No prompting for trust levels will occur if you use Trusted Application Deployment.
如果使用受信任的应用程序部署,则不会出现任何信任级别提示。
A full trust application can paste XAML only from another fully trusted application.
完全信任的应用程序可贴上来自其他完全信任之应用程序的XAML。
To define a broker as a trusted application, use the -t flag on the mqsicreatebroker command.
把代理定义为可信应用程序的方法是在mqsicreatebroker命令中使用-t标志。
When the broker runs as a trusted application, WebSphere MQ API calls are processed more efficiently.
当代理作为可信应用程序来运行时,WebSphereMQAPI调用被更高效地处理。
To configure trusted application deployment, the certificate can be installed to the machine or enterprise level.
若要配置受信任的应用程序部署,可以将证书安装到计算机或企业级别。
Trusted application domain hosts can override evidence provided from the loader and can provide their own evidence.
受信任的应用程序域宿主可以重写由加载程序提供的证据,并可提供它们自己的证据。
In addition, an assembly or a trusted application domain host can provide custom evidence as a resource that is part of the assembly.
另外,程序集或受信任的应用程序域宿主还可以提供自定义证据作为程序集组成部分的资源。
In some situations, evidence that would normally be provided by a trusted application domain host is actually provided by the loader.
在某些情况下,通常由受信任的应用程序域宿主提供的证据实际上由加载程序提供。
If the digital signature is valid, the trusted application domain host passes the signature information as evidence to the runtime's policy mechanism.
如果数字签名有效,则受信任的应用程序域宿主将签名信息作为证据传递给运行时的策略机制。
Some evidence, such as where the code originates, usually comes from the trusted application domain host because only the host knows this information.
有些辨识项(例如程序码来源的位置)通常来自受信任的应用程序定义域主机,因为只有主应用程序知道这项资讯。
Or, maybe the database receives XML documents from a trusted application, maybe even one that you control, and you know that the XML data is always valid.
或者,数据库可能从受信任的应用程序处接收XML文档,而且您已知这些XML数据始终有效。
Other evidence, such as an assembly's digital signature, is inherent in the code itself and can come from the loader or a trusted application domain host.
其他的辨识项(例如组件的数位签章)是程序码本身就有的,可来自载入器或受信任的应用程序定义域主机。
The application USES trusted application Deployment and the digital certificate used to sign the application is not listed as a trusted publisher on the local machine.
应用程序使用受信任的应用程序部署,并且没有将用于为应用程序签名的数字证书列为本地计算机上的受信任发行者。
The runtime's policy mechanism USES the evidence from both the trusted application domain host and the assembly to determine a piece of code's membership in a code group.
运行时的策略机制使用来自受信任的应用程序域宿主和程序集的证据来确定一段代码在代码组中的成员资格。
If the trusted application domain host does not have permission to provide evidence, the assembly or application domain receives the permissions that have been granted to the host.
如果受信任的应用程序域宿主没有提供证据的权限,则程序集或应用程序域会收到已授予宿主的权限。
This model assumes, like the end to end trust, that a requesting application is known and trusted software.
和端到端信任类似,此模型假定请求应用程序是已知的受信任软件。
This example shows how to enable a trusted context and switch the user ID in an xa application environment.
这个例子展示如何在XA应用程序环境中启用一个受信任上下文和切换用户ID。
As the requesting application is not trusted audit requirements would be met by the ESB.
由于请求应用程序不受信任,因此审核要求将由esb满足。
After the trusted connection has been established, the application can then switch the user to an allowed user defined in the trusted context.
在建立受信任连接之后,应用程序将用户切换到受信任上下文中定义的允许的用户。
The explicit trusted connection is established under the identity of the application user APP_USER.
将在应用程序用户APP_USER的身份下建立显式的可信连接。
The attraction of running an MQ application as trusted is that it gives a performance benefit through reduced code pathlength.
将MQ应用程序作为受信任对象运行的好处在于,这样可通过缩短的代码路径长度提供性能优势。
The application program will be able to utilize the trusted connection in an distributed transactions.
应用程序可以在分布式事务中使用受信任连接。
"Trusted code" runs in the control region, user application code runs in the servant region, which completely isolates application execution and transaction management.
“受信任的代码”在控制区域中运行,用户应用程序代码在服务区域中运行,从而将应用程序执行与事务管理完全隔离。
After the application has established a trusted connection with the DB2 server, the application may switch users associated with the trusted context object in the backend.
在应用程序已经建立与DB 2服务器的连接之后,应用程序可以在后端切换与受信任上下文相关联的用户。
This lets application developers offload the task of user profile management to a third-party trusted resource, so they can concentrate on developing the application.
这样,应用程序开发人员就能够把管理用户信息的任务交给可信的第三方资源,这减轻了他们的工作负担,让他们可以集中精力开发应用程序。
It assumes that the connection from WebSEAL to Application Server is completely trusted; therefore, client-side certificates for authentication are required.
它假设从WebSEAL到ApplicationServer的连接是完全信任的,因此,需要用于认证的客户端证书。
Trusted connection in an XA application
XA应用程序中的受信任连接
Trusted connection in a JDBC application.
JDBC应用程序中的受信任连接。
After the initial setup is complete, application users can begin using the federated trusted contexts.
完成初始设置后,应用程序用户就可以使用联合可信上下文了。
Trusted connection in CLI application.
CLI应用程序中的受信任连接。
应用推荐