登录以输入认证和帐户访问授权的凭证。
Log in to enter credentials for authentication and account access authorization.
连接到端口的设备没有得到网络访问授权。
The device attached to the Port is not authorized for access to the network.
不要将其用作一种不安全的访问授权形式。
It should not be used as an insecure form of access authorization.
数据访问服务:这些服务负责数据访问授权、限制和日志记录。
Data access services: These services are responsible for authorization, restrictions and logging access to data.
该系统实现了远程访问用户的安全认证、访问授权和记费管理。
The system achieves identity authentication, access authorization, and accounting management to the remote access users.
游戏服务器可以检查授权并控制对媒体的访问。
The game server can check authorization and control access to the media.
每个数据库管理系统都必须能保护数据不会受到未授权访问和修改。
Every database management system must be able to protect data against unauthorized access and modification.
这个访问决策管理器负责制定授权决策。
The access decision manager is responsible for making authorization decisions.
这个过程一直进行,直到用户得到授权或者拒绝访问。
The process continues until the user is authorized or access is denied.
目前多数系统都以专有的方式实现访问控制和授权。
Most of the current systems implement access control and authorization in a proprietary manner.
XACML的初衷是开发一项访问控制和授权系统的标准。
XACML is an initiative to develop a standard for access control and authorization systems.
其次,使用授权机制来控制对应用程序功能的访问。
Second, an authorization mechanism is used to control access to application functionality.
拦截器使用应用程序的访问控制策略来做出授权决定。
Interceptors use your application's access control policy to make authorization decisions.
访问标志的概念非常类似于基于标签的授权控制。
The concept of an access token is very similar to label-based authorization controls.
这个安全策略授权每一个人都可以访问项目。
This security policy grants access to every user for every project.
保护系统上的信息不受未经授权的访问一直都是一个关键任务。
Protecting information on a system is always a critical task from unauthorized access.
授权表也可能包含外部访问ID。
The authorization table might also contain an external access ID.
授权和访问控制的粒度粗细不等。
Authorization and access control can vary from coarse - to fine-grained.
可能需要使用访问控制来保护事件负载免受未经授权的访问。
It may be necessary to secure event payloads from unauthorized access using access control.
包含授权和用户访问的runstats。
Acegi再次执行对访问bean的授权过程。
Acegi again executes its authorization process to access the beans.
是否有访问入侵发生(例如,一个未授权的人执行了一次获取操作)
Whether an access violation occurred (the wrong person performed a harvest operation, for example)
不要混淆了授权访问和访问失控。
创建安全域,以防止未经授权的用户访问应用程序。
Create a security realm to secure an application from unauthorized party access.
充当策略强制点,以抵御未经授权的访问。
Acting as a Policy Enforcement Point, to protect against unauthorized access.
授权决策:授权决策断言管理给定主体访问资源的权限。
Authorization decision: Authorization decision assertion manages a given subject's authority to access resources.
授权过程后,客户端收到一个访问令牌。
After the authorization process, the client receives an access token.
授权替代身份或原始身份访问消息流。
Authorize either the alternative or the original identity to access the message flow.
通常具有内嵌的安全性特征,保护客户数据拒绝未授权访问。
It usually has built-in security features that help protect against unauthorized access to customer data.
这将拒绝未经授权的人的敏感数据的访问。
This will deny unauthorized people access to sensitive data.
应用推荐