一个ESB网关,处理安全性策略。
访问控制—使系统能够识别用户组的安全性策略。
Access control. Enables the system to recognize security policies for groups of users.
组织安全性策略。
为日志记录、跟踪消息交换以及安全性策略实施提供操作支持。
Operational support for logging, tracing message exchanges, and enforcement of security policy.
一个内容审计选项,用来决定安全性策略计算是否在FM内完成。
A Content Audit option that determines whether security policy calculation should be done in FM.
作为分配风险等级的一部分,必须考虑分配给数据的安全性策略。
As part of assigning a risk level, you have to consider the security policies assigned to the data.
本文介绍了一些可以帮您维持系统遵守安全性策略的工具和技术。
This article introduced some tools and techniques that can help you maintain your system's adherence to its security policy.
当验证Web服务事务中的一方时,通常需要强制执行公司的安全性策略。
Upon authentication of a party in a web services transaction, a company's security policy often needs to be enforced.
这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。
The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.
代码访问安全性策略配置状态分为三个管理策略级别:企业、计算机和用户策略。
Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy.
如果用户是特定组的成员,则可以给组分配一个角色,该角色有权访问安全性策略允许的资源。
When a user is a member of a specific group, then that group can be assigned to a role that is entitled to access resources for which the security policies allow.
对于给定应用程序域,宿主可更改默认的基于角色的安全性策略并设置默认安全主体。
For a given application domain, the host can change the default role-based security policy and set a default security principal.
用户必需充分定义所有的安全性策略以确保正常运行时间的可用性保证,而没有或很少有中断阈值。
You must adequately define all security policies to ensure uptime availability guarantees with little or no interruption thresholds.
虽然这种方法在端对端通信链路中提供了适当的安全性,但违反了图书销售商的安全性策略。
Although this provides relevant security through the end-to-end communication link, the books-seller's security policy is violated.
胖客户机可以根据内容建立全面分级的安全性策略,而不是无论是否需要都以相同的密钥强度加密所有内容。
Instead of encrypting everything with the same key strength regardless of needs, rich clients can establish a comprehensive differentiating security policy based on the content.
要利用如此多的服务来在各种不同的业务背景下获得最大的商业效益,必须谨慎考虑的一个因素就是安全性策略管理。
Leveraging so many services for maximum business value across many different business contexts, one concept they must consider carefully is security policy management.
根据您的安装所使用的安全性策略,您可能想创建一个新用户名来使用MicrosoftSQLServer。
Depending on the security policies that your installation USES, you might want to create a new username for Microsoft SQL Server use.
这些组和角色可用于一些安全性策略,比如针对IBMCognos8门户中的每个对象的访问权限。
These groups and roles can be used in Security policies such as access permission for each object within the IBM Cognos 8 portal.
您可以手动编辑策略文件,也可以使用代码访问安全性策略工具管理企业级别、计算机级别或用户级别的安全策略。
You can edit policy files by hand or you can use the Code Access Security Policy tool to administer security policy for the enterprise, machine, or user levels.
除了这些基本的配置问题之外。CXF也在WSDL 中支持外部策略引用,对于那些想跨平台标准化安全性策略的组织,这是一个重要的特性。
Beyond the basic configuration issues, CXF also supports external policy references in WSDL, an important feature for organizations that want to standardize security policies across the enterprise.
最后,本文就一般系统都非常关心的安全和性能这两方面进行了深入的探讨,并提出了安全性策略和组件负载平衡策略来解决这两方面的问题。
Lastly, the security and performance which often be cared about are deeply discussed, and security policy and Component Load Balance policy are given as solutions.
我们也应预期供应商将会互相牵制,试图证明谁拥有更强壮的安全性和隐私策略,因为他们知道这些因素是游戏规则的破坏者。
We can also expect that vendors will trip over each other trying to prove which one has the stronger security and privacy policies, because they know those factors are game-breakers.
尽管某些安全性和可测试性方面可以建模为策略,但并非所有都可以这样处理。
Though certain aspects of security and testability can be modeled as policies, not all can.
分支esb的基础设施、转换、策略、安全性和服务注册中心项都是集中创建和管理的,很少或根本没有本地自定义。
The branch ESB infrastructure, transformations, policies, security, and service registry entries are all created and managed centrally with little or no local customization.
业务策略在同一个时间跨越所有作用范围,如安全性、业务过程、总体架构和操作策略。
Where the business policy spans subject areas like security, business process, overall architecture and operational policies all at the same time.
有时候策略与SOA 活动的安全性及可测试性会产生混淆。
Sometimes policy is confused with security and testability of an SOA initiative.
分支esb基础设施是集中提供的,集中提供的还有转换、策略、安全性和服务注册中心项。
The branch ESB infrastructure is provided centrally, as are transformations, policies, security, and service registry entries.
管理插件提供安全性、策略强制执行和广泛的日志记录能力。
Management plug-ins provide security, policy enforcement, and extensive logging capabilities.
管理插件提供安全性、策略强制执行和广泛的日志记录能力。
Management plug-ins provide security, policy enforcement, and extensive logging capabilities.
应用推荐