角色授权约束是RBAC研究的重要内容。
Role authorization constraint is one of focal points of RBAC research.
同时利用属性证书的扩展项目解决用户的角色授权问题。
At the same time we use the attributes of an extension of the certificate to solve the authority of user's role.
根据以上内容,本文建立了用户—角色映射表和角色授权表。
On the basis of the above resolution, the paper constructs user-role mapping table and role authorization table.
如何处理在ASP.NETMVC中有多个角色的用户角色授权?
How to handle role authorization for users having multiple roles in ASP. NET MVC?
同时针对不同用户的角色需求,采取角色授权机制,提取相关的统计分析报表。
At the same time the role of demand for different users to take the role of licensing mechanism, extract relevant statistical analysis report.
根据实际工作的需要,本系统采取了角色授权机制和其它一些保证系统安全的办法。
Light of actual needs, the system has taken the role of the licensing mechanism and some other maintenance of system security measures.
下一个任务是IT管理员角色授权查看者在Jivaro Bank服务注册中心能够查看其订阅的服务的公共端点。
The next task is for the IT Administrator role to authorize the Viewer to see the public endpoints for his subscribed service in Jivaro Bank service registry.
WebSphereApplicationServer支持角色定义,这些角色授权管理员执行某些管理操作。
WebSphere Application Server supports the definition of roles that authorize administrators to perform certain administrative operations.
而且通过把客户端的Silverlight组件和中间层的ASP.NET集成起来,提供了对常见任务的端到端支持,如:数据验证、身份验证和角色授权。
It also provides end-to-end support for common tasks such as data validation, authentication and roles by integrating with Silverlight components on the client and ASP.NET on the mid-tier.
在定义人工任务时,可以选择一个授权角色,如“潜在所有者”,并将其与任务编辑器中提供的谓词集中的一个人员谓词关联。
When you define human tasks, you select an authorization role, like "potential owner," and associate it with a staff verb from the verb set offered by the task editor.
它要求容器实现一些接口,使部署工具能够管理授权角色。
It requires that containers implement interfaces that enable deployment tools to manage authorization roles.
表2、3和4显示了哪个缺省值适用于哪个人工任务或业务流程授权角色。
Tables 2, 3 and 4 show which defaults apply for which human task or business process authorization role.
人员谓词是一些针对人工任务角色的抽象授权规则,可以在业务流程和人工任务建模期间对其参数化并将其绑定到特定的人员存储库。
Staff verbs are abstract authorization rules for a human task role that can be parameterized and bound to a specific staff repository during business process and human task modeling.
发起人可以向以下任何人创建、传输或删除这些授权角色的工作项:潜在所有者、潜在启动者、发起者、阅读者、编辑和升级接收者。
Originators can create, transfer, or delete work items of these authorization roles to anybody: potential owner, potential starter, originator, reader, editor, and escalation receiver.
每个用户授权担任的角色。
我们希望对用户的角色进行区分,以授权特定用户组声明和处理特定人工任务。
We would also like to distinguish between user roles giving particular user groups authorization to claim and work on certain human tasks.
内联参与任务授权角色的成员在相应的人工任务活动上具有相同的角色。
Members of an inline participating task authorization role have the same role on the corresponding human task activity.
这些谓词中有些可能返回要分配到授权角色的潜在较大用户ID。
Some of these verbs can return potentially large sets of user IDs to be assigned to an authorization role.
如果发现某个工作项与此用户、所选业务对象和允许调用此api方法的预定义授权角色相关联,则会授予权限。
If a work item is found that is associated with this user, the selected business object, and a predefined authorization role that allows this API method to be invoked, then authorization is granted.
可以使用人员谓词为预定义的授权角色集定义授权规则。
You define authorization rules using staff verbs for the set of predefined authorization roles.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
You can design access control policies to grant authority to a user based on their role in a particular organization.
与J2EE基于角色的授权通常提供的授权相比,此模式提供了更细粒度的授权,可以一直细化到项目内的单个对象的级别。
This pattern provides a more granular level of authorization than is typically provided by J2EE role-based authorization, getting down to the level of an individual object within a system.
由于每个授权角色都可以授予阅读者权限,因此调用方由于任何分配原因(授权角色)而拥有匹配的工作项就足够了。
Since every authorization role grants reader rights, it is sufficient when the caller has a matching work item for any assignment reason (authorization role).
基于角色的授权通过仅将资源提供给已分配相应角色的用户来保护资源。
Role-based authorization protects resources by only making them available to users who have been assigned to the appropriate role.
基于角色的授权基于用户是某类用户的成员这一事实提供对资源的访问。
Role-based authorization provides access to resources based on the fact that the user is a member of some class of users.
角色与身份相关联,角色指定实现是否被授权调用其他组件。
Roles are associated with the identity and the roles dictate if the implementation is authorized to invoke other components.
只要用户不属于对维度具有显式授权的角色,它就属于默认角色的成员,可以根据默认策略访问该维度。
All users who do not belong to a role with explicit authorization on the dimension are members of the default role, and they are able to access the dimension according to the default policy.
它定义一个新的授权角色,名为administrator。
完成身份验证之后,IBMCognos8 还需要从身份验证源读取用户的组和角色,让授权功能可以使用这些信息。
Then, once authenticated IBM Cognos 8 needs to read the user’s groups and roles from the authentication source as well and make them available to the authorization functionality.
以下示例可用于将用户注册中心已知的组成员分配到某个人工任务授权角色。
The following example can be used to assign the members of a group known by the user registry to a human task authorization role.
应用推荐