A JAAS-based security implementation.
一个基于JAAS的安全实现。
Completeness: How complete is the security implementation?
完整性:安全实现的完整程度?
Follow an SDLC process for an SOA security implementation.
遵循soa安全实现的SDLC流程。
Step 7. Follow an SDLC process for an SOA security implementation.
第7步遵循soa安全实现的SDLC流程。
As mentioned above, the message flow security implementation depends on an external security provider.
如上文所述,消息流安全性实现依赖于外部安全性提供者。
Security QoS specifies whether a service invocation supports security and the exact security implementation.
安全QoS 定义了服务调用是否需要支持安全以及明确的安全实现。
As far as the average program is concerned, the details of the security implementation don't matter very much.
就一般程序来说,安全性实现的细节并不重要。
You are discussing some of the aspects of security in the Synapse description, including WS-Security implementation.
您在书中描述Synapse时,讨论了安全的某些方面,包括WS - Security的实现。
All these standards generate their own set of specific requirements that affect the overall SOA security implementation.
所有这些标准都有自己的一组特定需求,会对总体soa安全实现造成影响。
Question: Axis WS-Security implementation is based on handlers so that you can don't have to change the code to secure it.
问:AxisWS-Security实现是基于处理程序的,所以不必通过更改代码来保护它。
The practical strategy for a security implementation is much more likely to be developed through a more prescriptive process.
安全政策执行的首要策略,更有可能是通过一个约定俗成的过程来开发的。
Gluecode ships with a login module for LDAP that can be configured against LDAP servers for a more robust security implementation.
gluecode为ldap所附带的登录模块,能够针对LDAP服务器进行配置,以得到一个更为健壮的安全实现。
The framework assures the security implementation of application class security policy using operating system security services.
这个框架利用操作系统提供的安全服务为各种应用类安全策略的实施提供了安全保证。
For the security implementation to function correctly, the servlet is put into the secured area that only authenticated auditors and users can access.
为了让安全实现正确发挥作用,servlet被放到受保护区域,以便只有通过认证的审计员和用户可以访问。
The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.
COE具备开发soa安全参考体系架构、安全标准、基于场景的安全实现策略和最佳实践的内在能力。
ObjectGrid does not provide any out-of-the-box security implementation of its own, but it does provide security plug-ins so you can implement the security mechanism of your choice.
ObjectGrid自己并不提供任何现成的安全性实现,但提供了安全性插件,以便实现您所选择的安全性机制。
You're responsible for making sure that everyone "gets this" by creating detailed project plans and budgets that make clear and reflect exactly what an SOA security implementation entails.
您将负责通过制定详细的项目计划和预算,清楚地说明和反映soa安全实现所必需的东西,确保每个人都对此心里有底。
The bottom line is that a well-constructed HLD is crucial for any successful SOA security implementation, and the SEA is ultimately responsible for leading the SOA security team toward its creation.
最基本的观念是,对于任意成功的SOA安全实现而言,构造良好的HLD非常关键,SEA对带领 SOA 安全团队进行其创建工作负有最终的责任。
This view is useful for debugging purposes but should not be enabled in production, as it might compromise security by revealing implementation details.
该视图对于调试过程非常有用,但是不应在生产中启用,因为它披露了实现细节,可能会影响安全性。
The services are managed for identity and compliance through proper service-level security design and implementation.
通过适当的服务水平安全性设计和实现对服务进行标识和遵从性管理。
Implementation: at this level, you define the security identity of the SCA component.
实现:在此级别,可以定义sca组件的安全标识。
Because of this review, it could address security issues before purchase and implementation, or they would block implementation as designed.
由于这些审核,IT能在购买或实施前涉及到安全问题,否则他们就会阻止按设计去实施。
Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.
分配给用户的角色可以用在定制安全策略的设计和实现中,以及定制的工作流和事件升级流中。
Centralizing the implementation of security policies, log analysis and reporting is a good thing.
安全策略、日志分析与报告的中心化实现是个不错的主义。
The report focuses on security program management, implementation and system administration of intelligence activities.
此报告主要针对安全计划管理以及情报活动的执行和系统管理。
For example, these proprietary IOR components could encode the ORB type and version or help support an ORB implementation of the OMG Security Service.
例如,这些专用IOR组件可以编码OR b类型和版本,或者帮助支持OMG安全服务的OR B实现。
A review of security requirements and implementation is an important part of this stage of the assessment.
对安全需求和实现的检查是这一阶段评估的重要部分。
Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.
继续本系列中的下一篇文章,其中将继续探索仓库ETL过程的设计和实现、仓库性能、安全性等。
Implementation must be done properly to avoid any security issues.
必须对其进行正确的实现,以避免产生任何安全问题。
The security constraints and conditions are attached to the implementation artifacts.
安全约束和条件是附加到实现构件的。
应用推荐