• Identity service scopes - The Identity service now allows for creating per-service access control management scopes with delegation of management authority between users.

    身份识别服务作用(IdentityService Scopes)——通过代理用户授权管理,身份识别服务(Identity Service)现在允许每个服务访问控制创建管理作用域。

    youdao

  • For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.

    例如存在这样一个访问控制策略其允许担当客户服务代表角色所有用户执行客户管理操作

    youdao

  • Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.

    访问控制列表(acl): ACL数据结构将一个服务权限列表与一主体相关联。

    youdao

  • Service interfaces are typically coarse-grained but the client often wants more control over their granularity of access.

    服务接口通常粒度的,客户通常希望访问的粒度进行更多控制

    youdao

  • The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.

    架构需要涉及许多问题安全性访问控制服务水平协议,直到业务工作流事件处理信息管理和业务规则。

    youdao

  • Administration: How do I control access to the service?

    管理如何控制服务访问

    youdao

  • Additional access control is required for fine-grained protection of the assets associated with that service.

    服务相关联资产细粒度保护需要其它访问控制

    youdao

  • A utilization service support tenants to maintain and configure their specific organization structure and access control data.

    利用服务支持租户维护配置自己组织结构访问控制数据

    youdao

  • Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.

    本文例子中,访问控制主体就是调用MDM 服务用户,这毫不奇怪。

    youdao

  • Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.

    或许需要访问现有库存控制系统客户数据库基于大型机安全性访问控制服务

    youdao

  • When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.

    配置服务服务器外运行时,没有其实施访问控制因为管理安全基础结构是在服务器内运行

    youdao

  • Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.

    服务安全性重点管理联合标识服务访问控制确保能安全访问服务和应用程序以及使服务的安全策略得到一致执行

    youdao

  • Middleware technology is available to orchestrate services and control access to specific functionalities in the service.

    可以使用中间件技术服务进行组合,服务中的特定功能进行访问控制

    youdao

  • Accepting Tokens from.net Access Control service.

    接受从。NET访问控制服务传来的令

    youdao

  • Introduction to the.net Access Control service.

    引入。NET访问控制服务

    youdao

  • Some key scenarios that are expected as part of the commercial launch of the access control service are.

    以下一些重要解决方案可以作为访问控制服务商业发布一部分

    youdao

  • You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.

    了解到如何配置Acegi,使它目录服务交互,从而实现访问控制策略。

    youdao

  • Control access and visibility to business service models and policies within the business Services Repository.

    控制BusinessServicesRepository中的业务服务模型策略访问可视性

    youdao

  • Data tamperingExploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.

    数据篡改——利用访问控制机制允许攻击者Web服务进行未经授权调用弱点更改数据。

    youdao

  • Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.

    步骤3DataPower设备通过计算用XACML编写访问控制策略检查是否允许用户调用请求的服务

    youdao

  • Security and management: Provides a single point of control, access, and validation of web service requests.

    安全和管理提供Web服务请求控制访问验证

    youdao

  • The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.

    系列下一文章将展示如何设计访问控制策略,如何将它们托管目录服务中,以及如何配置Acegi读取的访问控制策略。

    youdao

  • The service provider USES the management UI to control access to the Web service.

    服务提供者使用管理UI控制Web服务的访问

    youdao

  • Identity provider or IdP based on a request of some sort from a relying party A.K.A. Service provider or SP, and they contain statements that service providers use to make access control decisions.

    断言通常通过基于某种依赖(也称为服务提供商SP)请求断言方(也称为身份提供商或IdP)创建,它们包含服务提供者用于访问控制决策语句

    youdao

  • This process configures Tivoli access Manager to update access control lists to allow the service subscriber to invoke the subscribed service.

    流程可配置TivoliAccessManager更新访问控制列表允许服务订阅者调用订阅的服务。

    youdao

  • Seamless integration with Tivoli access Manager for better management of access control policies and with WebSphere Services Registry and Repository for better management of service meta-data.

    无缝集成TivoliAccessManager更好管理访问控制策略,无缝集成WebSphereServicesRegistry andRepository以更好地管理服务元数据。

    youdao

  • If only the identity of the middle tier service is propagated to the downstream service, the downstream service does not have proper control over audit and authorization of access to the service.

    如果只有中间层服务标识传播下游服务,则下游服务不能对服务访问审核授权进行正确控制

    youdao

  • Data governance: With the SOA approach, the service enablement middleware provides control points and built-in capabilities to audit and control access to services.

    数据治理对于SOA方法服务支持中间件提供了审核控制服务访问控制点内置功能

    youdao

  • Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.

    可以通过策略实现安全措施(包括部分网络访问)控制服务质量

    youdao

  • Access control: Fine-grained access control might be necessary via a database lookup primitive, or a service invoke to an application specific authorization service.

    访问控制细粒度的访问控制可能必须的,通过一个数据库查找特定于应用程序的授权服务调用实现。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定