得该标识,并用于入站标识映射模块。
The asserted identity is transmitted in a custom token object, which is picked up by the server-side identity assertion login module and used to assert the identity.
在自定义的令牌对象中传输断言的标识,然后由服务器端的标识断言登录模块获得该标识并用于对标识进行断言。
Using a SAML bearer subject confirmation token to propagate a user's identity.
使用SAML不记名主体确认令牌来传播用户身份。
LTPA token is also very useful when propagating an identity, which means that you can pass along the LTPA token in the different tiers of the architecture, and still keep the identity of the caller.
在传播标识时,ltpa令牌也非常有用,这意味着您可以在体系结构的不同层之间传递ltpa令牌,并且仍然保持调用者的标识。
应用推荐