可以使用人员谓词为预定义的授权角色集定义授权规则。
You define authorization rules using staff verbs for the set of predefined authorization roles.
它要求容器实现一些接口,使部署工具能够管理授权角色。
It requires that containers implement interfaces that enable deployment tools to manage authorization roles.
它定义一个新的授权角色,名为administrator。
这些谓词中有些可能返回要分配到授权角色的潜在较大用户ID。
Some of these verbs can return potentially large sets of user IDs to be assigned to an authorization role.
内联参与任务授权角色的成员在相应的人工任务活动上具有相同的角色。
Members of an inline participating task authorization role have the same role on the corresponding human task activity.
以下示例可用于将用户注册中心已知的组成员分配到某个人工任务授权角色。
The following example can be used to assign the members of a group known by the user registry to a human task authorization role.
表2、3和4显示了哪个缺省值适用于哪个人工任务或业务流程授权角色。
Tables 2, 3 and 4 show which defaults apply for which human task or business process authorization role.
在本例中,在本地Servlet上为授权角色LocalRole启用资源约束。
In this example, we enabled a resource constraint on the local servlet for the authorization role LocalRole.
通过在编辑器画布的Staffsettings下选择您所选的授权角色,可以定义授权规则。
You can define authorization rules selecting the authorization role of your choice on the editor canvas, under Staff Settings.
如果发现某个工作项与此用户、所选业务对象和允许调用此api方法的预定义授权角色相关联,则会授予权限。
If a work item is found that is associated with this user, the selected business object, and a predefined authorization role that allows this API method to be invoked, then authorization is granted.
由于每个授权角色都可以授予阅读者权限,因此调用方由于任何分配原因(授权角色)而拥有匹配的工作项就足够了。
Since every authorization role grants reader rights, it is sufficient when the caller has a matching work item for any assignment reason (authorization role).
其中描述了授权角色及其继承规则和缺省值,如何定义授权规则以及如何解析授权规则以执行基于实例的授权。
It described the authorization roles with their inheritance rules and defaults, how you can define authorization rules, and how they are resolved in order to perform instance-based authorization.
在定义人工任务时,可以选择一个授权角色,如“潜在所有者”,并将其与任务编辑器中提供的谓词集中的一个人员谓词关联。
When you define human tasks, you select an authorization role, like "potential owner," and associate it with a staff verb from the verb set offered by the task editor.
发起人可以向以下任何人创建、传输或删除这些授权角色的工作项:潜在所有者、潜在启动者、发起者、阅读者、编辑和升级接收者。
Originators can create, transfer, or delete work items of these authorization roles to anybody: potential owner, potential starter, originator, reader, editor, and escalation receiver.
每个用户授权担任的角色。
我们希望对用户的角色进行区分,以授权特定用户组声明和处理特定人工任务。
We would also like to distinguish between user roles giving particular user groups authorization to claim and work on certain human tasks.
请注意,可以为安全标识选择未授权访问SCA组件的角色。
Notice that you can choose, for the security identity, a role not authorized to access the SCA component.
授权承担产品负责人角色的人能够接触到团队,一旦完成故事,要求他们去验证故事。
Empower whoever takes on the product owner role to be available to your team, and expect them to validate stories as soon as they are completed.
执行治理策略的工作应该留给指导委员会或某个得到授权,专门充当此角色的治理机构来做。
Enforcement of governance policies should be left to a steering committee or a governance body specifically empowered to play that role.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
You can design access control policies to grant authority to a user based on their role in a particular organization.
与J2EE基于角色的授权通常提供的授权相比,此模式提供了更细粒度的授权,可以一直细化到项目内的单个对象的级别。
This pattern provides a more granular level of authorization than is typically provided by J2EE role-based authorization, getting down to the level of an individual object within a system.
此外,需要将来自作业管理器的用户或用户组的访问ID导入到本地授权表并赋予其角色。
In addition, the access ID of the user or the user's group from an the job manager needs to be imported into the local authorization table and given a role.
基于角色的授权通过仅将资源提供给已分配相应角色的用户来保护资源。
Role-based authorization protects resources by only making them available to users who have been assigned to the appropriate role.
基于角色的授权基于用户是某类用户的成员这一事实提供对资源的访问。
Role-based authorization provides access to resources based on the fact that the user is a member of some class of users.
角色与身份相关联,角色指定实现是否被授权调用其他组件。
Roles are associated with the identity and the roles dictate if the implementation is authorized to invoke other components.
授权的目的是对每个ID、每个角色、或者每个概要进行访问控制。
The purpose of authorization is to control access to resources on a per-ID, per-role, or per-profile basis.
只要用户不属于对维度具有显式授权的角色,它就属于默认角色的成员,可以根据默认策略访问该维度。
All users who do not belong to a role with explicit authorization on the dimension are members of the default role, and they are able to access the dimension according to the default policy.
然后读取组节点的ou属性的值,获取用户经过授权的业务角色。
It then reads the values attached to the ou attributes of the group nodes to learn the user's authorized business roles.
下一个任务是IT管理员角色授权查看者在Jivaro Bank服务注册中心能够查看其订阅的服务的公共端点。
The next task is for the IT Administrator role to authorize the Viewer to see the public endpoints for his subscribed service in Jivaro Bank service registry.
布局角色和策略组以控制授权。
应用推荐